Natural Language Attacks in a Hard Label Black Box Setting.
☆49May 26, 2021Updated 4 years ago
Alternatives and similar repositories for hard-label-attack
Users that are interested in hard-label-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- ACL 2021 - Defense against Adversarial Attacks in NLP via Dirichlet Neighborhood Ensemble☆17Jun 12, 2023Updated 2 years ago
- Code base for the EMNLP 2021 paper, "Multi-granularity Textual Adversarial Attack with Behavior Cloning".☆13Apr 18, 2022Updated 4 years ago
- Code and data of the ACL 2020 paper "Word-level Textual Adversarial Attacking as Combinatorial Optimization"☆88Apr 11, 2021Updated 5 years ago
- Contextualized Perturbation for Textual Adversarial Attack, NAACL 2021☆44Jul 23, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks☆24Dec 11, 2020Updated 5 years ago
- Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency☆81Mar 24, 2023Updated 3 years ago
- Official repository for Jia, Raghunathan, Göksel, and Liang, "Certified Robustness to Adversarial Word Substitutions" (EMNLP 2019)☆38Dec 30, 2019Updated 6 years ago
- ☆11Sep 10, 2024Updated last year
- Official repository for "On the Multi-modal Vulnerability of Diffusion Models"☆16Jul 15, 2024Updated last year
- Official PyTorch implementation of "Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian O…☆26Sep 26, 2023Updated 2 years ago
- codes for "Searching for an Effective Defender:Benchmarking Defense against Adversarial Word Substitution"☆31Oct 27, 2023Updated 2 years ago
- An Open-Source Package for Textual Adversarial Attack.☆775Jul 20, 2023Updated 2 years ago
- Must-read Papers on Textual Adversarial Attack and Defense☆1,572Jun 4, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Model for Natural Language Attack on Text Classification and Inference☆530Dec 8, 2022Updated 3 years ago
- TextAttack 🐙 is a Python framework for adversarial attacks, data augmentation, and model training in NLP https://textattack.readthedocs…☆3,409Apr 17, 2026Updated 3 weeks ago
- ☆28May 28, 2023Updated 2 years ago
- Implementation code for the paper "Generating Natural Language Adversarial Examples"☆171Aug 30, 2019Updated 6 years ago
- Counter-fitting Word Vectors to Linguistic Constraints☆145Mar 26, 2020Updated 6 years ago
- Python library providing a simple, fully supervised sentence embedding technique for textual adversarial attacks.☆13Dec 13, 2023Updated 2 years ago
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆27Aug 27, 2024Updated last year
- ☆10Jun 5, 2021Updated 4 years ago
- ☆10May 18, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆21Jun 24, 2022Updated 3 years ago
- ☆14May 8, 2024Updated 2 years ago
- ☆25May 6, 2021Updated 5 years ago
- Paper list of Adversarial Examples☆51Oct 12, 2023Updated 2 years ago
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc …☆12Feb 14, 2023Updated 3 years ago
- Code for EMNLP2020 long paper: BERT-Attack: Adversarial Attack Against BERT Using BERT☆207Sep 22, 2020Updated 5 years ago
- ☆14Aug 18, 2022Updated 3 years ago
- [CVPR 2025] Official implementation for JOOD "Playing the Fool: Jailbreaking LLMs and Multimodal LLMs with Out-of-Distribution Strategy"☆22Jun 11, 2025Updated 10 months ago
- ☆26Apr 15, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Repo for arXiv preprint "Gradient-based Adversarial Attacks against Text Transformers"☆111Dec 28, 2022Updated 3 years ago
- Code and data to go with the Zhu et al. paper "An Objective for Nuanced LLM Jailbreaks"☆36Apr 8, 2026Updated last month
- ESEC/FSE'21: Prediction-Preserving Program Simplification☆10Oct 4, 2022Updated 3 years ago
- BuGL - A Cross-Language Dataset for Bug Localization☆10Feb 8, 2020Updated 6 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Jan 30, 2019Updated 7 years ago
- Attack AlphaZero Go agents (NeurIPS 2022)☆22Dec 3, 2022Updated 3 years ago
- About Official PyTorch implementation of "Query-Efficient Black-Box Red Teaming via Bayesian Optimization" (ACL'23)☆15Jul 9, 2023Updated 2 years ago