HKUST-KnowComp / GEIALinks
Code for Findings-ACL 2023 paper: Sentence Embedding Leaks More Information than You Expect: Generative Embedding Inversion Attack to Recover the Whole Sentence
☆48Updated last year
Alternatives and similar repositories for GEIA
Users that are interested in GEIA are comparing it to the libraries listed below
Sorting:
- The repository contains the code for analysing the leakage of personally identifiable (PII) information from the output of next word pred…☆101Updated last year
 - Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆94Updated last year
 - [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆168Updated 10 months ago
 - ☆75Updated 3 years ago
 - ☆65Updated 10 months ago
 - An LLM can Fool Itself: A Prompt-Based Adversarial Attack (ICLR 2024)☆105Updated 9 months ago
 - ☆38Updated 2 years ago
 - ☆69Updated 8 months ago
 - A survey of privacy problems in Large Language Models (LLMs). Contains summary of the corresponding paper along with relevant code☆68Updated last year
 - A curated list of trustworthy Generative AI papers. Daily updating...☆75Updated last year
 - This is the starter kit for the Trojan Detection Challenge 2023 (LLM Edition), a NeurIPS 2023 competition.☆89Updated last year
 - ☆187Updated last year
 - Bag of Tricks: Benchmarking of Jailbreak Attacks on LLMs. Empirical tricks for LLM Jailbreaking. (NeurIPS 2024)☆152Updated 11 months ago
 - Finding trojans in aligned LLMs. Official repository for the competition hosted at SaTML 2024.☆115Updated last year
 - Code for Findings-EMNLP 2023 paper: Multi-step Jailbreaking Privacy Attacks on ChatGPT☆35Updated 2 years ago
 - PAL: Proxy-Guided Black-Box Attack on Large Language Models☆55Updated last year
 - We jailbreak GPT-3.5 Turbo’s safety guardrails by fine-tuning it on only 10 adversarially designed examples, at a cost of less than $0.20…☆328Updated last year
 - Training data extraction on GPT-2☆192Updated 2 years ago
 - [NDSS'25 Best Technical Poster] A collection of automated evaluators for assessing jailbreak attempts.☆172Updated 7 months ago
 - Differentially-private transformers using HuggingFace and Opacus☆143Updated last year
 - Python package for measuring memorization in LLMs.☆172Updated 3 months ago
 - ☆111Updated last year
 - [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆162Updated 6 months ago
 - [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆41Updated last year
 - [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆210Updated 8 months ago
 - Code and data of the EMNLP 2022 paper "Why Should Adversarial Perturbations be Imperceptible? Rethink the Research Paradigm in Adversaria…☆61Updated 2 years ago
 - Codes and datasets of the paper Red-Teaming Large Language Models using Chain of Utterances for Safety-Alignment☆105Updated last year
 - An unofficial implementation of AutoDAN attack on LLMs (arXiv:2310.15140)☆44Updated last year
 - Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks [ICLR 2025]☆359Updated 9 months ago
 - Source code of NAACL 2025 Findings "Scaling Up Membership Inference: When and How Attacks Succeed on Large Language Models"☆15Updated 9 months ago