CodeBase for Paper: "Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers", / Interactive Demo @
☆82May 1, 2023Updated 2 years ago
Alternatives and similar repositories for deepWordBug
Users that are interested in deepWordBug are comparing it to the libraries listed below
Sorting:
- Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency☆76Mar 24, 2023Updated 2 years ago
- Implementation code for the paper "Generating Natural Language Adversarial Examples"☆171Aug 30, 2019Updated 6 years ago
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆32Jul 11, 2022Updated 3 years ago
- ☆14Jul 14, 2019Updated 6 years ago
- A white box algorithm that generate adversarial examples according to the gradient☆11May 9, 2020Updated 5 years ago
- ACL 2021 - Defense against Adversarial Attacks in NLP via Dirichlet Neighborhood Ensemble☆18Jun 12, 2023Updated 2 years ago
- Must-read Papers on Textual Adversarial Attack and Defense☆1,574Jun 4, 2025Updated 9 months ago
- Library and experiments for attacking machine learning in discrete domains☆47Dec 8, 2022Updated 3 years ago
- ☆11Apr 23, 2020Updated 5 years ago
- Generating Natural Adversarial Examples, ICLR 2018☆142May 17, 2018Updated 7 years ago
- TextAttack 🐙 is a Python framework for adversarial attacks, data augmentation, and model training in NLP https://textattack.readthedocs…☆3,379Jul 10, 2025Updated 8 months ago
- Python implementation of Sap et al.'s gender prediction algorithm for Twitter.☆12Apr 7, 2018Updated 7 years ago
- Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks☆24Dec 11, 2020Updated 5 years ago
- A Model for Natural Language Attack on Text Classification and Inference☆530Dec 8, 2022Updated 3 years ago
- Code for ACL2018 HotFlip: White-Box Adversarial Examples for Text Classification, Word-level Adversarial Examples☆40Apr 20, 2019Updated 6 years ago
- ☆12May 26, 2025Updated 9 months ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- The official code to reproduce results from the NACCL2019 paper: White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks☆12Jun 4, 2019Updated 6 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- ☆62Sep 29, 2017Updated 8 years ago
- Contextualized Perturbation for Textual Adversarial Attack, NAACL 2021☆45Jul 23, 2021Updated 4 years ago
- ☆20Jun 24, 2022Updated 3 years ago
- Adversarial examples for Seq2Seq model in NLP☆40Nov 3, 2018Updated 7 years ago
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆21Oct 8, 2024Updated last year
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- ☆13Aug 31, 2024Updated last year
- Universal Adversarial Triggers for Attacking and Analyzing NLP (EMNLP 2019)☆301Jul 25, 2024Updated last year
- Neural Networks exam project. Machine learning algorithm: implementation of FGSM and JSMA attacks by Goodfellow and Papernot.☆16Jan 13, 2026Updated 2 months ago
- Generate adversarial text via gradient methods☆30Mar 16, 2019Updated 7 years ago
- to add☆20Nov 21, 2019Updated 6 years ago
- The repository includes an ongoing collection of Instagram Posts IDs correlated with the new coronavirus COVID-19.☆11May 3, 2020Updated 5 years ago
- ECML16: GaKCo: a Fast Gapped k-mer string Kernel using Counting☆14Aug 28, 2019Updated 6 years ago
- paper code☆28Oct 5, 2020Updated 5 years ago
- Reading data into tensorflow using tf.data function☆14Aug 28, 2019Updated 6 years ago
- ☆14Jul 11, 2019Updated 6 years ago
- FaCoY Code-to-Code Search Engine☆34Jan 18, 2019Updated 7 years ago
- Code for NeurIPS 2019 Paper☆48May 18, 2020Updated 5 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆111Sep 12, 2022Updated 3 years ago