OpenAttack
Home
Getting Started
Introduction
Installation
Examples
Example 1: Basic Usage
Example 2: Customized Victim Model
Example 3: Customized Attack Model
Example 4: Customized Measurement
Example 5: Adversarial Training
Example 6: Attacks on Chinese Dataset
Modules
DataManager
Attacker
Substitute
Metric
TextProcessor
AttackEval
Victim
utils
Data
AttackAssist
TProcess
Victim
Attackers API
Attacker
ClassificationAttacker
BAEAttacker
BERTAttacker
DeepWordBugAttacker
FDAttacker
GANAttacker
GEOAttacker
GeneticAttacker
HotFlipAttacker
PSOAttacker
PWWSAttacker
SCPNAttacker
TextBuggerAttacker
TextFoolerAttacker
UATAttacker
VIPERAttacker
Attackers API
¶
Attacker
¶
ClassificationAttacker
¶
BAEAttacker
¶
BERTAttacker
¶
DeepWordBugAttacker
¶
FDAttacker
¶
GANAttacker
¶
GEOAttacker
¶
GeneticAttacker
¶
HotFlipAttacker
¶
PSOAttacker
¶
PWWSAttacker
¶
SCPNAttacker
¶
TextBuggerAttacker
¶
TextFoolerAttacker
¶
UATAttacker
¶
VIPERAttacker
¶