ebagdasa / propaganda_as_a_serviceLinks
Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"
☆22Updated 3 years ago
Alternatives and similar repositories for propaganda_as_a_service
Users that are interested in propaganda_as_a_service are comparing it to the libraries listed below
Sorting:
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Updated 4 years ago
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆29Updated 2 years ago
- TrojanLM: Trojaning Language Models for Fun and Profit☆16Updated 4 years ago
- ☆26Updated 4 years ago
- ☆6Updated 2 years ago
- ☆18Updated 3 years ago
- ☆24Updated 2 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Updated 3 years ago
- ☆29Updated last year
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆24Updated 3 years ago
- Craft poisoned data using MetaPoison☆51Updated 4 years ago
- ☆25Updated 4 years ago
- Official Repository for Dataset Inference for LLMs☆34Updated 11 months ago
- TextHide: Tackling Data Privacy in Language Understanding Tasks☆31Updated 4 years ago
- ☆17Updated 4 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated last year
- ☆19Updated last year
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆36Updated 11 months ago
- Bad Characters: Imperceptible NLP Attacks☆34Updated last year
- Code release for DeepJudge (S&P'22)☆51Updated 2 years ago
- ☆66Updated 4 years ago
- [ICLR 2020] Code for paper "Robustness Verification for Transformers"☆27Updated 7 months ago
- ☆20Updated last year
- Official repo for the paper: Recovering Private Text in Federated Learning of Language Models (in NeurIPS 2022)☆56Updated 2 years ago
- ☆18Updated 3 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 5 years ago
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Updated 5 years ago
- ☆10Updated 4 years ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆43Updated 2 years ago
- ☆9Updated 4 years ago