CodeBase for Paper: "Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers", / Interactive Demo @
☆83May 1, 2023Updated 2 years ago
Alternatives and similar repositories for deepWordBug
Users that are interested in deepWordBug are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency☆78Mar 24, 2023Updated 3 years ago
- EMNLP BlackBox NLP 2020: Searching for a Search Method: Benchmarking Search Algorithms for Generating NLP Adversarial Examples☆26Oct 11, 2020Updated 5 years ago
- Implementation code for the paper "Generating Natural Language Adversarial Examples"☆171Aug 30, 2019Updated 6 years ago
- A white box algorithm that generate adversarial examples according to the gradient☆11May 9, 2020Updated 5 years ago
- exploiting and defending neural networks(神经网络攻防专栏)☆15Mar 2, 2021Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- 👿→😈☆25Dec 19, 2017Updated 8 years ago
- ☆10Jun 23, 2018Updated 7 years ago
- ACL 2021 - Defense against Adversarial Attacks in NLP via Dirichlet Neighborhood Ensemble☆17Jun 12, 2023Updated 2 years ago
- Must-read Papers on Textual Adversarial Attack and Defense☆1,570Jun 4, 2025Updated 10 months ago
- Library and experiments for attacking machine learning in discrete domains☆47Dec 8, 2022Updated 3 years ago
- ☆11Apr 23, 2020Updated 5 years ago
- Generating Natural Adversarial Examples, ICLR 2018☆142May 17, 2018Updated 7 years ago
- Plausible looking adversarial examples for text classification☆94Dec 16, 2018Updated 7 years ago
- TextAttack 🐙 is a Python framework for adversarial attacks, data augmentation, and model training in NLP https://textattack.readthedocs…☆3,398Jul 10, 2025Updated 9 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Python implementation of Sap et al.'s gender prediction algorithm for Twitter.☆12Apr 7, 2018Updated 8 years ago
- Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks☆24Dec 11, 2020Updated 5 years ago
- A Model for Natural Language Attack on Text Classification and Inference☆530Dec 8, 2022Updated 3 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- Code for ACL2018 HotFlip: White-Box Adversarial Examples for Text Classification, Word-level Adversarial Examples☆41Apr 20, 2019Updated 6 years ago
- Code for ACL'20 paper "It's Morphin' Time! Combating Linguistic Discrimination with Inflectional Perturbations"☆19May 1, 2025Updated 11 months ago
- ☆12May 26, 2025Updated 10 months ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- The official code to reproduce results from the NACCL2019 paper: White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks☆12Jun 4, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- VizSec17: Web-based visualization tool for adversarial machine learning / LiveDemo☆130May 1, 2023Updated 2 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- This script extracts the reviews from a given app store, it uses non-specific CSS selectors to prevent malfunctions in the future.☆10Oct 19, 2019Updated 6 years ago
- Implementation of HAN for Sentiment Classification task from paper "Hierarchical Attention Networks for Document Classification"☆13Aug 5, 2019Updated 6 years ago
- ☆62Sep 29, 2017Updated 8 years ago
- ☆21Dec 25, 2023Updated 2 years ago
- Adversarial examples for Seq2Seq model in NLP☆40Nov 3, 2018Updated 7 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- Universal Adversarial Triggers for Attacking and Analyzing NLP (EMNLP 2019)☆298Jul 25, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆21Jun 24, 2022Updated 3 years ago
- Heatmap of multiclass confusion matrix☆11Sep 11, 2019Updated 6 years ago
- Neural Networks exam project. Machine learning algorithm: implementation of FGSM and JSMA attacks by Goodfellow and Papernot.☆16Jan 13, 2026Updated 2 months ago
- Generate adversarial text via gradient methods☆30Mar 16, 2019Updated 7 years ago
- C compiler using antlr4 with cpp backend and using llvm for code generation☆10Dec 22, 2017Updated 8 years ago
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆29Feb 1, 2022Updated 4 years ago
- paper code☆28Oct 5, 2020Updated 5 years ago