machinelearning4health / TextHoaxerLinks
Implementation Code of TextHoaxer
☆14Updated 3 years ago
Alternatives and similar repositories for TextHoaxer
Users that are interested in TextHoaxer are comparing it to the libraries listed below
Sorting:
- Natural Language Attacks in a Hard Label Black Box Setting.☆47Updated 4 years ago
- An Open-Source Package for Textual Adversarial Attack.☆746Updated 2 years ago
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆189Updated 2 years ago
- Must-read Papers on Textual Adversarial Attack and Defense☆1,564Updated 2 months ago
- Paper list of Adversarial Examples☆51Updated last year
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆300Updated this week
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆43Updated 2 years ago
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆34Updated 3 years ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- ☆10Updated 3 years ago
- ☆11Updated 3 years ago
- A Model for Natural Language Attack on Text Classification and Inference☆516Updated 2 years ago
- ☆11Updated 5 years ago
- [Findings of ACL 2023] Bridge the Gap Between CV and NLP! A Optimization-based Textual Adversarial Attack Framework.☆13Updated 2 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆43Updated 2 years ago
- ☆147Updated 10 months ago
- Code for EMNLP2020 long paper: BERT-Attack: Adversarial Attack Against BERT Using BERT☆200Updated 4 years ago
- For easy metric logging and visualization☆14Updated 6 months ago
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆216Updated last year
- Repo for arXiv preprint "Gradient-based Adversarial Attacks against Text Transformers"☆108Updated 2 years ago
- SAFER: A Structure-free Approach For cErtified Robustness to Adversarial Word Substitutions (ACL 2020)☆31Updated 4 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆31Updated last year
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆296Updated 5 years ago
- ☆17Updated 11 months ago
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"☆16Updated last week
- ☆14Updated last year
- ☆19Updated last year
- Bad Characters: Imperceptible NLP Attacks☆35Updated last year
- ☆18Updated 3 years ago
- ☆15Updated last year