SchwinnL / LLM_Embedding_AttackLinks
Code to conduct an embedding attack on LLMs
☆27Updated 9 months ago
Alternatives and similar repositories for LLM_Embedding_Attack
Users that are interested in LLM_Embedding_Attack are comparing it to the libraries listed below
Sorting:
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆91Updated last year
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆60Updated 11 months ago
- ☆23Updated 8 months ago
- [AAAI'25 (Oral)] Jailbreaking Large Vision-language Models via Typographic Visual Prompts☆173Updated 3 months ago
- Code for Voice Jailbreak Attacks Against GPT-4o.☆34Updated last year
- ☆101Updated last year
- An unofficial implementation of AutoDAN attack on LLMs (arXiv:2310.15140)☆43Updated last year
- Official codebase for Image Hijacks: Adversarial Images can Control Generative Models at Runtime☆50Updated 2 years ago
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queries☆45Updated 2 months ago
- [ICLR 2025] Dissecting adversarial robustness of multimodal language model agents☆109Updated 7 months ago
- AmpleGCG: Learning a Universal and Transferable Generator of Adversarial Attacks on Both Open and Closed LLM☆71Updated 11 months ago
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆55Updated last year
- Code for "When LLM Meets DRL: Advancing Jailbreaking Efficiency via DRL-guided Search" (NeurIPS 2024)☆12Updated 11 months ago
- ☆43Updated last year
- A curated list of trustworthy Generative AI papers. Daily updating...☆74Updated last year
- This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Lang…☆17Updated last year
- Code for Neurips 2024 paper "Shadowcast: Stealthy Data Poisoning Attacks Against Vision-Language Models"☆55Updated 8 months ago
- ☆63Updated 9 months ago
- An LLM can Fool Itself: A Prompt-Based Adversarial Attack (ICLR 2024)☆99Updated 8 months ago
- [COLM 2024] JailBreakV-28K: A comprehensive benchmark designed to evaluate the transferability of LLM jailbreak attacks to MLLMs, and fur…☆77Updated 5 months ago
- ☆35Updated last year
- ☆35Updated 4 months ago
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆166Updated 9 months ago
- ☆40Updated 6 months ago
- Improved Few-Shot Jailbreaking Can Circumvent Aligned Language Models and Their Defenses (NeurIPS 2024)☆65Updated 9 months ago
- ☆104Updated 8 months ago
- Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers☆62Updated last year
- [ACL 2024] CodeAttack: Revealing Safety Generalization Challenges of Large Language Models via Code Completion☆52Updated last week
- Official repository for "Robust Prompt Optimization for Defending Language Models Against Jailbreaking Attacks"☆58Updated last year
- ☆109Updated last year