RishabhMaheshwary / query-attackView external linksLinks
A Query Efficient Natural Language Attack in a Black Box Setting
☆17Sep 23, 2021Updated 4 years ago
Alternatives and similar repositories for query-attack
Users that are interested in query-attack are comparing it to the libraries listed below
Sorting:
- [NAACL 2022] "SemAttack: Natural Textual Attacks via Different Semantic Spaces" by Boxin Wang, Chejian Xu, Xiangyu Liu, Yu Cheng, Bo Li☆21Jun 11, 2022Updated 3 years ago
- ☆10Oct 28, 2020Updated 5 years ago
- Contextualized Perturbation for Textual Adversarial Attack, NAACL 2021☆44Jul 23, 2021Updated 4 years ago
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- ACL 2021 - Defense against Adversarial Attacks in NLP via Dirichlet Neighborhood Ensemble☆18Jun 12, 2023Updated 2 years ago
- ☆18Apr 4, 2021Updated 4 years ago
- Natural Language Attacks in a Hard Label Black Box Setting.☆50May 26, 2021Updated 4 years ago
- Code and data of the ACL 2020 paper "Word-level Textual Adversarial Attacking as Combinatorial Optimization"☆88Apr 11, 2021Updated 4 years ago
- SAFER: A Structure-free Approach For cErtified Robustness to Adversarial Word Substitutions (ACL 2020)☆31Jan 27, 2021Updated 5 years ago
- codes for "Searching for an Effective Defender:Benchmarking Defense against Adversarial Word Substitution"☆31Oct 27, 2023Updated 2 years ago
- Python library for the simulation of probabilistic circuits.☆11Feb 1, 2026Updated last week
- Framework for studying cryptographic hash functions using SAT.☆10Dec 21, 2021Updated 4 years ago
- CSC 424 Advanced Database Management Systems☆16Jan 1, 2020Updated 6 years ago
- Official repository for Jia, Raghunathan, Göksel, and Liang, "Certified Robustness to Adversarial Word Substitutions" (EMNLP 2019)☆38Dec 30, 2019Updated 6 years ago
- ☆10May 5, 2022Updated 3 years ago
- Chess Engine Implementation using Minmax, Alpha-Beta Pruning, and Quiescence Search Algorithm.☆10May 18, 2021Updated 4 years ago
- Open-Retrieval Conversational Machine Reading: A new setting & OR-ShARC dataset☆13Nov 19, 2022Updated 3 years ago
- ☆10Jul 24, 2023Updated 2 years ago
- Generate fake data for any purpose☆10Dec 21, 2020Updated 5 years ago
- ☆11Oct 29, 2024Updated last year
- Robert C. Martin's Agile Software Development, Principles, Patterns, and Practices codes in Java☆10Dec 12, 2017Updated 8 years ago
- ☆21Jul 8, 2025Updated 7 months ago
- Create Interactive Dashboards with Streamlit and Python Coursera☆10Jun 19, 2020Updated 5 years ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- A-Soul-Data Json数据存放☆13Sep 17, 2022Updated 3 years ago
- Sliding Puzzle solver and utilities☆10Jan 21, 2024Updated 2 years ago
- karthikbmk's independent study☆10Sep 2, 2017Updated 8 years ago
- implementation of replicated softmax model☆13Sep 25, 2014Updated 11 years ago
- Data Governance app for Splunk☆12Oct 19, 2023Updated 2 years ago
- Swarming behaviour is based on aggregation of simple drones exhibiting basic instinctive reactions to stimuli. However, to achieve overal…☆12Dec 2, 2019Updated 6 years ago
- Android continuous integration sample, use fastlane connect tools together☆10Dec 19, 2017Updated 8 years ago
- ☆26Nov 7, 2022Updated 3 years ago
- Introduction to network analysis and visualization☆12Apr 6, 2024Updated last year
- ☆11Sep 29, 2019Updated 6 years ago
- 基于BERT+Biaffine结构的关系抽取模型☆12Feb 23, 2022Updated 3 years ago
- Downloading LARGE files with small lambda functions☆12Mar 17, 2021Updated 4 years ago
- ☆11Nov 9, 2022Updated 3 years ago
- code of paper "Defending Against Alignment-Breaking Attacks via Robustly Aligned LLM"☆14Nov 17, 2023Updated 2 years ago
- Solutions to machine learning HW from bloomberg ml course☆11Jun 23, 2019Updated 6 years ago