Platform guide
...
Analyze your models
Image
Image Segmentation
5min
the below input parameters are for different attack types to start working with the apis, see \<post> model analysis docid\ rprtabi5j w ppq9d w1r file upload format data the processed data, ready to be passed to the model for prediction, should be saved in a folder download sample data label a csv file should be created with two columns "image" and "label " the first column should contain the image name, and the second column should contain the label the label should be in integer format check sample label file attached downloab sample label model the model should be saved in either h5 or tensorflow format with full architecture full architecture is needed when loading the model to the platofrm for assessment either in encrypted or unencrypted this can be ignored when model is hosted as an api download sample model common parameters the below table parameters are common for extraction attack type parameter data type description remark model id string model id received during model registration we need to provide this model id in query parameter in url you have to do model registration only once for a model to perform model analysis this will help you track the no of api call made, and it's success metric request body (json format) normalize data string model trained on normalized data if model is trained on normalized data, then set this parameter as "yes" else "no" input dimensions string provide input dimension of the image the parameter should be string in the format "(height, weight, channel)" for example 28 28 1 number of classes string number of prediction classes the parameter should be string example 10 (range >0 & <=200) model framework string original model is built with tensorflow framework curretly supported framework are tensorflow, scikit learn, keras (option \[tensorflow]) extraction parameters parameter data type description remark request body (json format) attack type string you can select the attack type either blackbox or greybox blackbox for performing model analysis, no information about model or data will be used greybox information about data will be leverage for creation of attack data note only 2 5 % of data is needed number of attack queries string number of attack queries that model will be subjected to generally heigher the number of attack queries, better would be the analysis and it would take more time to process (range >0 & <=400000) vulnerability threshold string threshold percent of stolen model accuracy at which defense model should be generated threshold percent of stolen model accuracy at which defense model should be generated (range 0 0 1) model api details string if use model api is yes, then provide api details of hosted model as encrypted json string is mandatory provide this only if use model api is "yes" use model api string use model api to train your model instead of uploading the model as a zip file when this parameter is yes, you don't have to upload model as zip you can pass api url along with other verification credential in json file defense bestonly string choose to train your model until it achieves the best results or above 95% accuracy when selected "yes" , it will train n number of model and select best model ofcourse this will take longer time if "no" , then once defense model accuracy reached above 95% it will stop encryption strategy int choose a encryption strategy for you model if model is uploaded directly as a zip pick 0, 1 if model is encryted as pyc and uploaded as a zip ignore if use model api is yes select 0 pass tensorflow model as it is, select 1 pass encrypted model it could be pyc file to access all sample artifacts, please visit artifacts docid\ ijneocxostabvvrsq11fa for specific artifact details, refer vulnerability report vulnerability report docid\ hl0ut2mwlcbkt8f97fr w sample attacks sample attacks docid 4g1mjm5lqjfm8t5wbvwpr defense report defense report docid\ vtzlttpja2vsf2j0stlsq defense model defense model docid\ xsbxmzxw4vv14 8nmbf8m note for image segmentation, supported attack types are extraction