xiaosen-wang / SEMLinks
Code for Natural Language Adversarial Attacks and Defenses in Word Level
☆8Updated 5 years ago
Alternatives and similar repositories for SEM
Users that are interested in SEM are comparing it to the libraries listed below
Sorting:
- Natural Language Attacks in a Hard Label Black Box Setting.☆47Updated 4 years ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- Paper list of Adversarial Examples☆51Updated last year
- ☆79Updated 5 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆57Updated 9 months ago
- ☆51Updated 3 years ago
- ☆11Updated 5 years ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆34Updated 2 years ago
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆185Updated 2 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆117Updated 6 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆179Updated 2 years ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆127Updated 9 months ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆43Updated 2 years ago
- ☆82Updated 4 years ago
- For Certified Robustness to Text Adversarial Attacks by Randomized [MASK]☆16Updated 10 months ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆32Updated 5 years ago
- ☆79Updated 2 years ago
- 复现了下Neural Cleanse这篇论文,真的是简单而有效,发在了okaland☆30Updated 4 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆293Updated last year
- Code for ACL2018 HotFlip: White-Box Adversarial Examples for Text Classification, Word-level Adversarial Examples☆36Updated 6 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆35Updated last year
- Library containing PyTorch implementations of various adversarial attacks and resources☆161Updated last month
- ☆50Updated 11 months ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆97Updated 3 years ago
- Official implementation of (CVPR 2022 Oral) Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.☆26Updated last month
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆47Updated 6 years ago
- ☆11Updated 3 years ago
- Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks☆24Updated 4 years ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆129Updated last year
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆26Updated 2 years ago