Setup: install the requirements from the requirements.txt file:
pip install -r requirements.txtFirst, read the tutorial notebook. It can be found here.
Then, we are going to write a pipeline for running a security evaluation experiment.
Complete the parts that are missing in the file pipeline_for_robustness_evaluation.py.
They are marked with a TODO comment (automatically recognized by most IDEs).
For running the debugging script, issue the following commands in the terminal:
cd src
python -m pipeline_for_robustness_evaluation --helpFirst, debug the adversarial attack, find out if the attack is working well with the configuration you defined.
python -m pipeline_for_robustness_evaluation --model 0 --debugOnce everythin is fine, we can finally run the complete evaluation on more samples (recommended GPU, or limit the number of samples to a small value).
cd src
python -m pipeline_for_robustness_evaluation --model 0 --samples 5