Composite Backdoor Attacks Against Large Language Models
☆22Apr 12, 2024Updated last year
Alternatives and similar repositories for CBA
Users that are interested in CBA are comparing it to the libraries listed below
Sorting:
- ☆22Sep 16, 2022Updated 3 years ago
- ☆26Aug 21, 2024Updated last year
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆32Jul 11, 2022Updated 3 years ago
- ICL backdoor attack☆17Nov 4, 2024Updated last year
- This is the repository for USENIX Security 2023 paper "Hard-label Black-box Universal Adversarial Patch Attack".☆15Sep 5, 2023Updated 2 years ago
- This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Lang…☆21Jul 3, 2024Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆52Jun 2, 2025Updated 9 months ago
- A toolbox for backdoor attacks.☆23Jan 13, 2023Updated 3 years ago
- ☆19Nov 6, 2023Updated 2 years ago
- ☆26Dec 1, 2022Updated 3 years ago
- ☆23Aug 24, 2020Updated 5 years ago
- ☆28Aug 21, 2023Updated 2 years ago
- ☆27Nov 9, 2022Updated 3 years ago
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆29Dec 31, 2024Updated last year
- Machine Learning & Security Seminar @Purdue University☆25May 9, 2023Updated 2 years ago
- ☆16Mar 31, 2025Updated 11 months ago
- 专用于搭建MT4或MT5交易跟单平台☆25Updated this week
- This repository contains the source code for "Membership Inference Attacks as Privacy Tools: Reliability, Disparity and Ensemble", In Pro…☆10Jan 2, 2026Updated 2 months ago
- Official repository for CVPR'23 paper: Detecting Backdoors in Pre-trained Encoders☆36Sep 25, 2023Updated 2 years ago
- AlgZoo: uninterpreted models with fewer than 1,500 parameters☆43Jan 19, 2026Updated last month
- ☆11May 16, 2025Updated 9 months ago
- ☆10Nov 19, 2025Updated 3 months ago
- bert蒸馏实践,包含BiLSTM蒸馏BERT和TinyBert☆13Apr 23, 2022Updated 3 years ago
- Official Implementation for "Purifying Quantization-conditioned Backdoors via Layer-wise Activation Correction with Distribution Approxim…☆12Aug 14, 2024Updated last year
- Code used to run experiments for the ICLR 2023 paper "Computational Language Acquisition with Theory of Mind".☆15Apr 27, 2023Updated 2 years ago
- ☆13May 15, 2025Updated 9 months ago
- Landlock configuration library☆22Nov 28, 2025Updated 3 months ago
- Code implementation for paper AbsenceBench: Language Models Can't Tell What's Missing☆17Oct 23, 2025Updated 4 months ago
- The code implementation of MuScleLoRA (Accepted in ACL 2024)☆10Dec 1, 2024Updated last year
- ☆30Oct 21, 2025Updated 4 months ago
- [NeurIPS'24] RedCode: Risky Code Execution and Generation Benchmark for Code Agents☆66Nov 14, 2025Updated 3 months ago
- some baseline attack method by pytorch☆11Oct 13, 2021Updated 4 years ago
- ☆12Mar 1, 2023Updated 3 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- 百货商场用户画像描绘与价值分析☆14Sep 5, 2021Updated 4 years ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆19Sep 18, 2025Updated 5 months ago
- [NeurIPS 2025] BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks and Defenses on Large Language Models☆276Feb 2, 2026Updated last month
- ☆13Dec 28, 2023Updated 2 years ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Feb 18, 2021Updated 5 years ago