The official code to reproduce results from the NACCL2019 paper: White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks
☆12Jun 4, 2019Updated 6 years ago
Alternatives and similar repositories for white-2-black
Users that are interested in white-2-black are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Jun 23, 2018Updated 7 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- This is the implementation of paper "Learning to Ask Conversational Questions by Optimizing Levenshtein Distance".☆10Jul 5, 2021Updated 4 years ago
- Repo for our AKBC-2021 paper: Abg-CoQA: Clarifying Ambiguity in Conversational Question Answering☆10Oct 10, 2021Updated 4 years ago
- code for ACL 2018 paper by Kang et al., "AdvEntuRe: Adversarial Training for Textual Entailment with Knowledge-Guided Examples "☆17Aug 30, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- codes for paper "learning to discriminate perturbations for blocking adversarial attacks in text classification" in EMNLP19☆15Feb 25, 2020Updated 6 years ago
- NLP☆14Oct 17, 2022Updated 3 years ago
- Scripts for WASSA-2017 Shared Task on Emotion Intensity☆14Oct 4, 2017Updated 8 years ago
- Comparing attention-based convolutional and recurrent neural networks under adversarial attacks to investigate their success and limitati…☆10Aug 24, 2018Updated 7 years ago
- ☆12Apr 19, 2024Updated 2 years ago
- No.5 solution to non-targeted attack in IJCAI-2019 Alibaba Adversarial AI Challenge (AAAC 2019))☆12Oct 27, 2020Updated 5 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆136Nov 25, 2020Updated 5 years ago
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Feb 27, 2020Updated 6 years ago
- A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning☆12Dec 17, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Training vision models with full-batch gradient descent and regularization☆40Feb 14, 2023Updated 3 years ago
- ☆26Nov 21, 2022Updated 3 years ago
- This is the Experiment Responsitory for Social Network and Opinion Analysis☆14Dec 14, 2019Updated 6 years ago
- Implementation of paper "Transferring Robustness for Graph Neural Network Against Poisoning Attacks".☆20Feb 26, 2020Updated 6 years ago
- Implementation of LREC-COLING 2024 paper A Frustratingly Simple Decoding Method for Neural Text Generation☆19Feb 23, 2024Updated 2 years ago
- Edward中文文档☆16Apr 11, 2017Updated 9 years ago
- Network Attached Storage (NAS) Box using Raspberry Pi allows you to install comprehensive applications and services on your Raspberry Pi,…☆22Oct 28, 2017Updated 8 years ago
- Investigating Robustness and Interpretability of Link Prediction via Adversarial Modifications☆19Jul 20, 2020Updated 5 years ago
- Consumer Event Cause Extraction Baseline Model☆16Aug 3, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency☆81Mar 24, 2023Updated 3 years ago
- Official adversarial mixup resynthesis repository☆35Feb 14, 2020Updated 6 years ago
- Pytorch implementation for paper "Selective Encoding for Abstractive Sentence Summarization"☆12Mar 17, 2019Updated 7 years ago
- ☆18Sep 29, 2020Updated 5 years ago
- pytorch attentional NMT(with NLL, MRT, REINFORCE, MIXER training objectives)☆13May 12, 2017Updated 8 years ago
- PyTorch Memory Efficient Sparse Sparse Matrix Multiplication☆12Aug 12, 2024Updated last year
- ☆10Oct 28, 2020Updated 5 years ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- Official code of GIND (Optimization-Induced Graph Implicit Nonlinear Diffusion)☆18Jun 29, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆41Jun 14, 2025Updated 10 months ago
- ☆20Nov 3, 2024Updated last year
- Face anti-spoofing using rPPG☆14Sep 28, 2017Updated 8 years ago
- ☆12Aug 16, 2018Updated 7 years ago
- Code for "GU IRLAB at SemEval-2018 Task 7: Tree-LSTMs for Scientific Relation Classification"☆17Jan 10, 2020Updated 6 years ago
- A-Soul-Data Json数据存放☆13Sep 17, 2022Updated 3 years ago
- Implementation code for the paper "Generating Natural Language Adversarial Examples"☆171Aug 30, 2019Updated 6 years ago