ebagdasa / propaganda_as_a_serviceLinks
Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"
☆21Updated 3 years ago
Alternatives and similar repositories for propaganda_as_a_service
Users that are interested in propaganda_as_a_service are comparing it to the libraries listed below
Sorting:
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Updated 4 years ago
- TrojanLM: Trojaning Language Models for Fun and Profit☆16Updated 4 years ago
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆32Updated 3 years ago
- Repo for arXiv preprint "Gradient-based Adversarial Attacks against Text Transformers"☆110Updated 3 years ago
- Hidden backdoor attack on NLP systems☆47Updated 4 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Updated 5 years ago
- Training data extraction on GPT-2☆195Updated 2 years ago
- Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)☆143Updated 4 months ago
- ☆25Updated 5 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Updated 4 years ago
- ☆32Updated last year
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆43Updated 3 years ago
- ☆19Updated last year
- ☆26Updated 3 years ago
- ☆68Updated 5 years ago
- Code release for DeepJudge (S&P'22)☆52Updated 2 years ago
- ☆25Updated 4 years ago
- [EMNLP 2022] Distillation-Resistant Watermarking (DRW) for Model Protection in NLP☆13Updated 2 years ago
- ☆18Updated 4 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated 2 years ago
- ☆25Updated 3 years ago
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆44Updated 4 years ago
- Bad Characters: Imperceptible NLP Attacks☆35Updated last year
- Craft poisoned data using MetaPoison☆54Updated 4 years ago
- Starter kit and data loading code for the Trojan Detection Challenge NeurIPS 2022 competition☆33Updated 2 years ago
- TextHide: Tackling Data Privacy in Language Understanding Tasks☆31Updated 4 years ago
- ☆58Updated last year
- ☆28Updated 2 years ago
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆40Updated last year
- [ICLR 2020] Code for paper "Robustness Verification for Transformers"☆27Updated last year