Adversarial examples for Seq2Seq model in NLP
☆40Nov 3, 2018Updated 7 years ago
Alternatives and similar repositories for Seq2Sick
Users that are interested in Seq2Sick are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for ACL'20 paper "It's Morphin' Time! Combating Linguistic Discrimination with Inflectional Perturbations"☆19May 1, 2025Updated 10 months ago
- Chinese Natural Language Correction via Language Model☆15Sep 14, 2017Updated 8 years ago
- ☆10Jun 23, 2018Updated 7 years ago
- Show-and-Fool: Adversarial Examples for Image Captioning task☆56Jul 6, 2021Updated 4 years ago
- Implementation of "Effective Adversarial Regularization for Neural Machine Translation", ACL 2019☆21Jan 11, 2020Updated 6 years ago
- Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency☆76Mar 24, 2023Updated 3 years ago
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- Implementation code for the paper "Generating Natural Language Adversarial Examples"☆171Aug 30, 2019Updated 6 years ago
- Code for Interpretable Adversarial Perturbation in Input Embedding Space for Text, IJCAI 2018.☆42Feb 27, 2020Updated 6 years ago
- [ICLR 2020] Code for paper "Robustness Verification for Transformers"☆27Nov 26, 2024Updated last year
- Codes for reproducing the robustness evaluation scores in “Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approac…☆52Sep 18, 2018Updated 7 years ago
- codes for "Searching for an Effective Defender:Benchmarking Defense against Adversarial Word Substitution"☆31Oct 27, 2023Updated 2 years ago
- SAFER: A Structure-free Approach For cErtified Robustness to Adversarial Word Substitutions (ACL 2020)☆31Jan 27, 2021Updated 5 years ago
- Certified defense to adversarial examples using CROWN and IBP. Also includes GPU implementation of CROWN verification algorithm (in PyTor…☆98Jun 7, 2021Updated 4 years ago
- Tool for Evaluating Adversarial Perturbations on Text☆61Feb 27, 2022Updated 4 years ago
- using python and flask for ocr annotation web tool☆25Jan 7, 2020Updated 6 years ago
- Generate adversarial text via gradient methods☆30Mar 16, 2019Updated 7 years ago
- Scripts and noise data for Belinkov & Bisk 2018☆29Apr 27, 2018Updated 7 years ago
- [NeurIPS 2022] Code for paper "Efficiently Computing Local Lipschitz Constants of Neural Networks via Bound Propagation"☆27Dec 10, 2023Updated 2 years ago
- Official implementation for Training Certifiably Robust Neural Networks with Efficient Local Lipschitz Bounds (NeurIPS, 2021).☆25Sep 4, 2022Updated 3 years ago
- This repository contains a simple implementation of Interval Bound Propagation (IBP) using TensorFlow: https://arxiv.org/abs/1810.12715☆160Dec 20, 2019Updated 6 years ago
- ☆14Jan 30, 2021Updated 5 years ago
- A tensorflow implementation of recognition of handwritten Chinese characters.☆26Dec 5, 2017Updated 8 years ago
- Convex Layerwise Adversarial Training (COLT)☆29Jan 13, 2021Updated 5 years ago
- EMNLP BlackBox NLP 2020: Searching for a Search Method: Benchmarking Search Algorithms for Generating NLP Adversarial Examples☆26Oct 11, 2020Updated 5 years ago
- TACL 2020: Syntax-Guided Controlled Generation of Paraphrases☆72Mar 16, 2024Updated 2 years ago
- For Certified Robustness to Text Adversarial Attacks by Randomized [MASK]☆17Oct 8, 2024Updated last year
- ☆27Jan 23, 2024Updated 2 years ago
- Robustness vs Accuracy Survey on ImageNet☆99Aug 3, 2021Updated 4 years ago
- Code for the TACL paper "Nurse is Closer to Woman than Surgeon? Mitigating Gender-Biased Proximities in Word Embeddings"☆16Sep 8, 2020Updated 5 years ago
- Code from Jia and Liang, "Adversarial Examples for Evaluating Reading Comprehension Systems" (EMNLP 2017)☆118Oct 18, 2018Updated 7 years ago
- Code for EMNLP2020 long paper: BERT-Attack: Adversarial Attack Against BERT Using BERT☆206Sep 22, 2020Updated 5 years ago
- Must-read Papers on Textual Adversarial Attack and Defense☆1,574Jun 4, 2025Updated 9 months ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- Benchmark for LP-relaxed robustness verification of ReLU-networks☆42Apr 24, 2019Updated 6 years ago
- [ICML 2022] "Linearity Grafting: Relaxed Neuron Pruning Helps Certifiable Robustness" by Tianlong Chen*, Huan Zhang*, Zhenyu Zhang, Shiyu…☆17Jun 22, 2022Updated 3 years ago
- A Model for Natural Language Attack on Text Classification and Inference☆530Dec 8, 2022Updated 3 years ago
- syntactically controlled paraphrase networks☆168Dec 30, 2018Updated 7 years ago
- StoneSkipping model for detecting Chinese camouflaged spam☆20May 8, 2020Updated 5 years ago