shizhouxing / Robustness-Verification-for-TransformersView external linksLinks
[ICLR 2020] Code for paper "Robustness Verification for Transformers"
☆27Nov 26, 2024Updated last year
Alternatives and similar repositories for Robustness-Verification-for-Transformers
Users that are interested in Robustness-Verification-for-Transformers are comparing it to the libraries listed below
Sorting:
- Official repository for Jia, Raghunathan, Göksel, and Liang, "Certified Robustness to Adversarial Word Substitutions" (EMNLP 2019)☆38Dec 30, 2019Updated 6 years ago
- ☆25May 6, 2021Updated 4 years ago
- This repository contains a simple implementation of Interval Bound Propagation (IBP) using TensorFlow: https://arxiv.org/abs/1810.12715☆161Dec 20, 2019Updated 6 years ago
- ACL 2021 - Defense against Adversarial Attacks in NLP via Dirichlet Neighborhood Ensemble☆18Jun 12, 2023Updated 2 years ago
- auto_LiRPA: An Automatic Linear Relaxation based Perturbation Analysis Library for Neural Networks and General Computational Graphs☆338Feb 3, 2026Updated last week
- This is the code of our work CISS Certified Robustness Against Natural Language Attacks by Causal Intervention published on ICML 2022☆11Dec 6, 2022Updated 3 years ago
- [NeurIPS 2021] Fast Certified Robust Training with Short Warmup☆25Jun 7, 2025Updated 8 months ago
- codes for paper "learning to discriminate perturbations for blocking adversarial attacks in text classification" in EMNLP19☆15Feb 25, 2020Updated 5 years ago
- All code for the Piecewise Linear Neural Networks verification: A comparative study paper☆35Nov 7, 2018Updated 7 years ago
- Dataset accompanying the paper "Adaptive Methods for Real-World Domain Generalization"☆16Aug 17, 2023Updated 2 years ago
- A Leaderboard for Certifiable Robustness against Adversarial Patch Attacks☆20Oct 30, 2023Updated 2 years ago
- Certified defense to adversarial examples using CROWN and IBP. Also includes GPU implementation of CROWN verification algorithm (in PyTor…☆98Jun 7, 2021Updated 4 years ago
- ☆35Jan 16, 2026Updated 3 weeks ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Oct 8, 2020Updated 5 years ago
- Benchmark for LP-relaxed robustness verification of ReLU-networks☆42Apr 24, 2019Updated 6 years ago
- Adversarial examples for Seq2Seq model in NLP☆40Nov 3, 2018Updated 7 years ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆90Mar 24, 2023Updated 2 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Dec 9, 2021Updated 4 years ago
- Attack AlphaZero Go agents (NeurIPS 2022)☆22Dec 3, 2022Updated 3 years ago
- ☆26Dec 1, 2022Updated 3 years ago
- Robustify Black-Box Models (ICLR'22 - Spotlight)☆24Jan 29, 2023Updated 3 years ago
- [NeurIPS 2019] H. Chen*, H. Zhang*, S. Si, Y. Li, D. Boning and C.-J. Hsieh, Robustness Verification of Tree-based Models (*equal contrib…☆27Jun 15, 2019Updated 6 years ago
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆32Jul 11, 2022Updated 3 years ago
- Source code for the paper "Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness"☆25Feb 12, 2020Updated 6 years ago
- ☆25Nov 21, 2020Updated 5 years ago
- Implementation code for the paper "Generating Natural Language Adversarial Examples"☆170Aug 30, 2019Updated 6 years ago
- codes for "Searching for an Effective Defender:Benchmarking Defense against Adversarial Word Substitution"☆31Oct 27, 2023Updated 2 years ago
- A certifiable defense against adversarial examples by training neural networks to be provably robust☆221Jul 25, 2024Updated last year
- ☆10Dec 21, 2022Updated 3 years ago
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆40Jul 8, 2024Updated last year
- Code for Backdoor Attacks Against Dataset Distillation☆35Apr 19, 2023Updated 2 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Jun 29, 2025Updated 7 months ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 4 months ago
- Simple model for sentence compression (a.k.a Baseline in Klerke et al., NAACL 2016)☆10Dec 16, 2018Updated 7 years ago
- A tool for deploying many tasks automatically.☆11Jan 16, 2025Updated last year
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- https://icml.cc/virtual/2023/poster/24354☆10Aug 15, 2023Updated 2 years ago
- Implementation of NAACL'19 Strong and Simple Baselines for Multimodal Utterance Embeddings☆10Jun 4, 2019Updated 6 years ago
- [ICLR 2021] "UMEC: Unified Model and Embedding Compression for Efficient Recommendation Systems" by Jiayi Shen, Haotao Wang*, Shupeng Gui…☆39Dec 30, 2021Updated 4 years ago