☆18Jul 1, 2021Updated 4 years ago
Alternatives and similar repositories for backdoor_nlg
Users that are interested in backdoor_nlg are comparing it to the libraries listed below
Sorting:
- TrojanLM: Trojaning Language Models for Fun and Profit☆16Jun 17, 2021Updated 4 years ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Jun 29, 2021Updated 4 years ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- ☆19Mar 9, 2024Updated last year
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Dec 9, 2021Updated 4 years ago
- ☆20Oct 6, 2021Updated 4 years ago
- ☆18Feb 10, 2022Updated 4 years ago
- ☆18May 28, 2021Updated 4 years ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆43Sep 11, 2022Updated 3 years ago
- ☆27Nov 20, 2023Updated 2 years ago
- ☆28Jan 16, 2025Updated last year
- Unofficial implementation of "Backdooring Instruction-Tuned Large Language Models with Virtual Prompt Injection"☆26Jul 6, 2024Updated last year
- Bad Characters: Imperceptible NLP Attacks☆35Apr 9, 2024Updated last year
- [MM'23 Oral] "Text-to-image diffusion models can be easily backdoored through multimodal data poisoning"☆31Aug 14, 2025Updated 6 months ago
- Repository for Towards Codable Watermarking for Large Language Models☆37Sep 20, 2023Updated 2 years ago
- A virtual caregiver system that extracts the expression of mental and physical health states through dialogue-based human-computer intera…☆14Jan 29, 2023Updated 3 years ago
- ☆12Dec 22, 2025Updated 2 months ago
- Introduction to Random Forest Algorithm for classification problem and how to select important feaatures in your dataset.☆12Aug 1, 2020Updated 5 years ago
- Watermarking Text Generated by Black-Box Language Models☆39Dec 9, 2023Updated 2 years ago
- ☆11Jan 25, 2019Updated 7 years ago
- ☆33Oct 1, 2021Updated 4 years ago
- syntactically controlled paraphrase networks☆168Dec 30, 2018Updated 7 years ago
- Demo code for the data mining course 18-19☆11May 10, 2019Updated 6 years ago
- ☆14Feb 26, 2025Updated last year
- About The corresponding code from our paper " Making Reasoning Matter: Measuring and Improving Faithfulness of Chain-of-Thought Reasoning…☆13Jan 14, 2026Updated last month
- ☆14Jan 17, 2026Updated last month
- ☆10Dec 18, 2024Updated last year
- Datasets of audio adversarial examples for deep speech recognition systems and Python code of a detection system☆12May 6, 2023Updated 2 years ago
- AMT-CDR: A Deep Adversarial Multi-channel Transfer Network for Cross-domain Recommendation☆12Nov 2, 2023Updated 2 years ago
- ☆14Jan 6, 2025Updated last year
- Mine conversations from novels in Project Gutenberg, to generate data for data-driven dialogue systems.☆15May 7, 2019Updated 6 years ago
- [ICML 2023] Protecting Language Generation Models via Invisible Watermarking☆13Sep 8, 2023Updated 2 years ago
- Generate images of Chinese license plates☆11Feb 8, 2021Updated 5 years ago
- ☆11Apr 17, 2023Updated 2 years ago
- LIMA: Language for Integrated Modeling and Analysis☆12Sep 8, 2018Updated 7 years ago
- Code repository of Machine Learning for Quantum Chemistry book☆10Jun 5, 2023Updated 2 years ago
- Thai word segmentation using deep learning☆14Jul 1, 2019Updated 6 years ago
- A conversational recommender system dataset with high-quality explanations.☆11Apr 26, 2023Updated 2 years ago
- 基于vue 3.x制作的带有农历的日历组件和带有备忘录的日历组件☆11May 17, 2024Updated last year