A Query Efficient Natural Language Attack in a Black Box Setting
☆17Sep 23, 2021Updated 4 years ago
Alternatives and similar repositories for query-attack
Users that are interested in query-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [NAACL 2022] "SemAttack: Natural Textual Attacks via Different Semantic Spaces" by Boxin Wang, Chejian Xu, Xiangyu Liu, Yu Cheng, Bo Li☆21Jun 11, 2022Updated 3 years ago
- Code base for the EMNLP 2021 paper, "Multi-granularity Textual Adversarial Attack with Behavior Cloning".☆13Apr 18, 2022Updated 3 years ago
- ☆10Oct 28, 2020Updated 5 years ago
- Contextualized Perturbation for Textual Adversarial Attack, NAACL 2021☆44Jul 23, 2021Updated 4 years ago
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Code and data of the ACL 2020 paper "Word-level Textual Adversarial Attacking as Combinatorial Optimization"☆88Apr 11, 2021Updated 4 years ago
- For easy metric logging and visualization☆14Jan 31, 2025Updated last year
- Natural Language Attacks in a Hard Label Black Box Setting.☆50May 26, 2021Updated 4 years ago
- ☆25May 6, 2021Updated 4 years ago
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated last year
- ☆14Dec 23, 2022Updated 3 years ago
- Generating Adversarial Examples for Holding Robustness of Source Code Processing Models☆15Dec 2, 2021Updated 4 years ago
- Code for "Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes"☆15Dec 20, 2020Updated 5 years ago
- ChatGPT solutions for the MLE interview☆14Dec 9, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆16Jul 19, 2022Updated 3 years ago
- SAFER: A Structure-free Approach For cErtified Robustness to Adversarial Word Substitutions (ACL 2020)☆31Jan 27, 2021Updated 5 years ago
- ☆11Oct 29, 2024Updated last year
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Codes for paper "LexicalAT: Lexical-Based Adversarial Reinforcement Training for Robust Sentiment Classification"☆16Oct 30, 2019Updated 6 years ago
- This repository is used to store recording about papers and presentations readed.☆18Aug 8, 2024Updated last year
- ☆14Jul 14, 2019Updated 6 years ago
- The code for the paper titled as "DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature Space".☆23Feb 10, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 恶意软件家族样本识别/分类器☆13Aug 26, 2021Updated 4 years ago
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 2 years ago
- 对抗训练在NLP中的应用☆14Nov 22, 2021Updated 4 years ago
- CVPR'19 experiments with (on-manifold) adversarial examples.☆43Feb 27, 2020Updated 6 years ago
- Language Model Baselines for PyTorch☆41Aug 18, 2020Updated 5 years ago
- 学习笔记☆18Oct 19, 2019Updated 6 years ago
- A repository for the query-efficient black-box attack, SignHunter☆22Jan 15, 2020Updated 6 years ago
- ☆20Jun 24, 2022Updated 3 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Python and scala code for smote algorithm that work on spark data-frame☆15Jan 11, 2018Updated 8 years ago
- Disconnected Manifold Learning for Generative Adversarial Networks.☆13Jan 10, 2019Updated 7 years ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- MoonBit 社区任务列表☆31Apr 27, 2025Updated 11 months ago
- Implementation of FoldMark: Safeguarding Protein Structure Generative Models with Distributional and Evolutionary Watermarking☆24Jul 3, 2025Updated 8 months ago
- Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.☆15Sep 7, 2023Updated 2 years ago
- ☆20Sep 9, 2024Updated last year