IBM / URETLinks
Universal Robustness Evaluation Toolkit (for Evasion)
☆32Updated 4 months ago
Alternatives and similar repositories for URET
Users that are interested in URET are comparing it to the libraries listed below
Sorting:
- A Python library for Secure and Explainable Machine Learning☆190Updated 7 months ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆223Updated last month
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆112Updated last year
- A curated list of academic events on AI Security & Privacy☆167Updated last year
- ARMORY Adversarial Robustness Evaluation Test Bed☆188Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Updated 3 years ago
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆68Updated last year
- Risks and targets for assessing LLMs & LLM vulnerabilities☆33Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆107Updated last year
- ☆44Updated 2 years ago
- ☆27Updated 4 years ago
- TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a…☆79Updated 5 months ago
- ☆55Updated last year
- Agent Security Bench (ASB)☆177Updated 3 months ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆92Updated last year
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 3 years ago
- ☆151Updated last year
- [NeurIPS'24] RedCode: Risky Code Execution and Generation Benchmark for Code Agents☆64Updated 2 months ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆83Updated 2 years ago
- SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models☆105Updated this week
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 3 years ago
- ☆68Updated 5 years ago
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆193Updated 9 months ago
- LLM security and privacy☆53Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆56Updated 10 months ago
- ☆127Updated last year
- Privacy Testing for Deep Learning☆211Updated 4 months ago
- A Dynamic Environment to Evaluate Attacks and Defenses for LLM Agents.☆420Updated 2 months ago
- The repository contains the code for analysing the leakage of personally identifiable (PII) information from the output of next word pred…☆103Updated last year
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆84Updated 2 years ago