pouyapez / criageView external linksLinks
Investigating Robustness and Interpretability of Link Prediction via Adversarial Modifications
☆19Jul 20, 2020Updated 5 years ago
Alternatives and similar repositories for criage
Users that are interested in criage are comparing it to the libraries listed below
Sorting:
- A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning☆12Dec 17, 2019Updated 6 years ago
- Link Prediction with Supervised Random Walks on Github Data☆16Feb 7, 2016Updated 10 years ago
- ☆16Jan 15, 2021Updated 5 years ago
- ☆20Jun 7, 2020Updated 5 years ago
- SUM-QE, a BERT-based Summary Quality Estimation Model☆21Jul 22, 2023Updated 2 years ago
- A curated collection of SOTA algorithms on the link prediction task.☆22Feb 27, 2020Updated 5 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Oct 21, 2021Updated 4 years ago
- ☆25Jun 23, 2021Updated 4 years ago
- Generate adversarial text via gradient methods☆30Mar 16, 2019Updated 6 years ago
- The code for the paper "A Bayesian Approach to Online Planning" published in ICML 2024.☆13Jun 17, 2024Updated last year
- https://icml.cc/virtual/2023/poster/24354☆10Aug 15, 2023Updated 2 years ago
- ☆14Feb 2, 2025Updated last year
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 4 months ago
- Reference implementation of algorithms for reinforcement learning and Markov decision processes.☆12Jan 28, 2021Updated 5 years ago
- The code of APP, Scalable Graph Embedding for Asymmetric Proximity. Zhou, Chang and Liu, Yuqiong and Liu, Xiaofei and Liu, Zhongyi and Ga…☆10Nov 11, 2018Updated 7 years ago
- ☆10Jun 23, 2018Updated 7 years ago
- Pascal2 Harvest project QuEst☆14Sep 15, 2014Updated 11 years ago
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆39Dec 13, 2018Updated 7 years ago
- Codes for "Benchmarking the Generation of Fact Checking Explanations"☆10Aug 16, 2024Updated last year
- Code for "Using Embeddings to Correct for Unobserved Confounding"☆10May 31, 2019Updated 6 years ago
- ☆18Aug 23, 2025Updated 5 months ago
- ☆22Dec 18, 2025Updated last month
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 4 years ago
- HPYLMのC++実装☆11May 2, 2017Updated 8 years ago
- [ICML2025] Official codebase for "TeLoGraF: Temporal Logic Planning via Graph-encoded Flow Matching"☆17Jul 14, 2025Updated 7 months ago
- 🤖 Implementation of Self Normalizing Networks (SNN) in PyTorch.☆12Jun 19, 2017Updated 8 years ago
- a suite of finetuned LLMs for atomically precise function calling 🧪☆17Feb 6, 2026Updated last week
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- ☆12Feb 9, 2024Updated 2 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- Neural machine translation with Recurrent Deterministic Policy Gradient☆10Aug 18, 2016Updated 9 years ago
- ☆10Jun 28, 2020Updated 5 years ago
- Official code for AAAI'20 paper "Merging Weak and Active Supervision for Semantic Parsing"☆11Dec 8, 2022Updated 3 years ago
- A metric learning method to learn a provably robust Mahalanobis distance☆10Jan 29, 2022Updated 4 years ago
- ☆51Aug 17, 2024Updated last year
- ACL style for Typst☆21Jan 27, 2026Updated 2 weeks ago
- ☆13Aug 31, 2024Updated last year
- ☆11Jan 21, 2020Updated 6 years ago
- A molecule generation benchmarking platform☆13Feb 22, 2018Updated 7 years ago