Skip to main content

Amulet is a Python machine learning (ML) package to evaluate the susceptibility of different risks to security, privacy, and fairness.

Project description

Amulet

Amulet is a Python machine learning (ML) package to evaluate the susceptibility of different risks to security, privacy, and fairness. Amulet is applicable to evaluate how algorithms designed to reduce one risk may impact another unrelated risk and compare different attacks/defenses for a given risk.

Amulet builds upon prior work titled “SoK: Unintended Interactions among Machine Learning Defenses and Risks” which appears in IEEE Symposium on Security and Privacy 2024. The SoK covers only two interactions and identifies the design of a software library to evaluate unintended interactions as future work. Amulet addresses this gap by including eight different risks each covering their own attacks, defenses and metrics.

Amulet is:

  • Comprehensive: Covers the most representative attacks/defenses/metrics for different risks.
  • Extensible: Easy to include additional risks, attacks, defenses, or metrics.
  • Consistent: Allows using different attacks/defenses/metrics with a consistent, easy-to-use API.
  • Applicable: Allows evaluating unintended interactions among defenses and attacks.

Built to work with PyTorch, you can incorporate Amulet into your current ML pipeline to test how your model interacts with these state-of-the-art defenses and risks. Alternatively, you can use the example pipelines to bootstrap your pipeline.

Getting Started

Note: The package requires the CUDA version to be 11.8 or above for PyTorch 2.2

The easiest way to start is via pip:

pip install amuletml

Test installation

To test your installation, please run amulet/examples/get_started.py. This script also serves as a starting point to learn how to use the library.

Learn More

For more information on the basics about the library, please see the Getting Started guide.

To see the attacks, defenses, and risks (modules) that Amulet implements, please refer to the Module Heirarchy (link TBD) in the Tutorial (link TBD).

For each module, please see amulet/examples for implementations of pipelines that include recommendations on how to run each module.

Contributing

See CONTRIBUTING for guidance.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

amuletml-0.4.0.tar.gz (45.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

amuletml-0.4.0-py3-none-any.whl (68.1 kB view details)

Uploaded Python 3

File details

Details for the file amuletml-0.4.0.tar.gz.

File metadata

  • Download URL: amuletml-0.4.0.tar.gz
  • Upload date:
  • Size: 45.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.8.4 CPython/3.11.6 Linux/5.15.0-97-generic

File hashes

Hashes for amuletml-0.4.0.tar.gz
Algorithm Hash digest
SHA256 e00cea4d1c119d02f9129d80be6ae2593eedbb749e7f84ad0f95d5b3a7a113cf
MD5 d6d33189fdce224fb17d1acf4affcce5
BLAKE2b-256 3cf68f2715df44c11c8fe6379763b50958f875789a9e0d3fe780af186e57035f

See more details on using hashes here.

File details

Details for the file amuletml-0.4.0-py3-none-any.whl.

File metadata

  • Download URL: amuletml-0.4.0-py3-none-any.whl
  • Upload date:
  • Size: 68.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.8.4 CPython/3.11.6 Linux/5.15.0-97-generic

File hashes

Hashes for amuletml-0.4.0-py3-none-any.whl
Algorithm Hash digest
SHA256 9462e7801d8c2ff3601baaa6cde319cb6ff5887c41eb1d65f17d698e723a4dba
MD5 71c0b27aaa358eb024abdb22010f379e
BLAKE2b-256 79b7ec2c3846fe1e06dd1033090d3ca90370672d66fbc2c6a5cc35b4321027cd

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page