XuandongZhao / DRW
[EMNLP 2022] Distillation-Resistant Watermarking (DRW) for Model Protection in NLP
☆13Updated last year
Alternatives and similar repositories for DRW:
Users that are interested in DRW are comparing it to the libraries listed below
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆24Updated 3 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 4 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆22Updated 3 years ago
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆36Updated 8 months ago
- Updated 9 months ago
- Code for paper "Universal Jailbreak Backdoors from Poisoned Human Feedback"☆48Updated 10 months ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Updated 4 years ago
- [CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu C…☆26Updated 2 years ago
- Code and data for paper "A Semantic Invariant Robust Watermark for Large Language Models" accepted by ICLR 2024.☆27Updated 4 months ago
- ☆42Updated last year
- ☆11Updated 2 years ago
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆25Updated 4 months ago
- ☆18Updated 3 months ago
- ☆21Updated last year
- Code for "Universal Adversarial Triggers Are Not Universal."☆16Updated 10 months ago
- ☆24Updated 3 years ago
- ☆53Updated last year
- ☆14Updated 5 months ago
- [NeurIPS'22] Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork. Haotao Wang, Junyuan Hong,…☆14Updated last year
- ☆18Updated 10 months ago
- ☆13Updated 2 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated last year
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆38Updated 3 years ago
- ☆19Updated 2 months ago
- Code repo of our paper Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis (https://arxiv.org/abs/2406.10794…☆19Updated 7 months ago
- [ICLR 2024] Provable Robust Watermarking for AI-Generated Text☆30Updated last year
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆18Updated last year
- ☆41Updated last month
- ☆19Updated 3 years ago
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆29Updated 2 years ago