[ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models
☆50Jul 24, 2024Updated last year
Alternatives and similar repositories for BadChain
Users that are interested in BadChain are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Jan 17, 2025Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆55Jun 2, 2025Updated 10 months ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆89May 14, 2024Updated last year
- An official PyTorch implementation of "Certifiably Robust Graph Contrastive Learning" (NeurIPS 2023)☆11Jan 22, 2024Updated 2 years ago
- This is the code of paper: Robust Mid-Pass Filtering Graph Convolutional Networks.(paper accepted by WWW2023)☆13Feb 17, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆112Sep 27, 2024Updated last year
- Towards model-agnostic federated learning using knowledge distillation, ICLR 2022☆10Mar 12, 2022Updated 4 years ago
- [ICML 2025] Weak-to-Strong Jailbreaking on Large Language Models☆90May 2, 2025Updated 11 months ago
- ☆129Jul 2, 2024Updated last year
- [ACL 25] SafeChain: Safety of Language Models with Long Chain-of-Thought Reasoning Capabilities☆29Apr 2, 2025Updated last year
- The source code for Adaptive Kernel Graph Neural Network at AAAI2022☆14Feb 23, 2022Updated 4 years ago
- Official implementation of the WASP web agent security benchmark☆79Aug 12, 2025Updated 7 months ago
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆19Mar 9, 2025Updated last year
- ☆120Apr 27, 2025Updated 11 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆31Feb 27, 2025Updated last year
- ☆25Nov 4, 2024Updated last year
- A fast + lightweight implementation of the GCG algorithm in PyTorch☆324May 13, 2025Updated 10 months ago
- Example code for the NNGeometry PyTorch library☆10Aug 20, 2025Updated 7 months ago
- ☆14Oct 6, 2024Updated last year
- ☆37Oct 17, 2024Updated last year
- Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM☆39Jan 17, 2025Updated last year
- repo in several methods FedAvg, FedMD, FedProto, FedProx, FedHKD.☆27Nov 21, 2023Updated 2 years ago
- Agent Security Bench (ASB)☆214Oct 27, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆21Aug 10, 2024Updated last year
- Official repository for "Safety in Large Reasoning Models: A Survey" - Exploring safety risks, attacks, and defenses for Large Reasoning …☆88Aug 25, 2025Updated 7 months ago
- Unofficial implementation of "Backdooring Instruction-Tuned Large Language Models with Virtual Prompt Injection"☆27Jul 6, 2024Updated last year
- This repository reproduces the results in the paper "How expressive are transformers in spectral domain for graphs?"(published in TMLR)☆11Jul 10, 2022Updated 3 years ago
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆176Dec 18, 2024Updated last year
- [ICLR 2025] BlueSuffix: Reinforced Blue Teaming for Vision-Language Models Against Jailbreak Attacks☆31Nov 2, 2025Updated 5 months ago
- ☆29Aug 21, 2023Updated 2 years ago
- ☆10May 31, 2023Updated 2 years ago
- ☆12Dec 9, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆25Jun 17, 2025Updated 9 months ago
- Source code of ICLR2020 submisstion: Zeno++: Robust Fully Asynchronous SGD☆14Feb 2, 2020Updated 6 years ago
- Official Implementation of "Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning"☆12Feb 10, 2025Updated last year
- How Robust are Randomized Smoothing based Defenses to Data Poisoning? (CVPR 2021)☆14Jul 16, 2021Updated 4 years ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆250Jan 27, 2026Updated 2 months ago
- Certified Object Detection with Randomized Median Smoothing☆12Oct 21, 2020Updated 5 years ago
- ☆16Sep 4, 2024Updated last year