☆28Feb 27, 2025Updated last year
Alternatives and similar repositories for BadAgent
Users that are interested in BadAgent are comparing it to the libraries listed below
Sorting:
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆109Sep 27, 2024Updated last year
- [ACL 2025] The official code for "AGrail: A Lifelong Agent Guardrail with Effective and Adaptive Safety Detection".☆33Aug 4, 2025Updated 6 months ago
- ☆23Oct 25, 2024Updated last year
- ☆117Jul 2, 2024Updated last year
- Overcooked! 2 TAS Development Framework☆10Aug 18, 2023Updated 2 years ago
- ☆13Oct 21, 2024Updated last year
- [ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yi…☆13Jul 17, 2024Updated last year
- [NeurIPS 2025] The official implementation of the paper "DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agen…☆39Feb 14, 2026Updated 2 weeks ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Nov 5, 2024Updated last year
- Open One-Stop Moderation Tools for Safety Risks, Jailbreaks, and Refusals of LLMs☆108Dec 2, 2024Updated last year
- ☆20Feb 3, 2025Updated last year
- The Universal Algebra Calculator☆16Jun 11, 2022Updated 3 years ago
- [ICLR 2022] Boosting Randomized Smoothing with Variance Reduced Classifiers☆12Mar 29, 2022Updated 3 years ago
- 关于Fault-Tolerant Federated Reinforcement Learning with Theoretical Guarantee这篇论文的详细代码解读☆11Dec 27, 2023Updated 2 years ago
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆48Jul 24, 2024Updated last year
- ☆11Jul 5, 2023Updated 2 years ago
- Certified Object Detection with Randomized Median Smoothing☆12Oct 21, 2020Updated 5 years ago
- Unofficail pytorch implementation of BigBiGAN☆11Mar 26, 2021Updated 4 years ago
- Codes for our paper "AgentMonitor: A Plug-and-Play Framework for Predictive and Secure Multi-Agent Systems"☆13Dec 13, 2024Updated last year
- ☆11Apr 3, 2024Updated last year
- CVE-2019-2725 bypass pocscan and exp☆11Jun 21, 2019Updated 6 years ago
- A Computer Vision model that detects guns using YOLOv8☆10May 11, 2023Updated 2 years ago
- Watermarking LLM papers up-to-date☆11Dec 17, 2023Updated 2 years ago
- ☆15Mar 19, 2022Updated 3 years ago
- ☆11Dec 8, 2022Updated 3 years ago
- Code for Horizontal Federated Learning blog around Credit Scoring☆10Sep 14, 2020Updated 5 years ago
- Nopeek experiments☆14Jun 12, 2020Updated 5 years ago
- Phase-aware Adversarial Defense for Improving Adversarial Robustness☆11Oct 12, 2023Updated 2 years ago
- A Generated Face Dataset: AGFD-20K. A Realistic, High-resolution, Vary & Balanced face dataset, generated by stable diffusion.☆11Nov 5, 2023Updated 2 years ago
- QT/C++ 计算器☆14Feb 21, 2020Updated 6 years ago
- ☆14May 1, 2023Updated 2 years ago
- Bytecode based Fuzzer for the PHP language☆12Jul 22, 2020Updated 5 years ago
- How Robust are Randomized Smoothing based Defenses to Data Poisoning? (CVPR 2021)☆14Jul 16, 2021Updated 4 years ago
- The official implementation of CVPR 2025 paper "Invisible Backdoor Attack against Self-supervised Learning"☆17Jul 5, 2025Updated 7 months ago
- A blanket execution/min hash semantic hash tool for binary function identification☆18Apr 22, 2016Updated 9 years ago
- ☆12Dec 9, 2020Updated 5 years ago
- Code for our NeurIPS 2023 paper Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly☆14Jan 22, 2024Updated 2 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆13Oct 3, 2024Updated last year
- A Library for Classical Propositional Logic in Agda☆16Nov 19, 2019Updated 6 years ago