Official Implementation of implicit reference attack
☆11Oct 16, 2024Updated last year
Alternatives and similar repositories for llm_Implicit_reference
Users that are interested in llm_Implicit_reference are comparing it to the libraries listed below
Sorting:
- ☆13Jan 14, 2026Updated last month
- PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents☆26Mar 26, 2025Updated 11 months ago
- Official Code for ART: Automatic Red-teaming for Text-to-Image Models to Protect Benign Users (NeurIPS 2024)☆23Oct 23, 2024Updated last year
- ☆17Sep 4, 2024Updated last year
- ☆23Jan 17, 2025Updated last year
- Code repository for the paper "Heuristic Induced Multimodal Risk Distribution Jailbreak Attack for Multimodal Large Language Models"☆15Aug 7, 2025Updated 6 months ago
- Revisiting Character-level Adversarial Attacks for Language Models, ICML 2024☆19Feb 12, 2025Updated last year
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆48Jul 24, 2024Updated last year
- [ICML 2024] Prompting4Debugging: Red-Teaming Text-to-Image Diffusion Models by Finding Problematic Prompts (Official Pytorch Implementati…☆52Jan 11, 2026Updated last month
- ☆24Jun 17, 2025Updated 8 months ago
- Buttercup CRS as submitted to the AIxCC Final Competition☆97Jul 14, 2025Updated 7 months ago
- ☆59Jun 5, 2024Updated last year
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆35Oct 23, 2024Updated last year
- ☆197Apr 7, 2025Updated 10 months ago
- COCOA: Cross Modality Contrastive Learning for Sensor Data☆26Sep 11, 2022Updated 3 years ago
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆92Dec 20, 2025Updated 2 months ago
- Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM☆39Jan 17, 2025Updated last year
- ☆118Apr 27, 2025Updated 10 months ago
- [EMNLP 2024 Findings] Wrong-of-Thought: An Integrated Reasoning Framework with Multi-Perspective Verification and Wrong Information☆13Oct 1, 2024Updated last year
- Shared code for CSE 3341☆10Dec 13, 2022Updated 3 years ago
- Parse Bluetooth Low Energy peripheral advertising packets☆14Nov 7, 2021Updated 4 years ago
- A curated list of 150+ papers and resources on Agentic Security. Based on the survey covering the transition from passive LLMs to autonom…☆28Dec 6, 2025Updated 2 months ago
- ☆12Oct 29, 2023Updated 2 years ago
- [USENIX'25] HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns☆13Mar 1, 2025Updated 11 months ago
- Official PyTorch Implementation of Federated Learning with Positive and Unlabeled Data☆10Aug 12, 2022Updated 3 years ago
- ☆14Apr 29, 2025Updated 10 months ago
- [NeurIPS 2025] CodeCrash: Exposing LLM Fragility to Misleading Natural Language in Code Reasoning☆16Jan 24, 2026Updated last month
- ☆12Feb 16, 2024Updated 2 years ago
- This is the code repository for a project at Ulm University. It's a fall detection system based on address-event-based cameras.☆11Sep 29, 2017Updated 8 years ago
- [USENIX'24] Prompt Stealing Attacks Against Text-to-Image Generation Models☆51Jan 11, 2025Updated last year
- ☆46Jul 14, 2024Updated last year
- Fingerprint large language models☆49Jul 11, 2024Updated last year
- ☆11Dec 3, 2014Updated 11 years ago
- ☆19May 14, 2025Updated 9 months ago
- ☆21Dec 18, 2013Updated 12 years ago
- Automatic ReLU Reduction☆15Dec 20, 2023Updated 2 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- Code used to run experiments for the ICLR 2023 paper "Computational Language Acquisition with Theory of Mind".☆15Apr 27, 2023Updated 2 years ago