CryptoAILab / misalignmentLinks
[NDSS'25] The official implementation of safety misalignment.
☆17Updated 11 months ago
Alternatives and similar repositories for misalignment
Users that are interested in misalignment are comparing it to the libraries listed below
Sorting:
- Accept by CVPR 2025 (highlight)☆21Updated 6 months ago
- ☆37Updated last year
- ☆37Updated 7 months ago
- ☆37Updated last year
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆44Updated last year
- ☆21Updated last year
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Updated last year
- ☆13Updated last year
- ☆52Updated last year
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆32Updated last year
- This is the code repository of our submission: Understanding the Dark Side of LLMs’ Intrinsic Self-Correction.☆63Updated last year
- Fingerprint large language models☆47Updated last year
- ☆14Updated 9 months ago
- ☆32Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆103Updated last year
- A curated list of trustworthy Generative AI papers. Daily updating...☆75Updated last year
- Comprehensive Assessment of Trustworthiness in Multimodal Foundation Models☆25Updated 9 months ago
- ☆18Updated 3 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Updated 5 months ago
- ☆37Updated last year
- Official Code for ACL 2024 paper "GradSafe: Detecting Unsafe Prompts for LLMs via Safety-Critical Gradient Analysis"☆60Updated last year
- Code for Neurips 2024 paper "Shadowcast: Stealthy Data Poisoning Attacks Against Vision-Language Models"☆58Updated 11 months ago
- ☆113Updated 10 months ago
- Code for NeurIPS 2024 Paper "Fight Back Against Jailbreaking via Prompt Adversarial Tuning"☆22Updated 7 months ago
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queries☆55Updated last month
- ☆27Updated 2 years ago
- To Think or Not to Think: Exploring the Unthinking Vulnerability in Large Reasoning Models☆32Updated 6 months ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Updated last year
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆20Updated 2 years ago
- ☆32Updated last month