Giter VIP home page Giter VIP logo

blackboxbench's People

Contributors

alan-qin avatar peterlau61 avatar sclbd avatar stephen3zero24 avatar zhengmeixi avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar

blackboxbench's Issues

hello

Would you like to ask what your CUDA version is

About the calculation of robust acc under black-box attacks

Hi, I thank you for your contributions in robustness study. When I run the black-box attacks, if the total failure rate is 0.8, clean acc is 0.9, what is the robust acc under black-box attacks?

  1. Misclassified samples in normal testing is thrown. Then robust acc is 0.9*0.8=0.72.
  2. All samples are tested, thus, robust acc is 0.8.
    I am not sure which one is correct?
    Could the dear colleagues from BlackBoxBench team help me?
    Thanks!
    I wish you are all good!
    Momo

Not on the same device.

BlackboxBench/attacks/score/score_black_box_attack.py", line 133, in run
    dones_mask = early_stop_extra_fct(xs_t)
  File "attack_imagenet.py", line 212, in early_stop_crit_fct
    x_eval = torch.clamp(x_eval - x_ori, -epsilon, epsilon) + x_ori
RuntimeError: Expected all tensors to be on the same device, but found at least two devices, cuda:0 and cpu!

The New Version

Hey,

I have been using this library for quite a while for my research ( this is the time to mention that I had a great experience doing so).
I noticed that you have changed the library completely in your last update. There are no attacks implementations, and basically all query-based attacks files are no longer available, thus cannot be performed and used.

I would love to get some help, since my research is based on the ability to run those attacks.

Thank you.

ModuleNotFoundError

File "attack_imagenet.py", line 51, in
from attacks.score.nes_attack import NESAttack
ModuleNotFoundError: No module named 'attacks.score'

About the run time of 8 decision-based bbox attacks

8 decision-based attacks: Boundary attack, OPT attack, Sign-OPT, Evoluationary attack, GeoDA, HSJA, Sign Flip, RayS.

Hi, dear team-members of SCLBD,

I am not sure which methods take less time to attack the same DNN models (e.g., ResNet) with the complete deceit.

If the statics result of running time is available, I am sincerely grateful.

Best Regards!
Momo

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.