''' ART Gradio Example App [Evasion] To run: - clone the repository - execute: gradio examples/gradio_app.py or python examples/gradio_app.py - navigate to local URL e.g. http://127.0.0.1:7860 ''' import gradio as gr import numpy as np from carbon_theme import Carbon import numpy as np import torch import transformers from art.estimators.classification.hugging_face import HuggingFaceClassifierPyTorch from art.attacks.evasion import ProjectedGradientDescentPyTorch, AdversarialPatchPyTorch from art.utils import load_dataset from art.attacks.poisoning import PoisoningAttackBackdoor from art.attacks.poisoning.perturbations import insert_image device = torch.device('cuda' if torch.cuda.is_available() else 'cpu') css = """ .custom-text { --text-md: 20px !important; --text-sm: 18px !important; --block-info-text-size: var(--text-sm); --block-label-text-size: var(--text-sm); --block-title-text-size: var(--text-md); --body-text-size: var(--text-md); --button-small-text-size: var(--text-md); --checkbox-label-text-size: var(--text-md); --input-text-size: var(--text-md); --prose-text-size: var(--text-md); --section-header-text-size: var(--text-md); } .input-image { margin: auto !important } .plot-padding { padding: 20px; } .eta-bar.svelte-1occ011.svelte-1occ011 { background: #ccccff !important; } .center-text { text-align: center !important } .larger-gap { gap: 100px !important; } .symbols { text-align: center !important; margin: auto !important; } div.svelte-15lo0d8>*, div.svelte-15lo0d8>.form > * { min-width: 0px !important; } """ def sample_CIFAR10(): label_names = [ 'airplane', 'automobile', 'bird', 'cat', 'deer', 'dog', 'frog', 'horse', 'ship', 'truck', ] (x_train, y_train), (_, _), _, _ = load_dataset('cifar10') x_train = np.transpose(x_train, (0, 3, 1, 2)).astype(np.float32) y_train = np.argmax(y_train, axis=1) gallery_out = [] for i, im in enumerate(x_train[:10]): gallery_out.append((im.transpose(1,2,0), label_names[y_train[i]])) return gallery_out def clf_evasion_evaluate(*args): ''' Run a classification task evaluation ''' attack = args[0] attack_max_iter = args[1] attack_eps = args[2] attack_eps_steps = args[3] x_location = args[4] y_location = args[5] patch_height = args[6] patch_width = args[7] model = transformers.AutoModelForImageClassification.from_pretrained( 'facebook/deit-tiny-distilled-patch16-224', ignore_mismatched_sizes=True, num_labels=10 ) upsampler = torch.nn.Upsample(scale_factor=7, mode='nearest') optimizer = torch.optim.Adam(model.parameters(), lr=1e-4) loss_fn = torch.nn.CrossEntropyLoss() hf_model = HuggingFaceClassifierPyTorch( model=model, loss=loss_fn, optimizer=optimizer, input_shape=(3, 32, 32), nb_classes=10, clip_values=(0, 1), processor=upsampler ) model_checkpoint_path = './state_dicts/deit_cifar_base_model.pt' hf_model.model.load_state_dict(torch.load(model_checkpoint_path, map_location=device)) (x_train, y_train), (_, _), _, _ = load_dataset('cifar10') x_train = np.transpose(x_train, (0, 3, 1, 2)).astype(np.float32) y_train = np.argmax(y_train, axis=1) classes = np.unique(y_train) samples_per_class = 1 x_subset = [] y_subset = [] for c in classes: indices = y_train == c x_subset.append(x_train[indices][:samples_per_class]) y_subset.append(y_train[indices][:samples_per_class]) x_subset = np.concatenate(x_subset) y_subset = np.concatenate(y_subset) label_names = [ 'airplane', 'automobile', 'bird', 'cat', 'deer', 'dog', 'frog', 'horse', 'ship', 'truck', ] outputs = hf_model.predict(x_subset) clean_preds = np.argmax(outputs, axis=1) clean_acc = np.mean(clean_preds == y_subset) benign_gallery_out = [] for i, im in enumerate(x_subset): benign_gallery_out.append(( im.transpose(1,2,0), label_names[np.argmax(outputs[i])] )) if attack == "PGD": attacker = ProjectedGradientDescentPyTorch(hf_model, max_iter=attack_max_iter, eps=attack_eps, eps_step=attack_eps_steps) x_adv = attacker.generate(x_subset) outputs = hf_model.predict(x_adv) adv_preds = np.argmax(outputs, axis=1) adv_acc = np.mean(adv_preds == y_subset) adv_gallery_out = [] for i, im in enumerate(x_adv): adv_gallery_out.append(( im.transpose(1,2,0), label_names[np.argmax(outputs[i])] )) delta = ((x_subset - x_adv) + attack_eps) * 10 # shift to 0 and make perturbations 10x larger to visualise them if delta.max()>1: delta = (delta-np.min(delta))/(np.max(delta)-np.min(delta)) delta[delta>1] = 1 delta[delta<0] = 0 delta_gallery_out = delta.transpose(0, 2, 3, 1) if attack == "Adversarial Patch": scale_min = 0.3 scale_max = 1.0 rotation_max = 0 learning_rate = 5000. attacker = AdversarialPatchPyTorch(hf_model, scale_max=scale_max, scale_min=scale_min, rotation_max=rotation_max, learning_rate=learning_rate, max_iter=attack_max_iter, patch_type='square', patch_location=(x_location, y_location), patch_shape=(3, patch_height, patch_width)) patch, _ = attacker.generate(x_subset) x_adv = attacker.apply_patch(x_subset, scale=0.3) outputs = hf_model.predict(x_adv) adv_preds = np.argmax(outputs, axis=1) adv_acc = np.mean(adv_preds == y_subset) adv_gallery_out = [] for i, im in enumerate(x_adv): adv_gallery_out.append(( im.transpose(1,2,0), label_names[np.argmax(outputs[i])] )) delta_gallery_out = np.expand_dims(patch, 0).transpose(0,2,3,1) return benign_gallery_out, adv_gallery_out, delta_gallery_out, clean_acc, adv_acc def show_params(type): ''' Show model parameters based on selected model type ''' if type!="Example": return gr.Column(visible=True) return gr.Column(visible=False) head = '''''' # e.g. To use a local alternative theme: carbon_theme = Carbon() carbon_theme = Carbon() with gr.Blocks(css=css, head=head, theme='Tshackelton/IBMPlex-DenseReadable') as demo: import art text = art.__version__ with gr.Row(elem_classes="custom-text"): with gr.Column(scale=1,): gr.Image(value="./art_lfai.png", show_label=False, show_download_button=False, width=100, show_share_button=False) with gr.Column(scale=2): gr.Markdown(f"
âšī¸ Red-teaming in AI is an activity where we masquerade as evil attackers đ and attempt to find vulnerabilities in our AI models. Identifying scenarios where our AI models do not work as expected, or fail, is important as it helps us better understand its limitations and vulnerability when deployed in the real world đ§
''') gr.Markdown('''âšī¸ By attacking our AI models ourselves, we can better the risks associated with use in the real world and implement mechanisms which can mitigate and protect our model. The example below demonstrates a common red-team workflow to assess model vulnerability to evasion attacks âī¸
''') gr.Markdown('''Check out the full suite of features provided by ART here. To dive further into evasion attacks with Hugging Face and ART, check out our notebook. Also feel free to contribute and give our repo a â.
''') gr.Markdown('''''') gr.Markdown('''âšī¸ First lets set the scene. You have a dataset of images, such as CIFAR-10.
''') gr.Markdown('''Note: CIFAR-10 images are low resolution images which span 10 different categories as shown.
''') gr.Markdown('''âšī¸ Your goal is to have an AI model capable of classifying these images. So you train a model on this dataset, or use a pre-trained model from Hugging Face, such as Meta's Distilled Data-efficient Image Transformer.
''') with gr.Column(scale=1): gr.Markdown('''Hugging Face dataset: CIFAR-10
CIFAR-10 labels: {airplane, automobile, bird, cat, deer, dog, frog, horse, ship, truck}
Hugging Face model:
facebook/deit-tiny-distilled-patch16-224
đ take a look at the sample images from the CIFAR-10 dataset and their respective labels.
''') with gr.Column(scale=1): gr.Gallery(label="CIFAR-10", preview=True, value=sample_CIFAR10(), height=420) gr.Markdown('''âšī¸ Now as a responsible AI expert, you wish to assert that your model is not vulnerable to attacks which might manipulate the prediction. For instance, ships become classified as birds. To do this, you will deploy adversarial attacks against your own model and assess its performance.
''') gr.Markdown('''âšī¸ Below are two common types of evasion attack. Both create adversarial images, which at first glance, seem the same as the original images, however they contain subtle changes which cause the AI model to make incorrect predictions.
The unmodified, original CIFAR-10 images, with model predictions.
Visual representation of the calculated perturbations for attacking the model (black pixels indicate little to no perturbation).
''') delta_gallery = gr.Gallery(label="Added perturbation", preview=False, show_download_button=True) with gr.Column(scale=1, min_width='0px'): gr.Markdown('''đ°''', elem_classes='symbols') with gr.Column(scale=10): gr.Markdown('''The original image (with optimized perturbations applied) gives us an adversarial image which fools the model.
''') adversarial_gallery = gr.Gallery(label="Adversarial", preview=False, show_download_button=True) adversarial_output = gr.Label(num_top_classes=3, visible=False) robust_accuracy = gr.Number(label="Robust Accuracy", precision=2) bt_eval_pgd.click(clf_evasion_evaluate, inputs=[attack, max_iter, eps, eps_steps, attack, attack, attack, attack], outputs=[original_gallery, adversarial_gallery, delta_gallery, clean_accuracy, robust_accuracy]) gr.Markdown('''The unmodified, original CIFAR-10 images, with model predictions.
Visual representation of the optimized patch for attacking the model.
The original image (with optimized perturbations applied) gives us an adversarial image which fools the model.
''') adversarial_gallery = gr.Gallery(label="Adversarial", preview=False, show_download_button=True) robust_accuracy = gr.Number(label="Robust Accuracy", precision=2) eval_btn_patch.click(clf_evasion_evaluate, inputs=[attack, max_iter, eps, eps_steps, x_location, y_location, patch_height, patch_width], outputs=[original_gallery, adversarial_gallery, delta_gallery, clean_accuracy, robust_accuracy]) gr.Markdown('''