Skip to main content


Project description

.. raw:: html

<div align="center">

.. raw:: html



**Toxic** is an open source software library for machine learning
security. It contains tools for adversarial example generation and
provides a framework for building new types of attack methods.

Currently in the dev stage.


Available attack algorithms implemented in Toxic:

- Fast Gradient Methods (FGM/FGSM)
```Tutorial`` </tutorial/source/fgsm.ipynb>`__
- Basic Iterative
```Tutorial`` </tutorial/source/basic_iterative.ipynb>`__
- Momentum Iterative
```Tutorial`` </tutorial/source/momentum_iterative.ipynb>`__
- DeepFool
- Universal Adversarial Perturbation (UAP)
- Jacobian-based Saliency Map Approach (JSMA)
- One Pixel Attack
- Carlini Wagner L2
- Carlini Wagner L-inf
- Feature Adversaries
- Boundary Attack
- Elastic Net
- Natural Adversarial Examples (NAE)

The Team

Toxic is a community driven project. The project was initiated by
machine learning security team @ `KakaoBrain <>`__.

.. |license| image::

Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Files for toxic, version 0.1.0
Filename, size File type Python version Upload date Hashes
Filename, size toxic-0.1.0-py3-none-any.whl (50.3 kB) File type Wheel Python version py3 Upload date Hashes View
Filename, size toxic-0.1.0.tar.gz (17.3 kB) File type Source Python version None Upload date Hashes View

Supported by

Pingdom Pingdom Monitoring Google Google Object Storage and Download Analytics Sentry Sentry Error logging AWS AWS Cloud computing DataDog DataDog Monitoring Fastly Fastly CDN DigiCert DigiCert EV certificate StatusPage StatusPage Status page