machinelearning4health / TextHoaxerLinks
Implementation Code of TextHoaxer
☆15Updated 3 years ago
Alternatives and similar repositories for TextHoaxer
Users that are interested in TextHoaxer are comparing it to the libraries listed below
Sorting:
- Natural Language Attacks in a Hard Label Black Box Setting.☆50Updated 4 years ago
- An Open-Source Package for Textual Adversarial Attack.☆764Updated 2 years ago
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆199Updated 2 years ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆43Updated 3 years ago
- A list of recent adversarial attack and defense papers (including those on large language models)☆45Updated 2 weeks ago
- Hidden backdoor attack on NLP systems☆47Updated 4 years ago
- Must-read Papers on Textual Adversarial Attack and Defense☆1,576Updated 7 months ago
- [Findings of ACL 2023] Bridge the Gap Between CV and NLP! A Optimization-based Textual Adversarial Attack Framework.☆14Updated 2 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆46Updated 3 years ago
- Paper list of Adversarial Examples☆52Updated 2 years ago
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆35Updated 4 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆302Updated 4 months ago
- ☆11Updated 5 years ago
- ☆11Updated 3 years ago
- Code for EMNLP2020 long paper: BERT-Attack: Adversarial Attack Against BERT Using BERT☆205Updated 5 years ago
- ☆37Updated last year
- ☆18Updated 4 years ago
- SAFER: A Structure-free Approach For cErtified Robustness to Adversarial Word Substitutions (ACL 2020)☆31Updated 4 years ago
- ☆15Updated last year
- ☆151Updated last year
- ☆15Updated 2 years ago
- Repo for arXiv preprint "Gradient-based Adversarial Attacks against Text Transformers"☆110Updated 3 years ago
- TrojanLM: Trojaning Language Models for Fun and Profit☆16Updated 4 years ago
- Bad Characters: Imperceptible NLP Attacks☆35Updated last year
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- ☆26Updated last year
- A curated list of trustworthy Generative AI papers. Daily updating...☆75Updated last year
- ☆19Updated last year
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Updated 4 years ago
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆231Updated last year