Official PyTorch implementation of "Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian Optimization" (ICML'22)
☆26Sep 26, 2023Updated 2 years ago
Alternatives and similar repositories for DiscreteBlockBayesAttack
Users that are interested in DiscreteBlockBayesAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- [NAACL 2022] "SemAttack: Natural Textual Attacks via Different Semantic Spaces" by Boxin Wang, Chejian Xu, Xiangyu Liu, Yu Cheng, Bo Li☆21Jun 11, 2022Updated 3 years ago
- About Official PyTorch implementation of "Query-Efficient Black-Box Red Teaming via Bayesian Optimization" (ACL'23)☆15Jul 9, 2023Updated 2 years ago
- Baselines for Model-Based Optimization installation fixes and compatible with newer AMPERE+ GPUs (e.g. 3090)☆11Apr 30, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Code for "Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes"☆15Dec 20, 2020Updated 5 years ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆42Dec 7, 2020Updated 5 years ago
- This is the code for our paper: Increasing the Scope as You Learn: Adaptive Bayesian Optimization in Nested Subspaces (Leonard Papenmeier…☆21Jan 5, 2024Updated 2 years ago
- Data-Efficient Backdoor Attacks☆20Jun 15, 2022Updated 3 years ago
- Natural Language Attacks in a Hard Label Black Box Setting.☆50May 26, 2021Updated 4 years ago
- Code for NeurIPS 2024 Paper "Fight Back Against Jailbreaking via Prompt Adversarial Tuning"☆22May 6, 2025Updated 11 months ago
- Official repository for "On the Multi-modal Vulnerability of Diffusion Models"☆16Jul 15, 2024Updated last year
- Code to reproduce experiments in "Accelerating Bayesian Optimization for Protein Design with Denoising Autoencoders" (Stanton et al 2022)☆76May 19, 2024Updated last year
- ☆29Feb 8, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Official PyTorch implementation of "Efficient Latency-Aware CNN Depth Compression via Two-Stage Dynamic Programming" (ICML'23)☆13Jul 11, 2024Updated last year
- Targeted black-box adversarial attack using Bayesian Optimization☆38Jun 14, 2020Updated 5 years ago
- ☆12Aug 13, 2022Updated 3 years ago
- ☆10Aug 22, 2023Updated 2 years ago
- "Learning Discrete and Continuous Factors of Data via Alternating Disentanglement" accepted at ICML2019☆22Aug 22, 2019Updated 6 years ago
- ☆12Mar 15, 2019Updated 7 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Jun 3, 2020Updated 5 years ago
- ☆12Apr 27, 2022Updated 3 years ago
- This repository contains the official code for the paper: "Prompt Injection: Parameterization of Fixed Inputs"☆32Sep 13, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Dec 12, 2021Updated 4 years ago
- Python implementation for Combining Latent Space and Structured Kernels for Bayesian Optimization over Combinatorial Spaces.☆13Nov 30, 2021Updated 4 years ago
- Bad Characters: Imperceptible NLP Attacks☆36Apr 9, 2024Updated 2 years ago
- Python implementation of the supervised graph prediction method proposed in http://arxiv.org/abs/2202.03813 using PyTorch library and POT…☆15Feb 25, 2022Updated 4 years ago
- [NeurIPS 2025 Spotlight] Implementation of "KLASS: KL-Guided Fast Inference in Masked Diffusion Models"☆29Jan 3, 2026Updated 3 months ago
- ☆17Dec 8, 2023Updated 2 years ago
- Official Implementation of "Doubly Mixed-Effects Gaussian Process Regression" (Jun Ho Yoon, Daniel P. Jeong, Seyoung Kim) (AISTATS 2022, …☆12Jul 13, 2022Updated 3 years ago
- ☆28Oct 14, 2021Updated 4 years ago
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆16Jul 19, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Official implementation of NeurIPS'23 paper "Sample-efficient Multi-objective Molecular Optimization with GFlowNets"☆20Dec 24, 2023Updated 2 years ago
- TGLS: Unsupervised Text Generation by Learning from Search☆25Jan 5, 2021Updated 5 years ago
- [ECCV 2020] Pytorch codes for Open-set Adversarial Defense☆21Mar 20, 2022Updated 4 years ago
- ☆19Mar 5, 2018Updated 8 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- ☆57Jul 27, 2022Updated 3 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Oct 1, 2022Updated 3 years ago