TwoSix Armory Adversarial Robustness Library Examples
Project description
Overview
This project includes example Python scripts and Jupyter notebook usages of the charmory (JATIC armory replacement) library.
Installation
cd examples
pip install --editable .
Usage
charmory
Acknowledgment
This material is based upon work supported by the Defense Advanced Research Projects Agency (DARPA) under Contract No. HR001120C0114. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Defense Advanced Research Projects Agency (DARPA).
Points of Contact
POC: Matt Wartell @matt.wartell DPOC: Christopher Woodall @christopher.woodall
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distributions
No source distribution files available for this release.See tutorial on generating distribution archives.
Built Distribution
Close
Hashes for armory_examples-23.12-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 9fab56b8f47ff75e2cd70e69a662ec413dce5f77b8eff876b3dfe467636206c4 |
|
MD5 | 2583fdd5afae353bdb1e47ba3ce7e48c |
|
BLAKE2b-256 | 2ed3b013e8275415b8a4c2ff6c739c2d651d96aea3c23f6228cd6bb16b9d95b6 |