HKUST-KnowComp / GEIALinks
Code for Findings-ACL 2023 paper: Sentence Embedding Leaks More Information than You Expect: Generative Embedding Inversion Attack to Recover the Whole Sentence
☆47Updated last year
Alternatives and similar repositories for GEIA
Users that are interested in GEIA are comparing it to the libraries listed below
Sorting:
- Code and data of the EMNLP 2022 paper "Why Should Adversarial Perturbations be Imperceptible? Rethink the Research Paradigm in Adversaria…☆54Updated 2 years ago
- The repository contains the code for analysing the leakage of personally identifiable (PII) information from the output of next word pred…☆100Updated 11 months ago
- [NDSS'25 Best Technical Poster] A collection of automated evaluators for assessing jailbreak attempts.☆165Updated 4 months ago
- ☆179Updated last year
- Bag of Tricks: Benchmarking of Jailbreak Attacks on LLMs. Empirical tricks for LLM Jailbreaking. (NeurIPS 2024)☆144Updated 8 months ago
- A survey of privacy problems in Large Language Models (LLMs). Contains summary of the corresponding paper along with relevant code☆68Updated last year
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆162Updated 7 months ago
- ☆61Updated 5 months ago
- Official implementation of AdvPrompter https//arxiv.org/abs/2404.16873☆159Updated last year
- Codes and datasets of the paper Red-Teaming Large Language Models using Chain of Utterances for Safety-Alignment☆103Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆85Updated 10 months ago
- ☆104Updated last year
- Unofficial implementation of "Backdooring Instruction-Tuned Large Language Models with Virtual Prompt Injection"☆20Updated last year
- ICLR2024 Paper. Showing properties of safety tuning and exaggerated safety.☆85Updated last year
- A Synthetic Dataset for Personal Attribute Inference (NeurIPS'24 D&B)☆43Updated 2 weeks ago
- Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers☆56Updated 11 months ago
- Python package for measuring memorization in LLMs.☆162Updated 3 weeks ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆176Updated 5 months ago
- We jailbreak GPT-3.5 Turbo’s safety guardrails by fine-tuning it on only 10 adversarially designed examples, at a cost of less than $0.20…☆317Updated last year
- ☆36Updated 2 years ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆73Updated 11 months ago
- An LLM can Fool Itself: A Prompt-Based Adversarial Attack (ICLR 2024)☆95Updated 6 months ago
- This is the starter kit for the Trojan Detection Challenge 2023 (LLM Edition), a NeurIPS 2023 competition.☆90Updated last year
- Code for Findings-EMNLP 2023 paper: Multi-step Jailbreaking Privacy Attacks on ChatGPT☆34Updated last year
- Training data extraction on GPT-2☆190Updated 2 years ago
- ☆19Updated 2 months ago
- A Comprehensive Assessment of Trustworthiness in GPT Models☆299Updated 10 months ago
- Official Repository for ACL 2024 Paper SafeDecoding: Defending against Jailbreak Attacks via Safety-Aware Decoding☆141Updated last year
- AmpleGCG: Learning a Universal and Transferable Generator of Adversarial Attacks on Both Open and Closed LLM☆68Updated 9 months ago
- WMDP is a LLM proxy benchmark for hazardous knowledge in bio, cyber, and chemical security. We also release code for RMU, an unlearning m…☆134Updated 2 months ago