All source code are put under src subdirectory.
adversarial-attacks-image.pdf
- Cleverhans, OpenAI
- Tensorflow, version 3.4 and above
- Keras
https://drive.google.com/drive/folders/0B2pDcGINKNIOVmdBc1Z4VlBGVGs?usp=sharing
attack_fgsm.py
attack_jsma.py
attack_blackbox.py
def_adv.py
simple_NN_laddened_with_defensive_distillation.py
Contains the implementation of a protection of a network with defensive distillation.
Toggle comment between lines 74 and 75 to see performance on legitimate and adversarial examples.
simple_NN_with_no_defensive_distillation.py
Contains a model with no protection from any threat.
Toggle comment between lines 50 and 51 to see performance on legitimate and adversarial examples.
visualize.py
images.pysimple_NN_with_no_defensive_distillation.py
results.py
- All the files can be run using "python "
- Depending on the location of datafile, the path has to be edited inside the file.
Due to size limitations, adversarial example files are uploaded on google drive. Link has been shared at the top of this file.