-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
real sample generation #32
Comments
Hello! Are you using the tutorial that I have developed, or custom code? |
Yes, I am using the tutorial that I have developed. no execution error is there only real sample's size not increasing. following is the code import os from secml_malware.attack.whitebox import CKreukEvasion net = MalConv() partial_dos = CPaddingEvasion(net, how_many=256,iterations=50,is_debug= False,random_init= False,threshold=0.50,penalty_regularizer= 0) folder = "secml_malware/data/malware_samples/test_folder" for sample, label in zip(X, y): folder1 = "secml_malware/data/malware_samples/test_folder/padding" print(file_names[0])print(len(real_adv_x))
|
Ok thank you, I'll investigate. |
Well, if you call the |
Thank you |
I am generating real samples using sec_malware library, working on white-box padding attack but the generated adversarial samples are same in size with the original one.
![Screenshot from 2022-04-25 12-26-40](https://user-images.githubusercontent.com/104344823/165036978-13ef06a1-8b64-4f0c-8e13-be0c98fc34ae.png)
![Screenshot from 2022-04-25 12-27-20](https://user-images.githubusercontent.com/104344823/165037012-c2561eb4-ffc5-4a20-a39b-2999afe0871f.png)
please suggest if any changes are required in code
The text was updated successfully, but these errors were encountered: