Phantivia / T-PGD
[Findings of ACL 2023] Bridge the Gap Between CV and NLP! A Optimization-based Textual Adversarial Attack Framework.
☆13Updated last year
Alternatives and similar repositories for T-PGD:
Users that are interested in T-PGD are comparing it to the libraries listed below
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆36Updated 8 months ago
- Unofficial implementation of "Backdooring Instruction-Tuned Large Language Models with Virtual Prompt Injection"☆17Updated 8 months ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆62Updated 5 months ago
- Code for paper "Universal Jailbreak Backdoors from Poisoned Human Feedback"☆48Updated 10 months ago
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆25Updated 3 months ago
- ☆20Updated 7 months ago
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆29Updated 2 years ago
- ☆24Updated 4 months ago
- [CCS-LAMPS'24] LLM IP Protection Against Model Merging☆13Updated 5 months ago
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆28Updated 7 months ago
- ☆31Updated 7 months ago
- Code repo of our paper Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis (https://arxiv.org/abs/2406.10794…☆19Updated 7 months ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆41Updated 2 years ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆35Updated last year
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆18Updated last year
- A curated list of trustworthy Generative AI papers. Daily updating...☆69Updated 6 months ago
- ☆32Updated 9 months ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆22Updated 3 years ago
- [ICLR 2024] Towards Elminating Hard Label Constraints in Gradient Inverision Attacks☆13Updated last year
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆17Updated last year
- "In-Context Unlearning: Language Models as Few Shot Unlearners". Martin Pawelczyk, Seth Neel* and Himabindu Lakkaraju*; ICML 2024.☆24Updated last year
- ☆53Updated last year
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆17Updated 7 months ago
- ☆49Updated 7 months ago
- Official codebase for Image Hijacks: Adversarial Images can Control Generative Models at Runtime☆44Updated last year
- Code for Arxiv When Do Universal Image Jailbreaks Transfer Between Vision-Language Models?☆21Updated 2 weeks ago
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆17Updated 4 months ago
- ☆38Updated 3 months ago
- [ACL 2024] CodeAttack: Revealing Safety Generalization Challenges of Large Language Models via Code Completion☆36Updated 4 months ago