[ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models
☆53Jul 24, 2024Updated last year
Alternatives and similar repositories for BadChain
Users that are interested in BadChain are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Jan 17, 2025Updated last year
- [NeurIPS 2025] BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks and Defenses on Large Language Models☆299Mar 13, 2026Updated 2 months ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆56Jun 2, 2025Updated 11 months ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆88May 14, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆17Feb 7, 2024Updated 2 years ago
- An official PyTorch implementation of "Certifiably Robust Graph Contrastive Learning" (NeurIPS 2023)☆11Jan 22, 2024Updated 2 years ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆112Sep 27, 2024Updated last year
- Towards model-agnostic federated learning using knowledge distillation, ICLR 2022☆10Mar 12, 2022Updated 4 years ago
- [ICML 2025] Weak-to-Strong Jailbreaking on Large Language Models☆90May 2, 2025Updated last year
- ☆137Jul 2, 2024Updated last year
- [ACL 25] SafeChain: Safety of Language Models with Long Chain-of-Thought Reasoning Capabilities☆30Apr 2, 2025Updated last year
- The source code for Adaptive Kernel Graph Neural Network at AAAI2022☆14Feb 23, 2022Updated 4 years ago
- Code for NeurIPS 2024 Paper "Fight Back Against Jailbreaking via Prompt Adversarial Tuning"☆22May 6, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Official implementation of the WASP web agent security benchmark☆85Apr 13, 2026Updated last month
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆19Mar 9, 2025Updated last year
- ☆31Feb 27, 2025Updated last year
- ☆26Nov 4, 2024Updated last year
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆215Apr 12, 2025Updated last year
- A fast + lightweight implementation of the GCG algorithm in PyTorch☆331May 13, 2025Updated last year
- Example code for the NNGeometry PyTorch library☆10Aug 20, 2025Updated 9 months ago
- ☆14Oct 6, 2024Updated last year
- ☆38Oct 17, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM☆39Jan 17, 2025Updated last year
- repo in several methods FedAvg, FedMD, FedProto, FedProx, FedHKD.☆28Nov 21, 2023Updated 2 years ago
- Code and dataset for the paper: "Can Editing LLMs Inject Harm?" [AAAI'26]☆21Dec 26, 2025Updated 4 months ago
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆21Aug 10, 2024Updated last year
- Improved techniques for optimization-based jailbreaking on large language models (ICLR2025)☆146Apr 7, 2025Updated last year
- [ICLR 2022] Boosting Randomized Smoothing with Variance Reduced Classifiers☆11Mar 29, 2022Updated 4 years ago
- Official repository for "Safety in Large Reasoning Models: A Survey" - Exploring safety risks, attacks, and defenses for Large Reasoning …☆90Aug 25, 2025Updated 8 months ago
- ☆10May 8, 2024Updated 2 years ago
- This repository reproduces the results in the paper "How expressive are transformers in spectral domain for graphs?"(published in TMLR)☆11Jul 10, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Agent Security Bench (ASB)☆248Apr 16, 2026Updated last month
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆176Dec 18, 2024Updated last year
- [ICLR 2025] BlueSuffix: Reinforced Blue Teaming for Vision-Language Models Against Jailbreak Attacks☆31Nov 2, 2025Updated 6 months ago
- No description yet☆11May 26, 2023Updated 2 years ago
- A reading list for large models safety, security, and privacy (including Awesome LLM Security, Safety, etc.).☆1,957May 2, 2026Updated 2 weeks ago
- TAP: An automated jailbreaking method for black-box LLMs☆231Dec 10, 2024Updated last year
- ☆29Aug 21, 2023Updated 2 years ago