IBM / URET
Universal Robustness Evaluation Toolkit (for Evasion)
☆31Updated 11 months ago
Alternatives and similar repositories for URET:
Users that are interested in URET are comparing it to the libraries listed below
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆57Updated 2 years ago
- A Dynamic Environment to Evaluate Attacks and Defenses for LLM Agents.☆100Updated this week
- ☆64Updated 4 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- ☆102Updated 7 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆37Updated 4 months ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆63Updated last year
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆208Updated 2 months ago
- A curated list of academic events on AI Security & Privacy☆146Updated 6 months ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated 9 months ago
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆41Updated 4 months ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆18Updated 2 years ago
- ☆44Updated last year
- The repository contains the code for analysing the leakage of personally identifiable (PII) information from the output of next word pred…☆88Updated 6 months ago
- A Python library for Secure and Explainable Machine Learning☆172Updated last month
- Copycat CNN☆27Updated 10 months ago
- ☆24Updated 3 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆76Updated last year
- ☆35Updated 4 months ago
- Machine Learning & Security Seminar @Purdue University☆25Updated last year
- A benchmark for evaluating the robustness of LLMs and defenses to indirect prompt injection attacks.☆60Updated 10 months ago
- Whispers in the Machine: Confidentiality in LLM-integrated Systems☆34Updated this week
- ☆142Updated 4 months ago
- ☆17Updated 2 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 2 years ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆79Updated 9 months ago
- Library for training globally-robust neural networks.☆28Updated last year
- ☆19Updated 3 years ago
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆49Updated 6 months ago
- Source code for the Energy-Latency Attacks via Sponge Poisoning paper.☆15Updated 2 years ago