xlhex / extract_and_transferLinks
☆10Updated 4 years ago
Alternatives and similar repositories for extract_and_transfer
Users that are interested in extract_and_transfer are comparing it to the libraries listed below
Sorting:
- ☆44Updated 2 years ago
- Hidden backdoor attack on NLP systems☆47Updated 4 years ago
- ☆25Updated 3 years ago
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆198Updated 2 years ago
- ☆68Updated 5 years ago
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆40Updated last year
- A curated list of trustworthy Generative AI papers. Daily updating...☆75Updated last year
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆32Updated 3 years ago
- The repository contains the code for analysing the leakage of personally identifiable (PII) information from the output of next word pred…☆101Updated last year
- ☆13Updated last year
- Systematic Evaluation of Membership Inference Privacy Risks of Machine Learning Models☆132Updated last year
- Anti-Backdoor learning (NeurIPS 2021)☆83Updated 2 years ago
- Code for ML Doctor☆92Updated last year
- ☆151Updated last year
- ☆32Updated last year
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆61Updated 2 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆50Updated 3 years ago
- ☆77Updated 3 years ago
- Repo for arXiv preprint "Gradient-based Adversarial Attacks against Text Transformers"☆110Updated 3 years ago
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆44Updated 4 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Updated 3 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Updated 4 years ago
- A unified benchmark problem for data poisoning attacks☆161Updated 2 years ago
- Craft poisoned data using MetaPoison☆54Updated 4 years ago
- ☆21Updated 4 years ago
- ☆19Updated last year
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Updated 5 years ago
- This is the source code for MEA-Defender. Our paper is accepted by the IEEE Symposium on Security and Privacy (S&P) 2024.☆29Updated 2 years ago
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Updated 4 years ago
- ☆19Updated 2 years ago