From 4f70659ba52b69ca21ce88781f0ce2f7f4d038ae Mon Sep 17 00:00:00 2001 From: Jestine Paul Date: Tue, 15 Jul 2025 15:27:34 +0800 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 4ad29022..64857db2 100755 --- a/README.md +++ b/README.md @@ -126,7 +126,7 @@ You should go to the `./resource` folder to generate the trigger for training. 2. Backdoor training ``` -python ./attack/badnet.py --yaml_path ../config/attack/prototype/cifar10.yaml --patch_mask_path ../resource/badnet/trigger_image.png --save_folder_name badnet_0_1 +python ./attack/badnet.py --yaml_path ./config/attack/prototype/cifar10.yaml --patch_mask_path ./resource/badnet/trigger_image.png --save_folder_name badnet_0_1 ``` After attack you will get a folder with all files saved in `./record/`, including `attack_result.pt` for attack model and backdoored data, which will be used by following defense methods. If you want to change the args, you can both specify them in command line and in corresponding YAML config file (eg. [default.yaml](./config/attack/badnet/default.yaml)).(They are the defaults we used if no args are specified in command line.)