Latest version: v1.1.5
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Security protocols for estimating adversarial robustness of machine learning models for both tabular and image datasets. This package implements a set of evasion attacks based on heuristic optimization algorithms, and complex cost functions to give reliable results for tabular problems.
No known vulnerabilities found
Has known vulnerabilities