Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency
☆79Mar 24, 2023Updated 3 years ago
Alternatives and similar repositories for PWWS
Users that are interested in PWWS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation code for the paper "Generating Natural Language Adversarial Examples"☆171Aug 30, 2019Updated 6 years ago
- CodeBase for Paper: "Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers", / Interactive Demo @☆83May 1, 2023Updated 2 years ago
- Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks☆24Dec 11, 2020Updated 5 years ago
- Code for "Semantically Equivalent Adversarial Rules for Debugging NLP Models"☆88Oct 16, 2018Updated 7 years ago
- Code and data of the ACL 2020 paper "Word-level Textual Adversarial Attacking as Combinatorial Optimization"☆88Apr 11, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Model for Natural Language Attack on Text Classification and Inference☆530Dec 8, 2022Updated 3 years ago
- Natural Language Attacks in a Hard Label Black Box Setting.☆50May 26, 2021Updated 4 years ago
- An Open-Source Package for Textual Adversarial Attack.☆772Jul 20, 2023Updated 2 years ago
- Must-read Papers on Textual Adversarial Attack and Defense☆1,572Jun 4, 2025Updated 10 months ago
- ACL 2021 - Defense against Adversarial Attacks in NLP via Dirichlet Neighborhood Ensemble☆17Jun 12, 2023Updated 2 years ago
- Code for ACL2018 HotFlip: White-Box Adversarial Examples for Text Classification, Word-level Adversarial Examples☆41Apr 20, 2019Updated 6 years ago
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆32Jul 11, 2022Updated 3 years ago
- Adversarial examples for Seq2Seq model in NLP☆40Nov 3, 2018Updated 7 years ago
- Official repository for Jia, Raghunathan, Göksel, and Liang, "Certified Robustness to Adversarial Word Substitutions" (EMNLP 2019)☆38Dec 30, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- SAFER: A Structure-free Approach For cErtified Robustness to Adversarial Word Substitutions (ACL 2020)☆31Jan 27, 2021Updated 5 years ago
- ☆10May 18, 2022Updated 3 years ago
- IsoBN: Fine-Tuning BERT with Isotropic Batch Normalization☆12Nov 23, 2021Updated 4 years ago
- Code for EMNLP2020 long paper: BERT-Attack: Adversarial Attack Against BERT Using BERT☆206Sep 22, 2020Updated 5 years ago
- Code for ACL'20 paper "It's Morphin' Time! Combating Linguistic Discrimination with Inflectional Perturbations"☆19May 1, 2025Updated 11 months ago
- Counter-fitting Word Vectors to Linguistic Constraints☆145Mar 26, 2020Updated 6 years ago
- ☆21Jun 3, 2021Updated 4 years ago
- codes for "Searching for an Effective Defender:Benchmarking Defense against Adversarial Word Substitution"☆31Oct 27, 2023Updated 2 years ago
- A2T: Towards Improving Adversarial Training of NLP Models (EMNLP 2021 Findings)☆27Sep 12, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Code and data for "Impact of Evaluation Methodologies on Code Summarization" in ACL 2022.☆10Sep 6, 2022Updated 3 years ago
- ☆32May 26, 2021Updated 4 years ago
- CoSDA-ML: Multi-Lingual Code-Switching Data Augmentation for Zero-Shot Cross-Lingual NLP☆53May 27, 2022Updated 3 years ago
- ☆12Mar 7, 2021Updated 5 years ago
- ☆14Jul 13, 2022Updated 3 years ago
- [NAACL 2022] "SemAttack: Natural Textual Attacks via Different Semantic Spaces" by Boxin Wang, Chejian Xu, Xiangyu Liu, Yu Cheng, Bo Li☆21Jun 11, 2022Updated 3 years ago
- Source code for "Improving Robustness of Neural Machine Translation with Multi-task Learning"☆19Aug 15, 2019Updated 6 years ago
- This repository contains a simple implementation of Interval Bound Propagation (IBP) using TensorFlow: https://arxiv.org/abs/1810.12715☆161Dec 20, 2019Updated 6 years ago
- The official code to reproduce results from the NACCL2019 paper: White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks☆12Jun 4, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Adversarial Training for Natural Language Understanding☆253Sep 6, 2023Updated 2 years ago
- ☆21Oct 13, 2021Updated 4 years ago
- Generate adversarial text via gradient methods☆30Mar 16, 2019Updated 7 years ago
- syntactically controlled paraphrase networks☆168Dec 30, 2018Updated 7 years ago
- Code for Interpretable Adversarial Perturbation in Input Embedding Space for Text, IJCAI 2018.☆42Feb 27, 2020Updated 6 years ago
- Adversarial Robustness for Code☆16Mar 30, 2021Updated 5 years ago
- Universal Adversarial Triggers for Attacking and Analyzing NLP (EMNLP 2019)☆298Jul 25, 2024Updated last year