-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathmain_attack.py
59 lines (41 loc) · 2.42 KB
/
main_attack.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
import os
import breaching
import torch
from custom_dataset import CustomData
from torchvision import utils as uts
import logging, sys
logging.basicConfig(level=logging.INFO, handlers=[logging.StreamHandler(sys.stdout)], format='%(message)s')
logger = logging.getLogger()
if __name__ == '__main__':
cfg = breaching.get_config(overrides=["case=custom_imagenet", "attack=our_res34_pretrained"])
device = torch.device(f'cuda') if torch.cuda.is_available() else torch.device('cpu')
torch.backends.cudnn.benchmark = cfg.case.impl.benchmark
setup = dict(device=device, dtype=getattr(torch, cfg.case.impl.dtype))
# print(setup)
cfg.case.data.partition = 'balanced'
cfg.case.user.user_idx = 0
cfg.case.model = "resnet34"
cfg.case.user.provide_labels=False
cfg.case.user.provide_buffers=False
cfg.case.server.provide_public_buffers=True
cfg.case.server.pretrained=True
user, server, model, loss_fn = breaching.cases.construct_case(cfg.case, setup)
attacker_loss = torch.nn.CrossEntropyLoss()
attacker = breaching.attacks.prepare_attack(server.model, attacker_loss, cfg.attack, setup)
breaching.utils.overview(server, user, attacker)
server_payload = server.distribute_payload()
if not os.path.exists(cfg.attack.save_dir):
os.mkdir(cfg.attack.save_dir)
cus_data = CustomData(data_dir='custom_data/victim_data/', dataset_name='ImageNet', number_data_points=cfg.case.user.num_data_points)
shared_data, true_user_data = user.compute_local_updates(server_payload, custom_data=cus_data.process_data())
true_pat = cfg.attack.save_dir + 'a_truth.jpg'
cus_data.save_recover(true_user_data, save_pth=true_pat)
if 'labels' in true_user_data.keys():
true_lab = true_user_data['labels'].cpu().tolist()
print(f'-----True labels {true_lab}--------------')
reconstructed_user_data, stats = attacker.reconstruct([server_payload], [shared_data], {}, dryrun=cfg.dryrun, custom=cus_data)
recon_path__ = 'custom_data/recons/final_rec.jpg' if "save_dir" not in cfg.attack.keys() else cfg.attack.save_dir + 'final_rec.jpg'
cus_data.save_recover(reconstructed_user_data, true_user_data, recon_path__)
metrics = breaching.analysis.report(reconstructed_user_data, true_user_data, [server_payload],
server.model, order_batch=True, compute_full_iip=False,
cfg_case=cfg.case, setup=setup)