☆25Jun 23, 2021Updated 4 years ago
Alternatives and similar repositories for NeuBA
Users that are interested in NeuBA are comparing it to the libraries listed below
Sorting:
- ☆11Feb 21, 2022Updated 4 years ago
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆44Jul 26, 2021Updated 4 years ago
- [WWW '25] Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability☆18May 30, 2025Updated 9 months ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Dec 9, 2021Updated 4 years ago
- codes for paper "learning to discriminate perturbations for blocking adversarial attacks in text classification" in EMNLP19☆15Feb 25, 2020Updated 6 years ago
- ☆26Dec 1, 2022Updated 3 years ago
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆32Jul 11, 2022Updated 3 years ago
- ☆18Feb 10, 2022Updated 4 years ago
- ☆16Aug 14, 2022Updated 3 years ago
- Anti-Backdoor learning (NeurIPS 2021)☆84Jul 20, 2023Updated 2 years ago
- [Preprint] Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis☆10Sep 23, 2021Updated 4 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆22Sep 8, 2021Updated 4 years ago
- ☆14Jul 13, 2022Updated 3 years ago
- ☆10Jan 31, 2022Updated 4 years ago
- Hidden backdoor attack on NLP systems☆46Nov 14, 2021Updated 4 years ago
- ☆83Aug 3, 2021Updated 4 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆29Dec 31, 2024Updated last year
- Natural Universal Trigger Search (NUTS)☆21Apr 17, 2021Updated 4 years ago
- Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)☆142Sep 22, 2025Updated 6 months ago
- [ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining☆19Feb 26, 2025Updated last year
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆200Apr 10, 2023Updated 2 years ago
- [NeurIPS'22] Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork. Haotao Wang, Junyuan Hong,…☆15Nov 27, 2023Updated 2 years ago
- Code associated with ICML (2024). "Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normaliz…☆10Feb 22, 2026Updated last month
- BackdoorMBTI is an open source project expanding the unimodal backdoor learning to a multimodal context. We hope that BackdoorMBTI can fa…☆25Updated this week
- ☆11Jan 25, 2022Updated 4 years ago
- This dataset contains results from all rounds of Adversarial Nibbler. This data includes adversarial prompts fed into public generative t…☆25Feb 3, 2025Updated last year
- ☆19Nov 6, 2023Updated 2 years ago
- ☆27Nov 20, 2023Updated 2 years ago
- ☆13Oct 19, 2023Updated 2 years ago
- Code for paper "Poisoned classifiers are not only backdoored, they are fundamentally broken"☆26Jan 7, 2022Updated 4 years ago
- An evaluation framework for mitigating DNN backdoor attacks using data augmentations☆11Dec 10, 2020Updated 5 years ago
- Official repository for Physics Informed Token Transformer (PITT)☆24Feb 24, 2024Updated 2 years ago
- ☆70Feb 4, 2024Updated 2 years ago
- [USENIX'25] HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns☆13Mar 1, 2025Updated last year
- A minimal PyTorch implementation of Label-Consistent Backdoor Attacks☆29Feb 8, 2021Updated 5 years ago
- Distilling Task-Specific Knowledge from BERT into Simple Neural Networks.☆15Aug 28, 2020Updated 5 years ago
- Know2BIO: A Comprehensive Dual-View Benchmark for Evolving Biomedical Knowledge Graphs☆14Feb 10, 2026Updated last month
- ☆14Dec 12, 2023Updated 2 years ago