constrained-attacks

View on PyPIReverse Dependencies (0)

0.1.1 constrained_attacks-0.1.1-py3-none-any.whl

Wheel Details

Project: constrained-attacks
Version: 0.1.1
Filename: constrained_attacks-0.1.1-py3-none-any.whl
Download: [link]
Size: 24328
MD5: 9fd0065c7f4cf32d4e684bdb370180e2
SHA256: d090c1b925b4b18171f8d9281fdb88351de35afcb3202b3cd0c16c09c73d8a5a
Uploaded: 2022-07-20 06:54:16 +0000

dist-info

METADATA

Metadata-Version: 2.1
Name: constrained-attacks
Version: 0.1.1
Summary: constrained-attacks is a framework to generate adversarial examples under domain specific constraints.
Author: Thibault Simonetto
Author-Email: thibault.simonetto.001[at]student.uni.lu
License: MIT
Classifier: License :: OSI Approved :: MIT License
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.8
Requires-Python: >=3.8,<3.9
Requires-Dist: adversarial-robustness-toolbox[tensorflow] (==1.10); extra == "tensorflow"
Requires-Dist: joblib (<2.0.0,>=1.1.0)
Requires-Dist: numpy (<2.0.0,>=1.22.3)
Requires-Dist: pandas (<2.0.0,>=1.4.1)
Requires-Dist: pymoo (<0.6.0,>=0.5.0)
Requires-Dist: tensorflow (==2.8); extra == "tensorflow"
Requires-Dist: tqdm (<5.0.0,>=4.63.1)
Provides-Extra: tensorflow
Description-Content-Type: text/markdown
[Description omitted; length: 1920 characters]

WHEEL

Wheel-Version: 1.0
Generator: poetry 1.0.7
Root-Is-Purelib: true
Tag: py3-none-any

RECORD

Path Digest Size
constrained_attacks/__init__.py sha256=QTYqXqSTHFRkM9TEgpDFcHvwLbvqHDqvqfQ9EiXkcAM 23
constrained_attacks/attacks/__init__.py sha256=gB318o7A9YBHzA6Bw1lz1W-XQLioPTKG7sDoURsNP8M 84
constrained_attacks/attacks/cpgd/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
constrained_attacks/attacks/cpgd/cpgd.py sha256=y1z4VHfJhDQin2QCSUe0EXtDY4ikrE2uRGc3w-xJq6Q 2582
constrained_attacks/attacks/cpgd/tf2_classifier.py sha256=TaGM0Wscz_DeEUZ__hB-RNeECsoXJnNexxkbYpmj21o 9488
constrained_attacks/attacks/moeva/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
constrained_attacks/attacks/moeva/adversarial_problem.py sha256=dRRLhzPFPLwMCZPzGw0u8u-ST7dc0q1ytRlz7rzjCp0 3215
constrained_attacks/attacks/moeva/history_callback.py sha256=USYWbcIMsUkdbHjqC1HXOH1vVFC-n9B1js70GccDeDc 271
constrained_attacks/attacks/moeva/moeva.py sha256=4-XINZokIUS6W83AsrL8hMli-i4CPORFAwL4FdadgAU 7760
constrained_attacks/attacks/moeva/operators.py sha256=JlPtyYHBrkg85mhMVvvsaJpZ_I7F69mYePKYRuemZ1o 662
constrained_attacks/classifier/classifier.py sha256=_Xx3WtMXYJLBTcrJK2pEgAZXrg2dGUdTrZZN7PaJBes 1598
constrained_attacks/classifier/tensorflow_classifier.py sha256=9ZF66urcC1w8pG3xSKfc8sqcFYIPLlHCi0C03Mc6thk 429
constrained_attacks/constraints/__init__.py sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU 0
constrained_attacks/constraints/constraints.py sha256=yhqVowBLwDmZurJTXOE--aRIxaHMwmR-80Y-haceAFA 3606
constrained_attacks/constraints/constraints_checker.py sha256=cKuM2gQQN24SJs0-N_yAEQGm6WDMvYelVkJ-5jMjOy4 2468
constrained_attacks/constraints/constraints_executor.py sha256=-piRaMuN_KhKT5jrB44IAmIGgWaFv2vXubfHHyc3QAc 9907
constrained_attacks/constraints/constraints_fixer.py sha256=E2p12bE4ByGY6Wu7IbhaLtOCypH1Wh2vFTCUQRvuvFw 2285
constrained_attacks/constraints/relation_constraint.py sha256=GylfujvOeOHD36ReslRuk5JbIkr9WdCHCbCIlIN0okY 3570
constrained_attacks/objective_calculator/__init__.py sha256=TdAU5eQ_CM3w72BFuVg193M8vnDaiUFwCuUoZYB5sgQ 107
constrained_attacks/objective_calculator/cache_objective_calculator.py sha256=tJBWGHHzEwT4MUaBmDUeINWH5YwQdLWiF_nKj3QXibo 11064
constrained_attacks/objective_calculator/objective_calculator.py sha256=DriidxRJuOnqiAtvRHF7sSY7FuXEKnYTS7q4Tv-JW94 6582
constrained_attacks/utils/__init__.py sha256=DDszjzUET1xnCVpvsYyUA25f9KfA90JtReiUmIGrInc 954
constrained_attacks-0.1.1.dist-info/LICENSE sha256=t7HUhfllzcpvVozBxTWo3-V_PG3Zw_5f_8B8BobRRqw 1102
constrained_attacks-0.1.1.dist-info/WHEEL sha256=y3eDiaFVSNTPbgzfNn0nYn5tEn1cX6WrdetDlQM4xWw 83
constrained_attacks-0.1.1.dist-info/METADATA sha256=-G816a6qhb-SYnWZheu7IkMtCQoz_Ct3T6Y9rTAs7VU 2772
constrained_attacks-0.1.1.dist-info/RECORD