当前位置:网站首页>Text attack methods open source code summary
Text attack methods open source code summary
2022-07-24 04:02:00 【River_ Small_ white】
1、Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency
- Time : 2019
- Periodical : Annual Meeting of the Association for Computational Linguistics(A class )
- Attack level : Word class
- Target model : Unidirectional and bidirectional long-term and short-term memory networks 、 Convolutional neural networks
- Attack category : Black box
- Using data sets : Review data set ——IMDB、 News classification data set ——AG’s News、 Question and answer classification data set ——Yahoo! Answers
- Open source code :https://github.com/JHL-HUST/PWWS
- Related analysis blog :https://blog.csdn.net/weixin_44614631/article/details/114697906
2、Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers
- Time : 2018
- Periodical : ieee symposium on security and privacy(A class )
- Attack level : Character level
- Target model : Unidirectional and bidirectional long-term and short-term memory networks
- Using data sets : Review data set IMDB And Enron spam classification dataset
- Open source code :https://github.com/QData/deepWordBug
- Related analysis blog : [https://zhuanlan.zhihu.com/p/113930556](https://zhuanlan.zhihu.com
3、TextBugger: Generating Adversarial Text Against Real-world Applications
- Time : 2019
- Periodical : Network and Distributed Systems Security (NDSS) Symposium(B class )
- Attack level : Character level + Word level ( Change at the same time )
- Target model : LR、CNN and LSTM Model
- Attack category : Black box 、 White box
- Using data sets : IMDB Data set and Rotten Tomatoes Movie Reviews Data sets ( Review data set )
- Open source code : OpenAttack Toolkit available
- Related analysis blog :https://blog.csdn.net/weixin_43646592/article/details/121164946
边栏推荐
- Worthington lysozyme technical description and literature reference
- Introduction to JVM class loading process
- 阿里淘系面试题:Redis 如何实现库存扣减操作和防止被超卖?
- Technical dry goods | evaluation index based on mindspire detailed perflexity language model
- adobe PR2022 没有开放式字幕怎么办?
- The amount of training data is not only applicable to.Z, according to the receiver's view of the number
- 复杂嵌套的对象池(5)——对象池的统一管理和拓展
- 【新手向 】手把手开发一个易于扩展的 Tabs 组件
- Sqlserver backup restore
- Matlab ode45 solving differential equations
猜你喜欢

6-14 vulnerability exploitation rpcbind vulnerability exploitation

(5) Digital electricity formula simplification method

Common properties and traversal of trees and binary trees

The impact of Patrick mchardy incident on the open source community

Pat class a 1040 long symmetric string

PAT甲级 1041 Be Unique

Jinglianwen technology provides 3D point cloud image annotation service

监听div的滚动事件 @scroll

Extend the connection boundary, expand the business scope, and comprehensively move towards the era of Intelligent Cloud network 2.0

What is the product and expressiveness of 113700 Xingrui? Come and have a look
随机推荐
Mongo from start to installation and problems encountered
How did I get four offers in a week?
Leetcode 20 valid parentheses, 33 search rotation sort array, 88 merge two ordered arrays (nums1 length is m+n), 160 intersecting linked list, 54 spiral matrix, 415 character addition (cannot be direc
MySQL cannot be accessed. Navicat prompt: is not allowed to connect to this MySQL server
The value is 0. The other part includes but is not limited to the following. This question is
训练赛《眼不见,心不烦,理不乱》题解
The list should be quickly familiar with and supported by shengteng AI processor
Insider of LAN SDN hard core technology 22 Kang long regrets -- Specifications and restrictions (Part 2)
会话技术相关
LAN SDN technology hard core insider 10 cloud converged matchmaker evpn
What if Adobe pr2022 doesn't have open subtitles?
2022 China software products national tour exhibition is about to set sail
Send data 1010_ 1. The number of bytes passed by the sender
Worthington's test of hepatocyte separation system and related optimization schemes
Function application of 4G transmission module
6-15 vulnerability exploitation SMB rce remote command execution
flask框架中页面跳转与重定向
Collection of test case design methods
Preliminary use of swagger2
发送数据1010_1发人员通过 字节的