Implementation Code of TextHoaxer
☆15Aug 21, 2022Updated 3 years ago
Alternatives and similar repositories for TextHoaxer
Users that are interested in TextHoaxer are comparing it to the libraries listed below
Sorting:
- Natural Language Attacks in a Hard Label Black Box Setting.☆50May 26, 2021Updated 4 years ago
- [NAACL 2022] "SemAttack: Natural Textual Attacks via Different Semantic Spaces" by Boxin Wang, Chejian Xu, Xiangyu Liu, Yu Cheng, Bo Li☆21Jun 11, 2022Updated 3 years ago
- Official PyTorch implementation of "Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian O…☆25Sep 26, 2023Updated 2 years ago
- A Query Efficient Natural Language Attack in a Black Box Setting☆17Sep 23, 2021Updated 4 years ago
- Code base for the EMNLP 2021 paper, "Multi-granularity Textual Adversarial Attack with Behavior Cloning".☆13Apr 18, 2022Updated 3 years ago
- codes for "Searching for an Effective Defender:Benchmarking Defense against Adversarial Word Substitution"☆31Oct 27, 2023Updated 2 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- Python library providing a simple, fully supervised sentence embedding technique for textual adversarial attacks.☆12Dec 13, 2023Updated 2 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- ☆10Mar 31, 2016Updated 9 years ago
- This is a custom library called SpinnerLayout on Android platform☆11Nov 29, 2018Updated 7 years ago
- A greybox fuzzer for continuous integration☆10Dec 15, 2023Updated 2 years ago
- ☆11Oct 29, 2024Updated last year
- Android continuous integration sample, use fastlane connect tools together☆10Dec 19, 2017Updated 8 years ago
- Code and data of the ACL 2020 paper "Word-level Textual Adversarial Attacking as Combinatorial Optimization"☆88Apr 11, 2021Updated 4 years ago
- ChatGPT solutions for the MLE interview☆14Dec 9, 2022Updated 3 years ago
- ☆10Oct 28, 2020Updated 5 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- reinforcement learning for optimal debt collection strategy☆11Dec 8, 2019Updated 6 years ago
- ☆13Sep 11, 2022Updated 3 years ago
- Insecure web application used to test system security controls☆13Oct 14, 2025Updated 4 months ago
- Personal blog repository.☆11Jul 30, 2021Updated 4 years ago
- Prototype compiler from AWS CloudFormation IaC templates into Logic.☆13Dec 5, 2023Updated 2 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Contextualized Perturbation for Textual Adversarial Attack, NAACL 2021☆44Jul 23, 2021Updated 4 years ago
- code for EMNLP 2024 paper: How do Large Language Models Learn In-Context? Query and Key Matrices of In-Context Heads are Two Towers for M…☆13Nov 17, 2024Updated last year
- ☆15Jul 5, 2024Updated last year
- 基于QMT实现的量化交易系统demo☆26Jun 1, 2025Updated 9 months ago
- 青年大学习朋友圈生成网站☆11Dec 1, 2020Updated 5 years ago
- 学习 Web 技术:HTML,CSS,JavaScript☆13Jun 18, 2020Updated 5 years ago
- ☆12Jun 24, 2023Updated 2 years ago
- ☆10May 18, 2022Updated 3 years ago
- ☆16Sep 12, 2022Updated 3 years ago
- This repo is for LinkedIn Learning course: Building Modern Projects with React☆13Nov 19, 2024Updated last year
- Open SAMMY codebase☆24Feb 24, 2026Updated last week
- In-depth and hands-on practice for acing the exam.☆15Jun 21, 2024Updated last year
- 字符相似度, 汉字字形/拼音/语义相似度(单字, 可用于数据增强, CSC错别字检测识别任务(构建混淆集)) Chinese character font/pinyin/semantic similarity (single character, can be used f…☆20Jul 5, 2025Updated 7 months ago
- ☆15Aug 16, 2022Updated 3 years ago
- Hands-on Multi-Cloud for Developers☆13Feb 26, 2019Updated 7 years ago