Skip to main content

Amulet is a Python machine learning (ML) package to evaluate the susceptibility of different risks to security, privacy, and fairness.

Project description

Amulet

Amulet is a Python machine learning (ML) package to evaluate the susceptibility of different risks to security, privacy, and fairness. Amulet is applicable to evaluate how algorithms designed to reduce one risk may impact another unrelated risk and compare different attacks/defenses for a given risk.

Amulet builds upon prior work titled “SoK: Unintended Interactions among Machine Learning Defenses and Risks” which appears in IEEE Symposium on Security and Privacy 2024. The SoK covers only two interactions and identifies the design of a software library to evaluate unintended interactions as future work. Amulet addresses this gap by including eight different risks each covering their own attacks, defenses and metrics.

Amulet is:

  • Comprehensive: Covers the most representative attacks/defenses/metrics for different risks.
  • Extensible: Easy to include additional risks, attacks, defenses, or metrics.
  • Consistent: Allows using different attacks/defenses/metrics with a consistent, easy-to-use API.
  • Applicable: Allows evaluating unintended interactions among defenses and attacks.

Built to work with PyTorch, you can incorporate Amulet into your current ML pipeline to test how your model interacts with these state-of-the-art defenses and risks. Alternatively, you can use the example pipelines to bootstrap your pipeline.

Getting Started

Note: The package requires the CUDA version to be 11.8 or above for PyTorch 2.2

The easiest way to start is via pip:

pip install amuletml

Test installation

To test your installation, please run amulet/examples/get_started.py. This script also serves as a starting point to learn how to use the library.

Learn More

For more information on the basics about the library, please see the Getting Started guide.

To see the attacks, defenses, and risks (modules) that Amulet implements, please refer to the Module Heirarchy (link TBD) in the Tutorial (link TBD).

For each module, please see amulet/examples for implementations of pipelines that include recommendations on how to run each module.

Contributing

See CONTRIBUTING for guidance.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

amuletml-0.5.0.tar.gz (50.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

amuletml-0.5.0-py3-none-any.whl (73.3 kB view details)

Uploaded Python 3

File details

Details for the file amuletml-0.5.0.tar.gz.

File metadata

  • Download URL: amuletml-0.5.0.tar.gz
  • Upload date:
  • Size: 50.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.8.5 CPython/3.11.9 Linux/5.15.0-152-generic

File hashes

Hashes for amuletml-0.5.0.tar.gz
Algorithm Hash digest
SHA256 d196449646b37595c3ad15798f9ba069bb52177900d6f7c4c03deb08426e4425
MD5 b775c75724c26bddd76a509b071428e7
BLAKE2b-256 83a7b9cf711d8d2f5e01d79f0603b372583c02c29a7e127a7ad1639bfdee9d57

See more details on using hashes here.

File details

Details for the file amuletml-0.5.0-py3-none-any.whl.

File metadata

  • Download URL: amuletml-0.5.0-py3-none-any.whl
  • Upload date:
  • Size: 73.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.8.5 CPython/3.11.9 Linux/5.15.0-152-generic

File hashes

Hashes for amuletml-0.5.0-py3-none-any.whl
Algorithm Hash digest
SHA256 73a7f65a535373f1b9595dffef0de623ff80acde6162e4230966154c806d511d
MD5 ec5242ef05740fe5b8e6f7e5d028ade3
BLAKE2b-256 0509e8923dc527469fdf171830e1fd0ce0b63a9fcaa5519aae5328f88394d248

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page