xlhex / dpnlp
☆9Updated 4 years ago
Alternatives and similar repositories for dpnlp:
Users that are interested in dpnlp are comparing it to the libraries listed below
- ☆18Updated 3 years ago
- ☆12Updated 5 years ago
- The code and data for "Are Large Pre-Trained Language Models Leaking Your Personal Information?" (Findings of EMNLP '22)☆18Updated 2 years ago
- ☆11Updated 2 years ago
- ☆6Updated 2 years ago
- TextHide: Tackling Data Privacy in Language Understanding Tasks☆31Updated 3 years ago
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆29Updated 2 years ago
- CIKM 2021 Full Paper: FedMatch: Federated Learning Over Heterogeneous Question Answering Data☆12Updated 3 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Updated 4 years ago
- ☆27Updated 2 years ago
- ☆27Updated 4 years ago
- ☆71Updated 2 years ago
- Official Repository for Dataset Inference for LLMs☆32Updated 7 months ago
- ☆22Updated 2 years ago
- ☆21Updated last year
- ☆24Updated last year
- Official repo for the paper: Recovering Private Text in Federated Learning of Language Models (in NeurIPS 2022)☆57Updated 2 years ago
- ☆24Updated 3 years ago
- codes for "Searching for an Effective Defender:Benchmarking Defense against Adversarial Word Substitution"☆31Updated last year
- SAFER: A Structure-free Approach For cErtified Robustness to Adversarial Word Substitutions (ACL 2020)☆29Updated 4 years ago
- ☆24Updated 3 years ago
- In-context Example Selection with Influences☆15Updated last year
- 🤫 Code and benchmark for our ICLR 2024 spotlight paper: "Can LLMs Keep a Secret? Testing Privacy Implications of Language Models via Con…☆40Updated last year
- [ICLR'24 Spotlight] DP-OPT: Make Large Language Model Your Privacy-Preserving Prompt Engineer☆38Updated 9 months ago
- Code for "Imitation Attacks and Defenses for Black-box Machine Translations Systems"☆36Updated 4 years ago
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Updated 5 years ago
- DP-Rewrite: Towards Reproducibility and Transparency in Differentially Private Text Rewriting☆14Updated last year
- ☆41Updated last month
- ☆18Updated 3 years ago