machinelearning4health / TextHoaxer
Implementation Code of TextHoaxer
☆13Updated 2 years ago
Related projects: ⓘ
- Natural Language Attacks in a Hard Label Black Box Setting.☆40Updated 3 years ago
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆148Updated last year
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆37Updated 2 years ago
- Hidden backdoor attack on NLP systems☆45Updated 2 years ago
- ☆10Updated 2 years ago
- Paper list of Adversarial Examples☆42Updated 11 months ago
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆28Updated 2 years ago
- TrojanLM: Trojaning Language Models for Fun and Profit☆15Updated 3 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆41Updated last year
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆15Updated 3 years ago
- ☆17Updated 6 months ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆67Updated 2 weeks ago
- ☆24Updated last week
- [Findings of ACL 2023] Bridge the Gap Between CV and NLP! A Optimization-based Textual Adversarial Attack Framework.☆12Updated last year
- Code for EMNLP2020 long paper: BERT-Attack: Adversarial Attack Against BERT Using BERT☆184Updated 3 years ago
- codes for "Searching for an Effective Defender:Benchmarking Defense against Adversarial Word Substitution"☆30Updated 10 months ago
- Code and data of the ACL 2020 paper "Word-level Textual Adversarial Attacking as Combinatorial Optimization"☆86Updated 3 years ago
- Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency☆66Updated last year
- ☆12Updated 9 months ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆47Updated 4 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆27Updated last month
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆21Updated 2 years ago
- Repository for Towards Codable Watermarking for Large Language Models☆26Updated last year
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆34Updated 3 years ago
- ☆11Updated 4 years ago
- 复现了下Neural Cleanse这篇论文,真的是简单而有效,发在了okaland☆29Updated 3 years ago
- Bad Characters: Imperceptible NLP Attacks☆33Updated 5 months ago
- ☆24Updated last year
- ☆88Updated 3 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆274Updated last month