GradientAttack 
Perturbs the input with the gradient of the loss w.r.t. 
GradientSignAttack 
Adds the sign of the gradient to the input, gradually increasing the magnitude until the input is misclassified. 
FGSM 
alias of foolbox.attacks.gradient.GradientSignAttack 
LinfinityBasicIterativeAttack 
The Basic Iterative Method introduced in [R37dbc8f24aee1]. 
BasicIterativeMethod 
alias of foolbox.attacks.iterative_projected_gradient.LinfinityBasicIterativeAttack 
BIM 
alias of foolbox.attacks.iterative_projected_gradient.LinfinityBasicIterativeAttack 
L1BasicIterativeAttack 
Modified version of the Basic Iterative Method that minimizes the L1 distance. 
L2BasicIterativeAttack 
Modified version of the Basic Iterative Method that minimizes the L2 distance. 
ProjectedGradientDescentAttack 
The Projected Gradient Descent Attack introduced in [R367e8e10528a1] without random start. 
ProjectedGradientDescent 
alias of foolbox.attacks.iterative_projected_gradient.ProjectedGradientDescentAttack 
PGD 
alias of foolbox.attacks.iterative_projected_gradient.ProjectedGradientDescentAttack 
RandomStartProjectedGradientDescentAttack 
The Projected Gradient Descent Attack introduced in [Re6066bc39e141] with random start. 
RandomProjectedGradientDescent 
alias of foolbox.attacks.iterative_projected_gradient.RandomStartProjectedGradientDescentAttack 
RandomPGD 
alias of foolbox.attacks.iterative_projected_gradient.RandomStartProjectedGradientDescentAttack 
MomentumIterativeAttack 
The Momentum Iterative Method attack introduced in [R86d363e1fb2f1]. 
MomentumIterativeMethod 
alias of foolbox.attacks.iterative_projected_gradient.MomentumIterativeAttack 
LBFGSAttack 
Uses LBFGSB to minimize the distance between the input and the adversarial as well as the crossentropy between the predictions for the adversarial and the the onehot encoded target class. 
DeepFoolAttack 
Simple and close to optimal gradientbased adversarial attack. 
NewtonFoolAttack 
Implements the NewtonFool Attack. 
DeepFoolL2Attack 

DeepFoolLinfinityAttack 

ADefAttack 
Adversarial attack that distorts the image, i.e. 
SLSQPAttack 
Uses SLSQP to minimize the distance between the input and the adversarial under the constraint that the input is adversarial. 
SaliencyMapAttack 
Implements the Saliency Map Attack. 
IterativeGradientAttack 
Like GradientAttack but with several steps for each epsilon. 
IterativeGradientSignAttack 
Like GradientSignAttack but with several steps for each epsilon. 
CarliniWagnerL2Attack 
The L2 version of the Carlini & Wagner attack. 
EADAttack 
Gradient based attack which uses an elasticnet regularization [1]. 
DecoupledDirectionNormL2Attack 
The Decoupled Direction and Norm L2 adversarial attack from [R0e9d4da0ab481]. 
SparseFoolAttack 
A geometryinspired and fast attack for computing sparse adversarial perturbations. 