[NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"
☆24Aug 20, 2025Updated 6 months ago
Alternatives and similar repositories for CLIBE
Users that are interested in CLIBE are comparing it to the libraries listed below
Sorting:
- Official repository of paper "Let All be Whitened: Multi-teacher Distillation for Efficient Visual Retrieval"☆10Dec 20, 2023Updated 2 years ago
- Code associated with ICML (2024). "Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normaliz…☆10Feb 22, 2026Updated last week
- ☆26Dec 1, 2022Updated 3 years ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆52Jun 2, 2025Updated 8 months ago
- Backdooring Neural Code Search☆14Sep 8, 2023Updated 2 years ago
- ☆13Oct 21, 2021Updated 4 years ago
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆20Oct 5, 2025Updated 4 months ago
- TextGuard: Provable Defense against Backdoor Attacks on Text Classification☆13Nov 7, 2023Updated 2 years ago
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆19Mar 9, 2025Updated 11 months ago
- ☆19Mar 9, 2024Updated last year
- ☆21Mar 17, 2025Updated 11 months ago
- This is the source code for MEA-Defender. Our paper is accepted by the IEEE Symposium on Security and Privacy (S&P) 2024.☆29Nov 19, 2023Updated 2 years ago
- [Oakland 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆27Apr 15, 2025Updated 10 months ago
- [CCS 2024] Optimization-based Prompt Injection Attack to LLM-as-a-Judge☆39Sep 17, 2025Updated 5 months ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆33Sep 23, 2023Updated 2 years ago
- [USENIX'25] HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns☆13Mar 1, 2025Updated last year
- This is a project based on machine learning and deep learning method for playing Gobang by controlling mechanical arm(利用机械臂下五子棋)☆12Apr 16, 2023Updated 2 years ago
- ESEC/FSE'21: Prediction-Preserving Program Simplification☆10Oct 4, 2022Updated 3 years ago
- ☆16Feb 23, 2025Updated last year
- Adversarial Attack for Pre-trained Code Models☆10Jul 19, 2022Updated 3 years ago
- ☆10Feb 8, 2021Updated 5 years ago
- ☆14Feb 26, 2025Updated last year
- Python codes for mathematical modeling.☆12Sep 5, 2021Updated 4 years ago
- The code implementation of MuScleLoRA (Accepted in ACL 2024)☆10Dec 1, 2024Updated last year
- English and Chinese LaTeX template for reports/projects/proposal at Beijing Institute of Technology☆10Nov 19, 2020Updated 5 years ago
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆15Feb 19, 2024Updated 2 years ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆16Jul 9, 2025Updated 7 months ago
- ☆14Mar 9, 2025Updated 11 months ago
- ☆13Apr 3, 2024Updated last year
- [NeurIPS'24] Official implement of "PrivCirNet: Efficient Private Inference via Block Circulant Transformation"☆15Updated this week
- randomized SVD with single pass over data matrix☆10Apr 23, 2023Updated 2 years ago
- Injecting watermarks to protein sequences for privacy protection in biosecurity☆10Oct 1, 2024Updated last year
- A large-scale dataset composed of high-quality synthetic images aimed at evaluating social biases in LVLMs☆13Oct 6, 2025Updated 4 months ago
- ICML2025: One Image is Worth a Thousand Words: A Usability Preservable Text-Image Collaborative Erasing Framework☆14Jun 24, 2025Updated 8 months ago
- Code for the paper: Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions☆11Mar 13, 2024Updated last year
- Leaderboard of Frontier Models for Program Repair https://repairbench.github.io/☆11Oct 26, 2025Updated 4 months ago
- Implementation for the protocols described in https://eprint.iacr.org/2023/1700☆14Jan 9, 2025Updated last year
- [NeurIPS'24] RedCode: Risky Code Execution and Generation Benchmark for Code Agents☆66Nov 14, 2025Updated 3 months ago
- [Preprint] Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis☆10Sep 23, 2021Updated 4 years ago