IBM / URETLinks
Universal Robustness Evaluation Toolkit (for Evasion)
☆31Updated last month
Alternatives and similar repositories for URET
Users that are interested in URET are comparing it to the libraries listed below
Sorting:
- A Python library for Secure and Explainable Machine Learning☆189Updated 3 months ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆218Updated this week
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- A curated list of academic events on AI Security & Privacy☆162Updated last year
- Proof of concept code for poisoning code generation models.☆53Updated last year
- ARMORY Adversarial Robustness Evaluation Test Bed☆186Updated last year
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆82Updated 2 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- ☆44Updated 2 years ago
- The repository contains the code for analysing the leakage of personally identifiable (PII) information from the output of next word pred…☆101Updated last year
- ☆122Updated last year
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆112Updated last year
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆80Updated last year
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆60Updated 11 months ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 3 years ago
- ☆19Updated 4 years ago
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆78Updated last week
- ☆148Updated last year
- ☆25Updated 4 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆91Updated last year
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆19Updated last year
- LLM security and privacy☆51Updated last year
- ☆64Updated 9 months ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆31Updated last year
- A Dynamic Environment to Evaluate Attacks and Defenses for LLM Agents.☆304Updated last week
- This repository provides a benchmark for prompt injection attacks and defenses☆301Updated this week
- The automated prompt injection framework for LLM-integrated applications.☆231Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆52Updated 6 months ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 3 years ago