ku-nlp / steganography-with-masked-lmLinks
Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"
☆27Updated 4 years ago
Alternatives and similar repositories for steganography-with-masked-lm
Users that are interested in steganography-with-masked-lm are comparing it to the libraries listed below
Sorting:
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆24Updated 5 years ago
- ☆33Updated 3 years ago
- ☆23Updated 5 years ago
- ☆27Updated 4 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆46Updated 3 years ago
- collection of the SOTA linguistic steganalysis methods☆26Updated last year
- ☆25Updated 5 years ago
- Code for EMNLP2020 long paper: BERT-Attack: Adversarial Attack Against BERT Using BERT☆202Updated 5 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Updated 5 years ago
- ☆20Updated 4 years ago
- Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency☆71Updated 2 years ago
- Adversarial examples for Seq2Seq model in NLP☆40Updated 7 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆40Updated 5 months ago
- ☆64Updated 3 years ago
- [TNNLS, to appear] FET-LM: Flow Enhanced Variational Auto-Encoder for Topic-Guided Language Modeling PyTorch Implementation☆13Updated 2 years ago
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆43Updated 4 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆26Updated 4 years ago
- Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)☆142Updated 2 months ago
- ☆18Updated 4 years ago
- [NAACL 2022] "SemAttack: Natural Textual Attacks via Different Semantic Spaces" by Boxin Wang, Chejian Xu, Xiangyu Liu, Yu Cheng, Bo Li☆21Updated 3 years ago
- ☆25Updated 4 years ago
- Official code for the paper "PADA: Example-based Prompt Learning for on-the-fly Adaptation to Unseen Domains".☆51Updated 3 years ago
- Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks☆24Updated 4 years ago
- A Query Efficient Natural Language Attack in a Black Box Setting☆17Updated 4 years ago
- Code for ACL2018 HotFlip: White-Box Adversarial Examples for Text Classification, Word-level Adversarial Examples☆37Updated 6 years ago
- ☆15Updated 5 years ago
- SAFER: A Structure-free Approach For cErtified Robustness to Adversarial Word Substitutions (ACL 2020)☆31Updated 4 years ago
- Official code for LEWIS, from: "LEWIS: Levenshtein Editing for Unsupervised Text Style Transfer", ACL-IJCNLP 2021 Findings by Machel Rei…☆31Updated 3 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 3 years ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆27Updated 2 years ago