1 |
Perturbations in the Wild: Leveraging Human-Written Text Perturbations for Realistic Adversarial Attack and Defense ...
|
|
|
|
BASE
|
|
Show details
|
|
2 |
MelBERT: Metaphor Detection via Contextualized Late Interaction using Metaphorical Identification Theories ...
|
|
|
|
BASE
|
|
Show details
|
|
3 |
MelBERT: Metaphor Detection via Contextualized Late Interaction using Metaphorical Identification Theories ...
|
|
|
|
BASE
|
|
Show details
|
|
4 |
A Sweet Rabbit Hole by DARCY: Using Honeypots to Detect Universal Trigger's Adversarial Attacks ...
|
|
|
|
BASE
|
|
Show details
|
|
5 |
SHIELD: Defending Textual Neural Networks against Multiple Black-Box Adversarial Attacks with Stochastic Multi-Expert Patcher ...
|
|
|
|
BASE
|
|
Show details
|
|
6 |
A Sweet Rabbit Hole by DARCY: Using Honeypots to Detect Universal Trigger's Adversarial Attacks ...
|
|
|
|
BASE
|
|
Show details
|
|
7 |
The ACL Anthology Reference Corpus: A Reference Dataset for Bibliographic Research in Computational Linguistics
|
|
|
|
BASE
|
|
Show details
|
|
|
|