Investigating Robustness and Interpretability of Link Prediction via Adversarial Modifications
☆19Jul 20, 2020Updated 5 years ago
Alternatives and similar repositories for criage
Users that are interested in criage are comparing it to the libraries listed below
Sorting:
- Code for gradient rollback, which explains predictions of neural matrix factorization models, as for example used for knowledge base comp…☆21Mar 16, 2021Updated 4 years ago
- A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning☆12Dec 17, 2019Updated 6 years ago
- Link Prediction with Supervised Random Walks on Github Data☆16Feb 7, 2016Updated 10 years ago
- ☆20Jun 7, 2020Updated 5 years ago
- SUM-QE, a BERT-based Summary Quality Estimation Model☆21Jul 22, 2023Updated 2 years ago
- ☆25Jun 23, 2021Updated 4 years ago
- Generate adversarial text via gradient methods☆30Mar 16, 2019Updated 6 years ago
- Pascal2 Harvest project QuEst☆14Sep 15, 2014Updated 11 years ago
- ☆14Feb 2, 2025Updated last year
- Reference implementation of algorithms for reinforcement learning and Markov decision processes.☆12Jan 28, 2021Updated 5 years ago
- https://icml.cc/virtual/2023/poster/24354☆10Aug 15, 2023Updated 2 years ago
- A toolkit for quantitative evaluation of data attribution methods.☆56Jul 14, 2025Updated 7 months ago
- ☆10Jun 23, 2018Updated 7 years ago
- The code of APP, Scalable Graph Embedding for Asymmetric Proximity. Zhou, Chang and Liu, Yuqiong and Liu, Xiaofei and Liu, Zhongyi and Ga…☆10Nov 11, 2018Updated 7 years ago
- The code for the paper "A Bayesian Approach to Online Planning" published in ICML 2024.☆13Jun 17, 2024Updated last year
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 5 months ago
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆39Dec 13, 2018Updated 7 years ago
- Code for "Tracing Knowledge in Language Models Back to the Training Data"☆39Dec 27, 2022Updated 3 years ago
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 5 years ago
- Fast IdEntification of State-of-The-Art models using adaptive bandit algorithms☆14Jul 15, 2022Updated 3 years ago
- Neural machine translation with Recurrent Deterministic Policy Gradient☆10Aug 18, 2016Updated 9 years ago
- ☆10Jun 28, 2020Updated 5 years ago
- Official code for AAAI'20 paper "Merging Weak and Active Supervision for Semantic Parsing"☆11Dec 8, 2022Updated 3 years ago
- ☆11Nov 13, 2020Updated 5 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- NLP☆14Oct 17, 2022Updated 3 years ago
- ☆12Feb 9, 2024Updated 2 years ago
- HPYLMのC++実装☆11May 2, 2017Updated 8 years ago
- 🤖 Implementation of Self Normalizing Networks (SNN) in PyTorch.☆12Jun 19, 2017Updated 8 years ago
- ☆52Aug 17, 2024Updated last year
- Latent-variable Synchronous Context-Free Grammar Toolkit☆10Sep 30, 2014Updated 11 years ago
- Official code for the "Optimal Variance Control of the Score Function Gradient Estimator for Importance Weighted Bounds"☆10Feb 16, 2023Updated 3 years ago
- ACL style for Typst☆21Jan 27, 2026Updated last month
- ☆10Feb 18, 2020Updated 6 years ago
- This is the official implementation of TAGCOS: Task-agnostic Gradient Clustered Coreset Selection for Instruction Tuning Data☆13Jul 21, 2024Updated last year
- ☆13Nov 29, 2021Updated 4 years ago
- ☆13Aug 31, 2024Updated last year
- ☆12Sep 30, 2022Updated 3 years ago
- System for Fact Extraction and Verification, for http://fever.ai FEVER shared task at EMNLP☆11Feb 28, 2019Updated 7 years ago