☆10Jun 5, 2021Updated 4 years ago
Alternatives and similar repositories for extract_and_transfer
Users that are interested in extract_and_transfer are comparing it to the libraries listed below
Sorting:
- A2T: Towards Improving Adversarial Training of NLP Models (EMNLP 2021 Findings)☆27Sep 12, 2021Updated 4 years ago
- CME: Concept-based Model Extraction☆12Nov 24, 2020Updated 5 years ago
- ☆14May 8, 2024Updated last year
- Code for "Imitation Attacks and Defenses for Black-box Machine Translations Systems"☆35May 1, 2020Updated 5 years ago
- ☆20Aug 4, 2024Updated last year
- ☆19Mar 6, 2023Updated 2 years ago
- [NAACL 2022] "SemAttack: Natural Textual Attacks via Different Semantic Spaces" by Boxin Wang, Chejian Xu, Xiangyu Liu, Yu Cheng, Bo Li☆21Jun 11, 2022Updated 3 years ago
- Black-Box Ripper: Copying black-box models using generative evolutionary algorithms - NIPS 2020 - Official Implementation☆29Oct 25, 2020Updated 5 years ago
- Copycat CNN☆28Apr 17, 2024Updated last year
- ☆32Feb 10, 2022Updated 4 years ago
- 北京 青年大学习 使用Github Actions自动完成☆10Nov 5, 2022Updated 3 years ago
- Reading comprehension based question-answering model for news articles.☆11Jun 22, 2022Updated 3 years ago
- ☆10Sep 24, 2019Updated 6 years ago
- ☆10Oct 2, 2024Updated last year
- ☆10Jul 13, 2024Updated last year
- Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar☆11Oct 17, 2020Updated 5 years ago
- [ICLR 2021] "InfoBERT: Improving Robustness of Language Models from An Information Theoretic Perspective" by Boxin Wang, Shuohang Wang, Y…☆85Oct 25, 2023Updated 2 years ago
- https://icml.cc/virtual/2023/poster/24354☆10Aug 15, 2023Updated 2 years ago
- ☆39May 19, 2023Updated 2 years ago
- Code for the paper: Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions☆11Mar 13, 2024Updated last year
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- Source code of 2023 ITHome Ironman Challenge☆14Oct 1, 2023Updated 2 years ago
- A list of recent adversarial attack and defense papers (including those on large language models)☆45Jan 25, 2026Updated last month
- Pre-trained Online Contrastive Learning for Insurance Fraud Detection☆12Jul 12, 2024Updated last year
- [ICLR 2022] Boosting Randomized Smoothing with Variance Reduced Classifiers☆12Mar 29, 2022Updated 3 years ago
- 📄 [Talk] OFFZONE 2022 / ODS Data Halloween 2022: Black-box attacks on ML models + with use of open-source tools☆14May 23, 2023Updated 2 years ago
- ☆13Jun 10, 2023Updated 2 years ago
- Official Implementation of paper https://arxiv.org/abs/1801.02612☆13Jun 16, 2020Updated 5 years ago
- ☆10Apr 21, 2022Updated 3 years ago
- [NeurIPS 2022] Explaining Graph Neural Networks with Structure-Aware Cooperative Games (GStarX)☆14Oct 20, 2022Updated 3 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Awesome-Adversarial-Attack-Methods-Summary☆12Jul 24, 2024Updated last year
- [Journal of Artificial Intelligence Research] Source code for our paper "Exploiting Cultural Biases via Homoglyphs in Text-to-Image Synth…☆12Jan 8, 2024Updated 2 years ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- MCP server for Ethereum research: EIP-1559, Blobs, and MEV analytics powered by Dune☆23Nov 27, 2025Updated 3 months ago
- Code of our paper "Method-Level Bug Severity Prediction using Source Code Metrics and LLMs" which is accepted to ISSRE 2023.☆10Nov 12, 2023Updated 2 years ago
- TYPO3 Extension ⇢ Integration of sendinblue as finisher of the form extension☆12Jan 23, 2025Updated last year
- All code and content for my blog.☆15Sep 23, 2018Updated 7 years ago