☆25May 28, 2025Updated 11 months ago
Alternatives and similar repositories for AdvAgent
Users that are interested in AdvAgent are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- On the Robustness of GUI Grounding Models Against Image Attacks☆12Apr 8, 2025Updated last year
- Code for ICCV2025 paper——IDEATOR: Jailbreaking and Benchmarking Large Vision-Language Models Using Themselves☆17Jul 11, 2025Updated 10 months ago
- ☆35Mar 6, 2025Updated last year
- ☆29Aug 31, 2025Updated 8 months ago
- ☆40Oct 2, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- ☆33May 14, 2026Updated last week
- [ICML 2025] X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP☆46Feb 3, 2026Updated 3 months ago
- Comprehensive Assessment of Trustworthiness in Multimodal Foundation Models☆30Mar 15, 2025Updated last year
- ☆13Oct 21, 2021Updated 4 years ago
- Example agents for the Dreadnode platform☆33Dec 19, 2025Updated 5 months ago
- [CVPR 2025] Official implementation for "Steering Away from Harm: An Adaptive Approach to Defending Vision Language Model Against Jailbre…☆60Jul 5, 2025Updated 10 months ago
- This is the source code for MEA-Defender. Our paper is accepted by the IEEE Symposium on Security and Privacy (S&P) 2024.☆29Nov 19, 2023Updated 2 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Oct 8, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆112Sep 27, 2024Updated last year
- ☆18Aug 15, 2022Updated 3 years ago
- Evaluating Safety of Autonomous Agents in Mobile Device Control (AAAI 2026 AI Alignment Track)☆33Jan 28, 2026Updated 3 months ago
- ☆48Sep 29, 2024Updated last year
- ☆20Feb 11, 2024Updated 2 years ago
- [EMNLP 2022] Distillation-Resistant Watermarking (DRW) for Model Protection in NLP☆13Aug 17, 2023Updated 2 years ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆47May 17, 2023Updated 3 years ago
- [NeurIPS 2022] "Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets" by Ruisi Cai*, Zhenyu Zh…☆21Oct 1, 2022Updated 3 years ago
- ToolFuzz is a fuzzing framework designed to test your LLM Agent tools.☆41Jul 20, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This dataset contains results from all rounds of Adversarial Nibbler. This data includes adversarial prompts fed into public generative t…☆27Feb 3, 2025Updated last year
- ☆18Jan 3, 2025Updated last year
- ☆11Nov 12, 2024Updated last year
- InferredBugs: a metadata-rich dataset of bugs and fixes in Java and C# programming languages extracted with the Infer static analyzer☆37Nov 30, 2023Updated 2 years ago
- ☆18Nov 13, 2021Updated 4 years ago
- TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a…☆87Sep 1, 2025Updated 8 months ago
- ☆23Sep 20, 2023Updated 2 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆23Sep 8, 2021Updated 4 years ago
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Feb 27, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A simple template for theoretical computer science assignments☆12Sep 6, 2023Updated 2 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Dec 9, 2021Updated 4 years ago
- ☆26Dec 1, 2022Updated 3 years ago
- Official repository for "On the Multi-modal Vulnerability of Diffusion Models"☆16Jul 15, 2024Updated last year
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 3 years ago
- ☆47Feb 26, 2025Updated last year
- Open-sourced evaluation suite from the Monitoring Monitorability paper☆75Apr 22, 2026Updated 3 weeks ago