xingyizhao / PURELinks
Code associated with ICML (2024). "Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normalization"
☆10Updated 11 months ago
Alternatives and similar repositories for PURE
Users that are interested in PURE are comparing it to the libraries listed below
Sorting:
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆43Updated 3 years ago
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆195Updated 2 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆26Updated 4 years ago
- ☆25Updated 2 years ago
- ☆19Updated last year
- Natural Language Attacks in a Hard Label Black Box Setting.☆48Updated 4 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Updated 3 years ago
- Repository for Towards Codable Watermarking for Large Language Models☆38Updated 2 years ago
- Hidden backdoor attack on NLP systems☆47Updated 4 years ago
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆35Updated 4 years ago
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆40Updated last year
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆46Updated 3 years ago
- LAMP: Extracting Text from Gradients with Language Model Priors (NeurIPS '22)☆26Updated 5 months ago
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆31Updated 3 years ago
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"☆22Updated 3 months ago
- Robust natural language watermarking using invariant features☆27Updated 2 years ago
- Repo for arXiv preprint "Gradient-based Adversarial Attacks against Text Transformers"☆109Updated 2 years ago
- ☆76Updated 3 years ago
- ☆32Updated last year
- Fingerprint large language models☆43Updated last year
- ☆68Updated 5 years ago
- This is the code repository of our submission: Understanding the Dark Side of LLMs’ Intrinsic Self-Correction.☆63Updated 11 months ago
- ☆26Updated 2 years ago
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆43Updated 4 years ago
- Code and data for our paper "Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark"…☆51Updated 2 years ago
- TrojanLM: Trojaning Language Models for Fun and Profit☆16Updated 4 years ago
- A survey of privacy problems in Large Language Models (LLMs). Contains summary of the corresponding paper along with relevant code☆68Updated last year
- ☆36Updated last year
- ☆18Updated 3 years ago
- ☆21Updated last year