对抗性鲁棒性工具箱(ART)

对抗性鲁棒性工具箱(ART) -- 用于机器学习安全性的 Python 库 -- 规避,中毒,提取,推断。「Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference」

Github stars Tracking Chart

Adversarial Robustness Toolbox (ART)

对抗性鲁棒性工具箱(ART)是用于机器学习安全性的Python库。 ART提供的工具使开发人员和研究人员可以针对以下方面评估,捍卫,认证和验证机器学习模型和应用程序: 逃避,中毒,提取和推断的对抗性威胁。 ART支持所有数据类型的所有流行的机器学习框架(TensorFlow,Keras,PyTorch,MXNet,scikit-learn,XGBoost,LightGBM,CatBoost,GPy等) (图像,表格,音频,视频等)和机器学习任务(分类,对象检测,生成,认证等)。

学到更多

开始使用 文献资料 贡献
- 安装
- 例子
- 笔记本电脑
- 进攻
- 防御
- 估算器
- 指标
- 技术文档
- Slack, 邀请函
- 贡献
- 路线图
- 引用

(Source:https://github.com/Trusted-AI/adversarial-robustne...


Overview

Name With OwnerTrusted-AI/adversarial-robustness-toolbox
Primary LanguagePython
Program languagePython (Language Count: 4)
PlatformLinux, Mac, Windows, Docker
License:MIT License
Release Count59
Last Release Name1.17.1 (Posted on )
First Release Name0.1 (Posted on 2018-04-25 22:13:06)
Created At2018-03-15 14:40:43
Pushed At2024-05-14 18:53:40
Last Commit At
Stargazers Count4.5k
Watchers Count101
Fork Count1.1k
Commits Count12.2k
Has Issues Enabled
Issues Count874
Issue Open Count122
Pull Requests Count1116
Pull Requests Open Count27
Pull Requests Close Count197
Has Wiki Enabled
Is Archived
Is Fork
Is Locked
Is Mirror
Is Private

Adversarial Robustness 360 Toolbox (ART) v1.1

Build Status Documentation Status GitHub version Language grade: Python Total alerts

中文README请按此处

Adversarial Robustness 360 Toolbox (ART) is a Python library supporting developers and researchers in defending Machine
Learning models (Deep Neural Networks, Gradient Boosted Decision Trees, Support Vector Machines, Random Forests,
Logistic Regression, Gaussian Processes, Decision Trees, Scikit-learn Pipelines, etc.) against adversarial threats
(including evasion, extraction and poisoning) and helps making AI systems more secure and trustworthy. Machine Learning
models are vulnerable to adversarial examples, which are inputs (images, texts, tabular data, etc.) deliberately crafted
to produce a desired response by the Machine Learning model. ART provides the tools to build and deploy defences and
test them with adversarial attacks.

Defending Machine Learning models involves certifying and verifying model robustness and model hardening with
approaches such as pre-processing inputs, augmenting training data with adversarial examples, and leveraging runtime
detection methods to flag any inputs that might have been modified by an adversary. ART includes attacks for testing
defenses with state-of-the-art threat models.

Documentation of ART: https://adversarial-robustness-toolbox.readthedocs.io

Get started with examples and tutorials

The library is under continuous development. Feedback, bug reports and contributions are very welcome.
Get in touch with us on Slack (invite here)!

Supported Machine Learning Libraries and Applications

Implemented Attacks, Defences, Detections, Metrics, Certifications and Verifications

Evasion Attacks:

Extraction Attacks:

Poisoning Attacks:

Defences:

Extraction Defences:

Robustness Metrics, Certifications and Verifications:

Detection of Adversarial Examples:

  • Basic detector based on inputs
  • Detector trained on the activations of a specific layer
  • Detector based on Fast Generalized Subset Scan (Speakman et al., 2018)

Detection of Poisoning Attacks:

Setup

Installation with pip

The toolbox is designed and tested to run with Python 3.
ART can be installed from the PyPi repository using pip:

pip install adversarial-robustness-toolbox

Manual installation

The most recent version of ART can be downloaded or cloned from this repository:

git clone https://github.com/IBM/adversarial-robustness-toolbox

Install ART with the following command from the project folder art:

pip install .

ART provides unit tests that can be run with the following command:

bash run_tests.sh

Get Started with ART

Examples of using ART can be found in examples and examples/README.md provides an overview and
additional information. It contains a minimal example for each machine learning framework. All examples can be run with
the following command:

python examples/<example_name>.py

More detailed examples and tutorials are located in notebooks and notebooks/README.md provides
and overview and more information.

Contributing

Adding new features, improving documentation, fixing bugs, or writing tutorials are all examples of helpful
contributions. Furthermore, if you are publishing a new attack or defense, we strongly encourage you to add it to the
Adversarial Robustness 360 Toolbox so that others may evaluate it fairly in their own work.

Bug fixes can be initiated through GitHub pull requests. When making code contributions to the Adversarial Robustness
360 Toolbox, we ask that you follow the PEP 8 coding standard and that you provide unit tests for the new features.

This project uses DCO. Be sure to sign off your commits using the -s flag or
adding Signed-off-By: Name<Email> in the commit message.

Example

git commit -s -m 'Add new feature'

Citing ART

If you use ART for research, please consider citing the following reference paper:

@article{art2018,
    title = {Adversarial Robustness Toolbox v1.1.1},
    author = {Nicolae, Maria-Irina and Sinn, Mathieu and Tran, Minh~Ngoc and Buesser, Beat and Rawat, Ambrish and Wistuba, Martin and Zantedeschi, Valentina and Baracaldo, Nathalie and Chen, Bryant and Ludwig, Heiko and Molloy, Ian and Edwards, Ben},
    journal = {CoRR},
    volume = {1807.01069},
    year = {2018},
    url = {https://arxiv.org/pdf/1807.01069}
}
To the top