{"id":438196,"date":"2024-10-20T08:02:46","date_gmt":"2024-10-20T08:02:46","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-3129-2023-2\/"},"modified":"2024-10-26T15:06:44","modified_gmt":"2024-10-26T15:06:44","slug":"ieee-3129-2023-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-3129-2023-2\/","title":{"rendered":"IEEE 3129-2023"},"content":{"rendered":"
New IEEE Standard – Active. Test specifications with a set of indicators for common corruption and adversarial attacks, which can be used to evaluate the robustness of artificial intelligence-based image recognition services are provided in this standard. Robustness attack threats and establishes an assessment framework to evaluate the robustness of artificial intelligence-based image recognition service under various settings are also specified in this standard.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 3129\u2122-2023 Front cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 1.\u2002Overview 1.1\u2002Scope 1.2\u2002Purpose 1.3\u2002Word usage <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 2.\u2002Normative references 3.\u2002Definitions, acronyms, and abbreviations 3.1\u2002Definitions 3.2\u2002Acronyms and abbreviations 4.\u2002Robustness evaluation framework for AI-based image recognition services 4.1\u2002Background <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.2\u2002Image corruptions <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4.3\u2002Adversarial attacks <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4.4\u2002Evaluation practice 4.5\u2002Roles <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4.6\u2002Evaluation process <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4.7\u2002Evaluation metrics <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.\u2002Test cases 5.1\u2002Test case for Accuracy test 5.2\u2002Test case for common corruptions 5.3\u2002Test case for style transfer <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.4\u2002Test case for adversarial perturbations <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Annex\u00a0A (informative) Example common corruptions and adversarial attacks A.1\u2002Examples of common corruptions <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | A.2\u2002Example adversarial attacks <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Annex\u00a0B (informative) Example evaluation <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Annex\u00a0C (informative) Bibliography <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Back cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Robustness Testing and Evaluation of Artificial Intelligence (AI)-based Image Recognition Service (Approved Draft)<\/b><\/p>\n |