Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks
☆24Dec 11, 2020Updated 5 years ago
Alternatives and similar repositories for FGPM
Users that are interested in FGPM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency☆79Mar 24, 2023Updated 3 years ago
- Natural Language Attacks in a Hard Label Black Box Setting.☆50May 26, 2021Updated 4 years ago
- codes for "Searching for an Effective Defender:Benchmarking Defense against Adversarial Word Substitution"☆31Oct 27, 2023Updated 2 years ago
- ACL 2021 - Defense against Adversarial Attacks in NLP via Dirichlet Neighborhood Ensemble☆17Jun 12, 2023Updated 2 years ago
- [EMNLP 2020] "T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack" by Boxin Wang, Hengzhi Pei, Boyuan Pan, Q…☆25Oct 19, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆14Jul 13, 2022Updated 3 years ago
- codes for paper "learning to discriminate perturbations for blocking adversarial attacks in text classification" in EMNLP19☆15Feb 25, 2020Updated 6 years ago
- Contextualized Perturbation for Textual Adversarial Attack, NAACL 2021☆44Jul 23, 2021Updated 4 years ago
- Deep Variational Information Bottleneck (DVIB) in PyTorch.☆10Apr 25, 2020Updated 5 years ago
- Code for the paper "MMA Training: Direct Input Space Margin Maximization through Adversarial Training"☆34Apr 1, 2020Updated 6 years ago
- EMNLP BlackBox NLP 2020: Searching for a Search Method: Benchmarking Search Algorithms for Generating NLP Adversarial Examples☆26Oct 11, 2020Updated 5 years ago
- Code for ICML2019 Paper "On the Convergence and Robustness of Adversarial Training"☆34Apr 28, 2020Updated 5 years ago
- A Query Efficient Natural Language Attack in a Black Box Setting☆17Sep 23, 2021Updated 4 years ago
- Paper list of Adversarial Examples☆51Oct 12, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code base for the EMNLP 2021 paper, "Multi-granularity Textual Adversarial Attack with Behavior Cloning".☆13Apr 18, 2022Updated 3 years ago
- ☆11Mar 6, 2022Updated 4 years ago
- Code and data of the ACL 2020 paper "Word-level Textual Adversarial Attacking as Combinatorial Optimization"☆88Apr 11, 2021Updated 5 years ago
- Official repository for Jia, Raghunathan, Göksel, and Liang, "Certified Robustness to Adversarial Word Substitutions" (EMNLP 2019)☆38Dec 30, 2019Updated 6 years ago
- This repository contains the implementation of the paper: "Gear-NeRF: Free-Viewpoint Rendering and Tracking with Motion-aware Spatio-Tem…☆18Sep 4, 2024Updated last year
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆14Feb 28, 2024Updated 2 years ago
- A model named ATMOL for predicting molecular property☆10May 2, 2022Updated 3 years ago
- DILMA: Differentiable Language Model Adversarial Attacks on Categorical Sequence Classifiers☆12Oct 7, 2020Updated 5 years ago
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆32Jul 11, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This repository contains a simple implementation of Interval Bound Propagation (IBP) using TensorFlow: https://arxiv.org/abs/1810.12715☆161Dec 20, 2019Updated 6 years ago
- Code for EMNLP2020 long paper: BERT-Attack: Adversarial Attack Against BERT Using BERT☆206Sep 22, 2020Updated 5 years ago
- ☆14Jun 25, 2022Updated 3 years ago
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- Counter-fitting Word Vectors to Linguistic Constraints☆145Mar 26, 2020Updated 6 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- Natural Universal Trigger Search (NUTS)☆21Apr 17, 2021Updated 4 years ago
- An official PyTorch implementation of "Towards Robust Graph Neural Networks for Noisy Graphs with Sparse Labels" (WSDM 2022))☆34Jul 5, 2022Updated 3 years ago
- Implementation and evaluation of Almanac (Automaton/Logic Multi-Agent Natural Actor-Critic), an algorithm for multi-agent reinforcement l…☆10May 5, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆13Feb 5, 2025Updated last year
- ☆12Aug 8, 2019Updated 6 years ago
- Clustering using Deep Learning (T-SNE visualization of autoencoder embeddings )☆10Mar 3, 2019Updated 7 years ago
- ☆13Nov 20, 2023Updated 2 years ago
- Interpreting BERT with LIME and SHAP☆11Jun 12, 2023Updated 2 years ago
- UHop: An Unrestricted-Hop Relation Extraction Framework for Knowledge-Based Question Answering☆27Jul 25, 2023Updated 2 years ago
- Policy Transfer across Visual and Dynamics Domain Gaps via Iterative Grounding (RSS 2021)☆12Oct 22, 2021Updated 4 years ago