Code associated with ICML (2024). "Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normalization"
☆10Feb 22, 2026Updated last month
Alternatives and similar repositories for PURE
Users that are interested in PURE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Dec 12, 2023Updated 2 years ago
- TextGuard: Provable Defense against Backdoor Attacks on Text Classification☆15Nov 7, 2023Updated 2 years ago
- ☆18Aug 15, 2022Updated 3 years ago
- ☆26Dec 1, 2022Updated 3 years ago
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"☆26Aug 20, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆201Apr 10, 2023Updated 2 years ago
- ☆29Aug 21, 2023Updated 2 years ago
- NeurIPS'24 - LLM Safety Landscape☆39Oct 21, 2025Updated 5 months ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆39Dec 24, 2023Updated 2 years ago
- Code for the paper: Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions☆11Mar 13, 2024Updated 2 years ago
- Two-party Privacy-preserving Neural Network Training using Split Learning and Homomorphic Encryption (CKKS Scheme)☆11Sep 23, 2025Updated 6 months ago
- ☆14Feb 26, 2025Updated last year
- ☆12Aug 6, 2024Updated last year
- [NeurIPS'24] Official implement of "PrivCirNet: Efficient Private Inference via Block Circulant Transformation"☆15Feb 26, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ESEC/FSE'21: Prediction-Preserving Program Simplification☆10Oct 4, 2022Updated 3 years ago
- PyTorch 1.11 reimplementation of multi task gradient adaptation ideas: Gradient Surgery (PCGrad) and Gradient Vaccine☆21Jun 20, 2022Updated 3 years ago
- Adversarial Attack for Pre-trained Code Models☆10Jul 19, 2022Updated 3 years ago
- All-day Semantic Segmentation & All-day CityScapes dataset☆13Jul 26, 2025Updated 8 months ago
- An evaluation framework for mitigating DNN backdoor attacks using data augmentations☆11Dec 10, 2020Updated 5 years ago
- Code and data for the paper "Dual Dynamic Memory Network for End-to-End Multi-turn Task-oriented Dialog Systems".☆14Aug 16, 2022Updated 3 years ago
- ☆11Feb 21, 2022Updated 4 years ago
- RootCLAM: On Root Cause Localization and Anomaly Mitigation through Causal Inference (CIKM 2023)☆18Apr 1, 2025Updated 11 months ago
- In this project, we used 3 different metrics (Information Gain, Mutual Information, Chi Squared) to find important words and then we used…☆13Aug 7, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Implementation for the protocols described in https://eprint.iacr.org/2023/1700☆14Jan 9, 2025Updated last year
- Code release for MPCViT accepted by ICCV 2023☆16Jan 6, 2025Updated last year
- A repository containing the code for the paper "Incorporating Domain Knowledge into Medical NLI using Knowledge Graphs" EMNLP 2019☆13Nov 2, 2019Updated 6 years ago
- SocialDial: A Benchmark for Socially-Aware Dialogue Systems (SIGIR'23)☆16Aug 4, 2023Updated 2 years ago
- Chinese Medical Named Entity Recognition (MedNER) using BERT as backbone in PyTorch☆11Oct 17, 2022Updated 3 years ago
- ☆25Jul 20, 2022Updated 3 years ago
- ☆14May 23, 2023Updated 2 years ago
- Papers on trustworthy anomaly detection☆28Apr 18, 2024Updated last year
- Single Threaded CPU Scheduling Simulator☆11Dec 21, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Code for "End-to-End Learning of Flowchart Grounded Task-Oriented Dialogs"☆14Oct 10, 2022Updated 3 years ago
- ☆16Feb 3, 2022Updated 4 years ago
- The implementation of the IEEE S&P 2024 paper MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Us…☆16May 12, 2024Updated last year
- ☆16Feb 28, 2025Updated last year
- Continuous Bag-of-Words (CBOW model implemented in pytorch☆14Feb 27, 2018Updated 8 years ago
- Official implementation of the USENIX Security 2024 paper ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks.☆23Dec 6, 2023Updated 2 years ago
- ☆18Feb 10, 2022Updated 4 years ago