☆29Feb 27, 2025Updated last year
Alternatives and similar repositories for BadAgent
Users that are interested in BadAgent are comparing it to the libraries listed below
Sorting:
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆111Sep 27, 2024Updated last year
- ☆23Oct 25, 2024Updated last year
- ☆126Jul 2, 2024Updated last year
- Code for AISTATS'25 paper - On the Power of Adaptive Weighted Aggregation in Heterogeneous Federated Learning and Beyond☆13Sep 23, 2025Updated 5 months ago
- Official repository for "Robust Prompt Optimization for Defending Language Models Against Jailbreaking Attacks"☆62Aug 8, 2024Updated last year
- [ICLR 2022] Boosting Randomized Smoothing with Variance Reduced Classifiers☆11Mar 29, 2022Updated 3 years ago
- ☆12Dec 9, 2020Updated 5 years ago
- [SIGIR'2024 Best Paper Honorable Mention] Official repository for "LDRE: LLM-based Divergent Reasoning and Ensemble for Zero-Shot Compose…☆73Mar 14, 2025Updated last year
- How Robust are Randomized Smoothing based Defenses to Data Poisoning? (CVPR 2021)☆14Jul 16, 2021Updated 4 years ago
- Certified Object Detection with Randomized Median Smoothing☆12Oct 21, 2020Updated 5 years ago
- [ACL 2025] The official code for "AGrail: A Lifelong Agent Guardrail with Effective and Adaptive Safety Detection".☆37Aug 4, 2025Updated 7 months ago
- Produce results of federated algorithms on various benchmarks☆16Oct 11, 2024Updated last year
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆13Aug 22, 2022Updated 3 years ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆57Mar 22, 2025Updated last year
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Nov 5, 2024Updated last year
- The code of paper "Toward Optimal LLM Alignments Using Two-Player Games".☆17Jun 20, 2024Updated last year
- ☆16Jul 17, 2022Updated 3 years ago
- 毕设,分层自嵌入数字水印☆12Sep 2, 2019Updated 6 years ago
- Official implementation for Training Certifiably Robust Neural Networks with Efficient Local Lipschitz Bounds (NeurIPS, 2021).☆25Sep 4, 2022Updated 3 years ago
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆50Jul 24, 2024Updated last year
- AutoLR: Layer-wise Pruning and Auto-tuning of Learning Rates in Fine-tuning of Deep Networks☆17Jan 27, 2021Updated 5 years ago
- ☆37Oct 2, 2024Updated last year
- [ACL 2024] ValueBench: Towards Comprehensively Evaluating Value Orientations and Understanding of Large Language Models☆25Jan 11, 2025Updated last year
- Open One-Stop Moderation Tools for Safety Risks, Jailbreaks, and Refusals of LLMs☆113Dec 2, 2024Updated last year
- ☆72Feb 16, 2025Updated last year
- ☆14May 1, 2023Updated 2 years ago
- Kubernetes cli (kubectl) powered by GPT☆15Apr 20, 2023Updated 2 years ago
- Defending Against Backdoor Attacks Using Robust Covariance Estimation☆22Jul 12, 2021Updated 4 years ago
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated 2 years ago
- 关于Fault-Tolerant Federated Reinforcement Learning with Theoretical Guarantee这篇论文的详细代码解读☆11Dec 27, 2023Updated 2 years ago
- ☆11Jul 5, 2023Updated 2 years ago
- ☆19Oct 2, 2023Updated 2 years ago
- Watermarking LLM papers up-to-date☆11Dec 17, 2023Updated 2 years ago
- Make LLM can control your PC or Server with ssh or terminal.☆25Sep 17, 2025Updated 6 months ago
- Code for Horizontal Federated Learning blog around Credit Scoring☆10Sep 14, 2020Updated 5 years ago
- To Think or Not to Think: Exploring the Unthinking Vulnerability in Large Reasoning Models☆33May 21, 2025Updated 10 months ago
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆206Apr 12, 2025Updated 11 months ago
- Security Attacks on LLM-based Code Completion Tools (AAAI 2025)☆21Dec 31, 2025Updated 2 months ago
- A Computer Vision model that detects guns using YOLOv8☆10May 11, 2023Updated 2 years ago