TODO
Project description
.. raw:: html
<div align="center">
.. raw:: html
</div>
Intro
-----
**Toxic** is an open source software library for machine learning
security. It contains tools for adversarial example generation and
provides a framework for building new types of attack methods.
Currently in the dev stage.
Attacks
-------
Available attack algorithms implemented in Toxic:
- Fast Gradient Methods (FGM/FGSM)
```Tutorial`` </tutorial/source/fgsm.ipynb>`__
- Basic Iterative
```Tutorial`` </tutorial/source/basic_iterative.ipynb>`__
- Momentum Iterative
```Tutorial`` </tutorial/source/momentum_iterative.ipynb>`__
- DeepFool
- Universal Adversarial Perturbation (UAP)
- Jacobian-based Saliency Map Approach (JSMA)
- One Pixel Attack
- LBFGS
- Carlini Wagner L2
- Carlini Wagner L-inf
- Feature Adversaries
- Boundary Attack
- Elastic Net
- Natural Adversarial Examples (NAE)
The Team
~~~~~~~~
Toxic is a community driven project. The project was initiated by
machine learning security team @ `KakaoBrain <kakaobrain.com>`__.
.. |license| image:: https://img.shields.io/github/license/mashape/apistatus.svg
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
toxic-0.1.0.tar.gz
(17.3 kB
view details)
Built Distribution
toxic-0.1.0-py3-none-any.whl
(50.3 kB
view details)
File details
Details for the file toxic-0.1.0.tar.gz
.
File metadata
- Download URL: toxic-0.1.0.tar.gz
- Upload date:
- Size: 17.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | c7c7470f5e57626614f085af8ef55d5155640f3bbeda2fea8b917d213f672716 |
|
MD5 | 02217da4117c5cfd821951e368562b99 |
|
BLAKE2b-256 | 943f8f65c19e8496df804984e434b142333a9d76ac648d2d55ffb3d59c045ea3 |
File details
Details for the file toxic-0.1.0-py3-none-any.whl
.
File metadata
- Download URL: toxic-0.1.0-py3-none-any.whl
- Upload date:
- Size: 50.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | d22e460d9ac2af1c4ba4bf3e0936de35f9e6811d111bf0d52d65c4e32838a5f9 |
|
MD5 | 36a1461b8c49a1d165dc245b59114042 |
|
BLAKE2b-256 | 26de377b8fde6125b0c33bd0086961416584e352a893fe43dee8f8b551946582 |