GradientAttack |
Perturbs the image with the gradient of the loss w.r.t. |
GradientSignAttack |
Adds the sign of the gradient to the image, gradually increasing the magnitude until the image is misclassified. |
FGSM |
alias of foolbox.attacks.gradient.GradientSignAttack |
LinfinityBasicIterativeAttack |
The Basic Iterative Method introduced in [R37dbc8f24aee-1]. |
BasicIterativeMethod |
alias of foolbox.attacks.iterative_projected_gradient.LinfinityBasicIterativeAttack |
BIM |
alias of foolbox.attacks.iterative_projected_gradient.LinfinityBasicIterativeAttack |
L1BasicIterativeAttack |
Modified version of the Basic Iterative Method that minimizes the L1 distance. |
L2BasicIterativeAttack |
Modified version of the Basic Iterative Method that minimizes the L2 distance. |
ProjectedGradientDescentAttack |
The Projected Gradient Descent Attack introduced in [R367e8e10528a-1] without random start. |
ProjectedGradientDescent |
alias of foolbox.attacks.iterative_projected_gradient.ProjectedGradientDescentAttack |
PGD |
alias of foolbox.attacks.iterative_projected_gradient.ProjectedGradientDescentAttack |
RandomStartProjectedGradientDescentAttack |
The Projected Gradient Descent Attack introduced in [Re6066bc39e14-1] with random start. |
RandomProjectedGradientDescent |
alias of foolbox.attacks.iterative_projected_gradient.RandomStartProjectedGradientDescentAttack |
RandomPGD |
alias of foolbox.attacks.iterative_projected_gradient.RandomStartProjectedGradientDescentAttack |
MomentumIterativeAttack |
The Momentum Iterative Method attack introduced in [R86d363e1fb2f-1]. |
MomentumIterativeMethod |
alias of foolbox.attacks.iterative_projected_gradient.MomentumIterativeAttack |
LBFGSAttack |
Uses L-BFGS-B to minimize the distance between the image and the adversarial as well as the cross-entropy between the predictions for the adversarial and the the one-hot encoded target class. |
DeepFoolAttack |
Simple and close to optimal gradient-based adversarial attack. |
NewtonFoolAttack |
Implements the NewtonFool Attack. |
DeepFoolL2Attack |
|
DeepFoolLinfinityAttack |
|
ADefAttack |
Adversarial attack that distorts the image, i.e. |
SLSQPAttack |
Uses SLSQP to minimize the distance between the image and the adversarial under the constraint that the image is adversarial. |
SaliencyMapAttack |
Implements the Saliency Map Attack. |
IterativeGradientAttack |
Like GradientAttack but with several steps for each epsilon. |
IterativeGradientSignAttack |
Like GradientSignAttack but with several steps for each epsilon. |
CarliniWagnerL2Attack |
The L2 version of the Carlini & Wagner attack. |