Natural Language Attacks in a Hard Label Black Box Setting.
☆50May 26, 2021Updated 4 years ago
Alternatives and similar repositories for hard-label-attack
Users that are interested in hard-label-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- ACL 2021 - Defense against Adversarial Attacks in NLP via Dirichlet Neighborhood Ensemble☆18Jun 12, 2023Updated 2 years ago
- Code base for the EMNLP 2021 paper, "Multi-granularity Textual Adversarial Attack with Behavior Cloning".☆13Apr 18, 2022Updated 3 years ago
- Contextualized Perturbation for Textual Adversarial Attack, NAACL 2021☆44Jul 23, 2021Updated 4 years ago
- Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks☆24Dec 11, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency☆76Mar 24, 2023Updated 3 years ago
- Official repository for Jia, Raghunathan, Göksel, and Liang, "Certified Robustness to Adversarial Word Substitutions" (EMNLP 2019)☆38Dec 30, 2019Updated 6 years ago
- ☆11Sep 10, 2024Updated last year
- Official PyTorch implementation of "Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian O…☆26Sep 26, 2023Updated 2 years ago
- codes for "Searching for an Effective Defender:Benchmarking Defense against Adversarial Word Substitution"☆31Oct 27, 2023Updated 2 years ago
- Must-read Papers on Textual Adversarial Attack and Defense☆1,571Jun 4, 2025Updated 9 months ago
- A Query Efficient Natural Language Attack in a Black Box Setting☆17Sep 23, 2021Updated 4 years ago
- TextAttack 🐙 is a Python framework for adversarial attacks, data augmentation, and model training in NLP https://textattack.readthedocs…☆3,390Jul 10, 2025Updated 8 months ago
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Feb 27, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆27Aug 27, 2024Updated last year
- ☆10Jun 5, 2021Updated 4 years ago
- ☆20Jun 24, 2022Updated 3 years ago
- ☆48Jul 14, 2024Updated last year
- ☆25May 6, 2021Updated 4 years ago
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Feb 14, 2023Updated 3 years ago
- Implementation for EACL 2024 paper "Corpus-Steered Query Expansion with Large Language Models"☆12Mar 19, 2024Updated 2 years ago
- Code for EMNLP2020 long paper: BERT-Attack: Adversarial Attack Against BERT Using BERT☆206Sep 22, 2020Updated 5 years ago
- ☆26Apr 15, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Repo for arXiv preprint "Gradient-based Adversarial Attacks against Text Transformers"☆109Dec 28, 2022Updated 3 years ago
- Code and data to go with the Zhu et al. paper "An Objective for Nuanced LLM Jailbreaks"☆35Dec 18, 2024Updated last year
- ESEC/FSE'21: Prediction-Preserving Program Simplification☆10Oct 4, 2022Updated 3 years ago
- Tensorflow code for "Hierarchical Decompositional Mixtures of Variational Autoencoders" (ICML'19)☆12Jun 7, 2020Updated 5 years ago
- BuGL - A Cross-Language Dataset for Bug Localization☆10Feb 8, 2020Updated 6 years ago
- Cross-Project Transfer Representation Learning for Vulnerable Function Discovery☆35Jan 30, 2019Updated 7 years ago
- 👿→😈☆25Dec 19, 2017Updated 8 years ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Jun 29, 2021Updated 4 years ago
- ☆13Sep 11, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆59Jun 5, 2024Updated last year
- ☆35May 22, 2024Updated last year
- ☆15Oct 2, 2024Updated last year
- A list of recent adversarial attack and defense papers (including those on large language models)☆45Mar 18, 2026Updated last week
- All in How You Ask for It: Simple Black-Box Method for Jailbreak Attacks☆18Apr 24, 2024Updated last year
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆21Oct 8, 2024Updated last year
- ☆14Jul 13, 2022Updated 3 years ago