Buddhu is a Adversarial examples generation library
Project description
moorkh : Adversarial Attacks in Pytorch
moorkh is a Pytorch library for generating adversarial examples with full support for batches of images in all attacks.
About the name
The name moorkh is a Hindi word meaning Fool in English, that's what we are making to Neural networks by generating advesarial examples. Although we also do so for making them more robust.
Usage
Installation
pip install moorkhorgit clone https://github.com/akshay-gupta123/moorkh
import moorkh
norm_layer = moorkh.Normalize(mean,std)
model = nn.Sequential(
norm_layer,
model
)
model.eval()
attak = moorkh.FGSM(model)
adversarial_images = attack(images, labels)
Implemented Attacks
EXPLAINING AND HARNESSING ADVERSARIAL EXAMPLES: FGSMADVERSARIAL EXAMPLES IN THE PHYSICAL WORLD: IFGSMON THE LIMITATION OF CONVULATIONSAL NEURAL NETWORK IN RECOGNIZING NEGATIVE IMAGES: SemanticADDING NOISE: NoiseTOWARDS DEEP LEARNING MODELS RESISTANT TO ADVERSARIAL ATTACKS: PGD\L2ESEMBLE ADVERSAIAL TRAINING: ATTACKS and DEFENSE: RFGSM
To-Do's
- Adding more Attacks
- Making Documentation
- Adding demo notebooks
- Adding Summaries of Implemented papers(for my own undestanding)
Contribution
This library is developed as a part of my learning, if you find any bug feel free to create a PR. All kind of contributions are always welcome!
References
- Adversarial=Robustness-Toolbox by IBM.
- Foolbox by Bethgelab.
- Cleverhans by Google brain
- Reliable and Interpretable Artificial Intelligence A Eth Zurich course
- Adversarial Robustness - Theory and Practice Tutorial by Zico Kolter and Aleksander Madry
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file moorkh-0.0.2.tar.gz.
File metadata
- Download URL: moorkh-0.0.2.tar.gz
- Upload date:
- Size: 6.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.4.1 importlib_metadata/4.5.0 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.56.0 CPython/3.8.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
37a6dbf6284e26d463bcf93c7fdf4491bccfd3c56ff52971b89a43bc80a372d4
|
|
| MD5 |
30f47f81fa805487877a4e0caee7ae87
|
|
| BLAKE2b-256 |
ac0f56400332a5cfddd73e71be9e96e71b36bef159ef59a3682f95a847474ef3
|
File details
Details for the file moorkh-0.0.2-py3-none-any.whl.
File metadata
- Download URL: moorkh-0.0.2-py3-none-any.whl
- Upload date:
- Size: 9.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.4.1 importlib_metadata/4.5.0 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.56.0 CPython/3.8.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1f74920dbd6858eb67e3d3bde343258fdff30b5a5465d63c09276c0c09f436cc
|
|
| MD5 |
1e8892f41f69275b565ba81a0078bfe9
|
|
| BLAKE2b-256 |
2844234f00f13cefdcc4574ecd3d2827aef685f1596af447dab9aebe97497067
|