CTZhou-byte / TrojanRAGLinks
☆12Updated 7 months ago
Alternatives and similar repositories for TrojanRAG
Users that are interested in TrojanRAG are comparing it to the libraries listed below
Sorting:
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆176Updated 5 months ago
- multi-bit language model watermarking (NAACL 24)☆13Updated 10 months ago
- ☆51Updated last year
- ☆32Updated 9 months ago
- A survey on harmful fine-tuning attack for large language model☆202Updated this week
- [ACL2024-Main] Data and Code for WaterBench: Towards Holistic Evaluation of LLM Watermarks☆28Updated last year
- Repo for SemStamp (NAACL2024) and k-SemStamp (ACL2024)☆22Updated 8 months ago
- ☆20Updated last year
- A resource repository for machine unlearning in large language models☆454Updated 3 weeks ago
- ☆20Updated 5 months ago
- ☆58Updated 2 months ago
- [NAACL2024] Attacks, Defenses and Evaluations for LLM Conversation Safety: A Survey☆106Updated last year
- UP-TO-DATE LLM Watermark paper. 🔥🔥🔥☆351Updated 7 months ago
- This is the code repository for "Uncovering Safety Risks of Large Language Models through Concept Activation Vector"☆43Updated 8 months ago
- 😎 up-to-date & curated list of awesome Attacks on Large-Vision-Language-Models papers, methods & resources.☆349Updated last week
- ☆82Updated last year
- ☆18Updated 10 months ago
- ☆22Updated last year
- Repository for Towards Codable Watermarking for Large Language Models☆38Updated last year
- ☆97Updated 6 months ago
- [ACL 2024] Defending Large Language Models Against Jailbreaking Attacks Through Goal Prioritization☆26Updated last year
- [AAAI'25 (Oral)] Jailbreaking Large Vision-language Models via Typographic Visual Prompts☆160Updated last month
- The code for paper "The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation (RAG)", exploring the privacy risk o…☆54Updated 6 months ago
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆22Updated 6 months ago
- ☆35Updated 10 months ago
- The lastest paper about detection of LLM-generated text and code☆275Updated last month
- ☆32Updated 2 months ago
- ☆16Updated 2 months ago
- Accepted by ECCV 2024☆147Updated 9 months ago
- Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM☆34Updated 6 months ago