☆15Dec 12, 2023Updated 2 years ago
Alternatives and similar repositories for Backdoored_PPLM
Users that are interested in Backdoored_PPLM are comparing it to the libraries listed below
Sorting:
- ☆37Oct 17, 2024Updated last year
- ESEC/FSE'21: Prediction-Preserving Program Simplification☆10Oct 4, 2022Updated 3 years ago
- Code associated with ICML (2024). "Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normaliz…☆10Feb 22, 2026Updated last week
- [NeurIPS'24] RedCode: Risky Code Execution and Generation Benchmark for Code Agents☆66Nov 14, 2025Updated 3 months ago
- ☆17Sep 4, 2024Updated last year
- ☆16Mar 22, 2024Updated last year
- ☆18Aug 15, 2022Updated 3 years ago
- ☆18Sep 28, 2024Updated last year
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"☆24Aug 20, 2025Updated 6 months ago
- Proof of concept code for poisoning code generation models.☆56Dec 6, 2023Updated 2 years ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆27Sep 11, 2024Updated last year
- ☆83Aug 3, 2021Updated 4 years ago
- ☆19Mar 9, 2024Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆57Mar 22, 2025Updated 11 months ago
- ☆26Dec 1, 2022Updated 3 years ago
- ☆28Aug 21, 2023Updated 2 years ago
- [CCS 2024] Optimization-based Prompt Injection Attack to LLM-as-a-Judge☆39Sep 17, 2025Updated 5 months ago
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆35Apr 18, 2023Updated 2 years ago
- Anti-Backdoor learning (NeurIPS 2021)☆84Jul 20, 2023Updated 2 years ago
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆40Jul 8, 2024Updated last year
- ☆14Jul 5, 2022Updated 3 years ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆16Jul 9, 2025Updated 7 months ago
- ☆13Jan 1, 2018Updated 8 years ago
- Adversarial Attack for Pre-trained Code Models☆10Jul 19, 2022Updated 3 years ago
- Source Code Search☆11Nov 16, 2023Updated 2 years ago
- ☆14Feb 26, 2025Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆52Jun 2, 2025Updated 9 months ago
- ☆11Jul 5, 2023Updated 2 years ago
- Official release of code for the paper RL is a hammer and LLMs are nails A simple RL approach to stronger prompt injection attacks☆40Feb 11, 2026Updated 2 weeks ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- A Computer Vision model that detects guns using YOLOv8☆10May 11, 2023Updated 2 years ago
- ☆10Feb 9, 2019Updated 7 years ago
- ☆13Jan 14, 2026Updated last month
- [NDSS'25] "Provably Unlearnable Data Examples"☆22Dec 10, 2025Updated 2 months ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- This repository contains the code, the dataset and the experimental results related to the paper "Vulnerabilities in AI Code Generators: …☆12Aug 5, 2024Updated last year
- Program Transformation Tool for Java Methods☆11Sep 16, 2022Updated 3 years ago
- ☆11Feb 21, 2022Updated 4 years ago
- ☆14May 1, 2023Updated 2 years ago