Platform guide
...
Artifacts
Defense Model
2 min
you can download the defense model itself it will include the following files app py app log py config yaml defense model h5 defense model onnx deployment yaml docker compose yaml dockerfile predict py readme txt app py the core application logic for the defense model app log py a logging module for effective monitoring config yaml a configuration file for customizing the defense model settings defense model h5 the defense model itself in hdf5 format defense model onnx an alternative format of the defense model in onnx deployment yaml if you plan to deploy on kubernetes, this configuration file is included docker compose yaml for docker container deployment, this file is provided dockerfile required for building the docker image predict py a script to make predictions using the defense model readme txt comprehensive documentation with instructions you can view the https //monitor aws boschaishield com/?job id=gaaaaabkekl gfuizu8xyr0wpely9lbpy2yj0bxopc1dfv8a09vxoiirxy6yzdjh4pzem rls9fjvh4r8omaffhvelx1bhxqpq%3d%3d to view all the artifacts to see sample defense model for respective attack types, refer the below table input type defense model image classification https //aisdocs blob core windows net/reference/defensemodel/image/imageclassification/mea/defencemodel zip https //aisdocs blob core windows net/reference/defensemodel/image/imageclassification/evasion/defencemodel zip object detection https //aisdocs blob core windows net/reference/reports/image/objectdetection/evasion/defensereport pdf tabular classification https //aisdocs blob core windows net/reference/defensemodel/tabular/tabularclassification/mea/defencemodel zip , https //aisdocs blob core windows net/reference/defensemodel/tabular/tabularclassification/evasion/defencemodel zip time series forecasting https //aisdocs blob core windows net/reference/defensemodel/timeseries/forecasting/mea/dl/defencemodel zip explore our detailed deployment guide at docid\ sw dnk8pikzpfnrexkfpa for step by step instructions on deploying the defense model
