TrojanLM: Trojaning Language Models for Fun and Profit
☆16Jun 17, 2021Updated 4 years ago
Alternatives and similar repositories for trojan-lm
Users that are interested in trojan-lm are comparing it to the libraries listed below
Sorting:
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Dec 9, 2021Updated 4 years ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆43Sep 11, 2022Updated 3 years ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Jun 29, 2021Updated 4 years ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- ☆19Mar 9, 2024Updated last year
- ☆18Jul 1, 2021Updated 4 years ago
- Hidden backdoor attack on NLP systems☆47Nov 14, 2021Updated 4 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Oct 21, 2021Updated 4 years ago
- ☆18Aug 15, 2022Updated 3 years ago
- ☆18Feb 10, 2022Updated 4 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Oct 8, 2020Updated 5 years ago
- ☆23Oct 11, 2024Updated last year
- Robust natural language watermarking using invariant features☆28Oct 15, 2023Updated 2 years ago
- Framework for Adversarial Malware Evaluation.☆35Mar 31, 2025Updated 11 months ago
- Bad Characters: Imperceptible NLP Attacks☆35Apr 9, 2024Updated last year
- ☆12Jul 25, 2018Updated 7 years ago
- Repository for Towards Codable Watermarking for Large Language Models☆37Sep 20, 2023Updated 2 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆303Aug 25, 2025Updated 6 months ago
- ☆36Aug 30, 2019Updated 6 years ago
- [CCS 2021] "DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation" by Boxin Wang*, Fan Wu*, Yunhui Long…☆36Dec 28, 2021Updated 4 years ago
- Text file containing NSFW words aggregated from various sources.☆10Aug 23, 2020Updated 5 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆16Jul 9, 2025Updated 7 months ago
- ☆14Mar 9, 2025Updated 11 months ago
- JPEG编解码从零开始实现(python JPEG codec)☆10Jul 29, 2022Updated 3 years ago
- Text Classification Models - CNN, RCNN, RNN-ATTN [PyTorch]☆11Oct 13, 2020Updated 5 years ago
- Causal Reasoning for Membership Inference Attacks☆11Oct 21, 2022Updated 3 years ago
- Official repository of paper "Let All be Whitened: Multi-teacher Distillation for Efficient Visual Retrieval"☆10Dec 20, 2023Updated 2 years ago
- Generate images of Chinese license plates☆11Feb 8, 2021Updated 5 years ago
- LIMA: Language for Integrated Modeling and Analysis