PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents (TDSC 2024)
☆18Mar 29, 2024Updated last year
Alternatives and similar repositories for PrivacyAsst
Users that are interested in PrivacyAsst are comparing it to the libraries listed below
Sorting:
- FLTracer: Accurate Poisoning Attack Provenance in Federated Learning☆24Jun 14, 2024Updated last year
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Jun 29, 2025Updated 8 months ago
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆20Oct 5, 2025Updated 4 months ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- ☆26Dec 1, 2022Updated 3 years ago
- Code for paper "Poisoned classifiers are not only backdoored, they are fundamentally broken"☆26Jan 7, 2022Updated 4 years ago
- [S&P 2024] Replication Package for "Mind Your Data! Hiding Backdoors in Offline Reinforcement Learning Datasets".☆32Dec 30, 2024Updated last year
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆34Aug 10, 2024Updated last year
- ☆13May 16, 2019Updated 6 years ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- 基于QT的模仿宝石迷阵游戏☆10Jun 10, 2022Updated 3 years ago
- Tool for testing IPv4 and IPv6 DHCP services☆13Mar 27, 2020Updated 5 years ago
- ☆12Dec 22, 2025Updated 2 months ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- ☆14Mar 9, 2025Updated 11 months ago
- ☆13Jul 26, 2021Updated 4 years ago
- A white box algorithm that generate adversarial examples according to the gradient☆11May 9, 2020Updated 5 years ago
- 1-step Q Learning from the paper "Asynchronous Methods for Deep Reinforcement Learning"☆12Mar 13, 2017Updated 8 years ago
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- Heterogeneous Model Reuse via Optimizing Multiparty Multiclass Margin☆11Jan 15, 2020Updated 6 years ago
- Developer focused AI Gateway☆15Mar 7, 2025Updated 11 months ago
- This is the code of our work CISS Certified Robustness Against Natural Language Attacks by Causal Intervention published on ICML 2022☆11Dec 6, 2022Updated 3 years ago
- ☆11Nov 8, 2022Updated 3 years ago
- IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)☆10Sep 10, 2019Updated 6 years ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆16Jul 9, 2025Updated 7 months ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- Backprop with Low-Precision Activations☆11Oct 28, 2019Updated 6 years ago
- ☆12Apr 22, 2024Updated last year
- Implementation of joint bayesian model, written in python.☆11Aug 2, 2021Updated 4 years ago
- Official repository of paper "Let All be Whitened: Multi-teacher Distillation for Efficient Visual Retrieval"☆10Dec 20, 2023Updated 2 years ago
- ☆13Mar 25, 2022Updated 3 years ago
- ☆11Mar 13, 2023Updated 2 years ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆52Jun 2, 2025Updated 9 months ago
- PHP WebSocket Server for PHP 5.3☆28Jul 29, 2012Updated 13 years ago
- The source code of the paper "WebUltron: An Ultimate Retriever on Webpages under the Model-centric Paradigm"☆12Mar 21, 2023Updated 2 years ago
- Application and blog explaining my interpretations of In-run Data Shapley☆24Jan 30, 2025Updated last year
- Proxy a single incomming TCP connection to multiple remote TCP servers☆13Apr 24, 2016Updated 9 years ago
- 🚀 Building an OpenAI-Compatible API with Open-Source LLM: Rate-Limiting, Custom API Keys 🔐, and Streamlit Authentication 🌐☆23Sep 9, 2024Updated last year