Skip to main content

TODO

Project description


.. raw:: html

<div align="center">

.. raw:: html

</div>

Intro
-----

**Toxic** is an open source software library for machine learning
security. It contains tools for adversarial example generation and
provides a framework for building new types of attack methods.

Currently in the dev stage.

Attacks
-------

Available attack algorithms implemented in Toxic:

- Fast Gradient Methods (FGM/FGSM)
```Tutorial`` </tutorial/source/fgsm.ipynb>`__
- Basic Iterative
```Tutorial`` </tutorial/source/basic_iterative.ipynb>`__
- Momentum Iterative
```Tutorial`` </tutorial/source/momentum_iterative.ipynb>`__
- DeepFool
- Universal Adversarial Perturbation (UAP)
- Jacobian-based Saliency Map Approach (JSMA)
- One Pixel Attack
- LBFGS
- Carlini Wagner L2
- Carlini Wagner L-inf
- Feature Adversaries
- Boundary Attack
- Elastic Net
- Natural Adversarial Examples (NAE)

The Team
~~~~~~~~

Toxic is a community driven project. The project was initiated by
machine learning security team @ `KakaoBrain <kakaobrain.com>`__.

.. |license| image:: https://img.shields.io/github/license/mashape/apistatus.svg


Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

toxic-0.1.0.tar.gz (17.3 kB view details)

Uploaded Source

Built Distribution

toxic-0.1.0-py3-none-any.whl (50.3 kB view details)

Uploaded Python 3

File details

Details for the file toxic-0.1.0.tar.gz.

File metadata

  • Download URL: toxic-0.1.0.tar.gz
  • Upload date:
  • Size: 17.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for toxic-0.1.0.tar.gz
Algorithm Hash digest
SHA256 c7c7470f5e57626614f085af8ef55d5155640f3bbeda2fea8b917d213f672716
MD5 02217da4117c5cfd821951e368562b99
BLAKE2b-256 943f8f65c19e8496df804984e434b142333a9d76ac648d2d55ffb3d59c045ea3

See more details on using hashes here.

File details

Details for the file toxic-0.1.0-py3-none-any.whl.

File metadata

File hashes

Hashes for toxic-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 d22e460d9ac2af1c4ba4bf3e0936de35f9e6811d111bf0d52d65c4e32838a5f9
MD5 36a1461b8c49a1d165dc245b59114042
BLAKE2b-256 26de377b8fde6125b0c33bd0086961416584e352a893fe43dee8f8b551946582

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page