TextHide: Tackling Data Privacy in Language Understanding Tasks
☆31Apr 19, 2021Updated 4 years ago
Alternatives and similar repositories for TextHide
Users that are interested in TextHide are comparing it to the libraries listed below
Sorting:
- ☆16Sep 8, 2021Updated 4 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Nov 11, 2020Updated 5 years ago
- ☆25Nov 21, 2020Updated 5 years ago
- ☆19Jun 21, 2021Updated 4 years ago
- Code for the WWW'23 paper "Sanitizing Sentence Embeddings (and Labels) for Local Differential Privacy"☆12Feb 20, 2023Updated 3 years ago
- ☆19Mar 9, 2024Updated 2 years ago
- ☆21May 11, 2022Updated 3 years ago
- INCREASE: Inductive Graph Representation Learning for Spatio-Temporal Kriging☆18Apr 6, 2023Updated 2 years ago
- FedGS: Federated Graph-based Sampling with Arbitrary Client Availability, arxiv.org/abs/2211.13975) was accepted by AAAI 2023 Conference.☆17Jan 4, 2023Updated 3 years ago
- A challenge to investigate the security of the InstaHide protocol.☆12Dec 7, 2020Updated 5 years ago
- ☆10Apr 21, 2022Updated 3 years ago
- ☆78May 28, 2022Updated 3 years ago
- A method for training neural networks that are provably robust to adversarial attacks. [IJCAI 2019]☆10Sep 3, 2019Updated 6 years ago
- [ICLR 2025] On Evluating the Durability of Safegurads for Open-Weight LLMs☆13Jun 20, 2025Updated 9 months ago
- ☆18Jul 1, 2021Updated 4 years ago
- Target Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning☆10Jul 2, 2019Updated 6 years ago
- Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)☆142Sep 22, 2025Updated 5 months ago
- ☆27Nov 20, 2023Updated 2 years ago
- A transformer model that should be able to solve a simple NER task☆11Mar 7, 2019Updated 7 years ago
- The code reproduces the results of the experiments in the paper. In particular, it performs experiments in which machine-learning models …☆20Aug 16, 2021Updated 4 years ago
- Robust aggregation for federated learning with the RFA algorithm.☆54Sep 13, 2022Updated 3 years ago
- Distributional Shapley: A Distributional Framework for Data Valuation☆30May 1, 2024Updated last year
- A collection of beautiful plots, and other data visualization stuff.☆15Jan 8, 2022Updated 4 years ago
- ☆11Mar 6, 2022Updated 4 years ago
- template for https://cnli.me☆10Feb 27, 2025Updated last year
- Federated Learning package☆21Aug 16, 2021Updated 4 years ago
- Implementation of the paper "Deep Indexed Active Learning for Matching Heterogeneous Entity Representations"☆17Dec 20, 2021Updated 4 years ago
- CaPC is a method that enables collaborating parties to improve their own local heterogeneous machine learning models in a setting where b…☆26Mar 16, 2022Updated 4 years ago
- Code for Findings of ACL 2021 "Differential Privacy for Text Analytics via Natural Text Sanitization"☆32Mar 15, 2022Updated 4 years ago
- Code for "Preference Tuning For Toxicity Mitigation Generalizes Across Languages." Paper accepted at Findings of EMNLP 2024☆18Mar 25, 2025Updated 11 months ago
- Distribution of word meanings in Wikipedia for English, Italian, French, German and Spanish.☆10Jan 4, 2021Updated 5 years ago
- ☆27Dec 15, 2022Updated 3 years ago
- R-GAP: Recursive Gradient Attack on Privacy [Accepted at ICLR 2021]☆37Feb 20, 2023Updated 3 years ago
- ☆39May 19, 2023Updated 2 years ago
- The code and data for "Are Large Pre-Trained Language Models Leaking Your Personal Information?" (Findings of EMNLP '22)☆28Oct 31, 2022Updated 3 years ago
- This is the official implementation of the IJCAI 2024 paper "FedPFT: Federated Proxy Fine-Tuning of Foundation Models".☆26Apr 28, 2024Updated last year
- A rangeset utility for python☆14Dec 12, 2023Updated 2 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- Unofficial PyTorch implementation of DALL-E 2 by OpenAI☆10Apr 6, 2022Updated 3 years ago