Platform guide
...
Image
Image Segmentation
5 min
the below input parameters are for different attack types to start working with the apis, see \<post> model analysis docid\ rprtabi5j w ppq9d w1r file upload format data the processed data, ready to be passed to the model for prediction, should be saved in a folder download sample data label a csv file should be created with two columns "image" and "label " the first column should contain the image name, and the second column should contain the label the label should be in integer format check sample label file attached downloab sample label model the model should be saved in either h5 or tensorflow format with full architecture full architecture is needed when loading the model to the platofrm for assessment either in encrypted or unencrypted this can be ignored when model is hosted as an api download sample model common parameters the below table parameters are common for extraction attack type 186,77,167,129 false true 1center false unhandled content type true center unhandled content type false center unhandled content type false center unhandled content type center false unhandled content type true center unhandled content type false center unhandled content type false center unhandled content type center false unhandled content type true center unhandled content type false center unhandled content type false center unhandled content type center false unhandled content type true center unhandled content type false center unhandled content type false center unhandled content type center false unhandled content type true center unhandled content type false center unhandled content type false center unhandled content type center false unhandled content type true center unhandled content type false center unhandled content type false center unhandled content type center false unhandled content type true center unhandled content type false center unhandled content type false center unhandled content type extraction parameters 186,77,167,129 false true false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type false unhandled content type to access all sample artifacts, please visit artifacts docid\ ijneocxostabvvrsq11fa for specific artifact details, refer vulnerability report vulnerability report docid\ hl0ut2mwlcbkt8f97fr w sample attacks sample attacks docid 4g1mjm5lqjfm8t5wbvwpr defense report defense report docid\ vtzlttpja2vsf2j0stlsq defense model defense model docid\ xsbxmzxw4vv14 8nmbf8m note for image segmentation, supported attack types are extraction