Code and data for paper "Can Watermarked LLMs be Identified by Users via Crafted Prompts?" Accepted by ICLR 2025 (Spotlight)
☆28Dec 28, 2024Updated last year
Alternatives and similar repositories for Watermarked_LLM_Identification
Users that are interested in Watermarked_LLM_Identification are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [USENIX Security'24] REMARK-LLM: A robust and efficient watermarking framework for generative large language models☆27Oct 23, 2024Updated last year
- Code for watermarking language models☆85Sep 7, 2024Updated last year
- [CCS-LAMPS'24] LLM IP Protection Against Model Merging☆16Oct 14, 2024Updated last year
- Evaluating Durability: Benchmark Insights into Multimodal Watermarking☆12Jun 7, 2024Updated last year
- [ICLR 2025] Permute-and-Flip: An optimally robust and watermarkable decoder for LLMs☆19Mar 20, 2025Updated last year
- Official implementation for "HuRef: HUman-REadable Fingerprint for Large Language Models" (NeurIPS2024)☆15Jun 17, 2025Updated 9 months ago
- [ICML2024] Adaptive Text Watermark for Large Language Models☆25Dec 11, 2024Updated last year
- ☆22Mar 19, 2024Updated 2 years ago
- MarkLLM: An Open-Source Toolkit for LLM Watermarking.(EMNLP 2024 System Demonstration)☆833Mar 17, 2026Updated last week
- Official repository for "PostMark: A Robust Blackbox Watermark for Large Language Models"☆28Aug 30, 2024Updated last year
- ☆14Feb 26, 2025Updated last year
- Official repository of the paper: Who Wrote this Code? Watermarking for Code Generation (ACL 2024)☆40May 28, 2024Updated last year
- Source code of paper "An Unforgeable Publicly Verifiable Watermark for Large Language Models" accepted by ICLR 2024☆34May 23, 2024Updated last year
- ☆17May 11, 2025Updated 10 months ago
- The repo for paper: Exploiting the Index Gradients for Optimization-Based Jailbreaking on Large Language Models.☆14Dec 16, 2024Updated last year
- Fingerprint large language models☆49Jul 11, 2024Updated last year
- Code for KDD'22 paper, COSTA: Covariance-Preserving Feature Augmentation for Graph Contrastive Learning☆49Jun 7, 2023Updated 2 years ago
- ☆22May 23, 2025Updated 10 months ago
- The code implementation of MuScleLoRA (Accepted in ACL 2024)☆10Dec 1, 2024Updated last year
- [NeurIPS25] RULE: Reinforcement UnLEarning Achieves Forge-retain Pareto Optimality☆20Oct 22, 2025Updated 5 months ago
- Official Implementation of wd1☆24Sep 25, 2025Updated 5 months ago
- [KDD'24] Unifying Graph Convolution and Contrastive Learning in Collaborative Filtering☆14Sep 24, 2024Updated last year
- [ICLR 2025] VideoShield: Regulating Diffusion-based Video Generation Models via Watermarking (Official Implementation)☆53May 30, 2025Updated 9 months ago
- DistRL: An Asynchronous Distributed Reinforcement Learning Framework for On-Device Control Agents☆24Aug 4, 2025Updated 7 months ago
- [NeurIPS'24] ARC: A Generalist Graph Anomaly Detector with In-Context Learning☆31Feb 10, 2026Updated last month
- A collection list for Large Language Model (LLM) Watermark☆58Feb 5, 2026Updated last month
- [CVPR 2024] Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models☆137May 15, 2024Updated last year
- ☆19Feb 22, 2023Updated 3 years ago
- UP-TO-DATE LLM Watermark paper. 🔥🔥🔥☆371Dec 12, 2024Updated last year
- [ACL 2024] Official Repository for "Leveraging Large Language Models for Learning Complex Legal Concepts through Storytelling"☆16Aug 19, 2024Updated last year
- Code and data for paper "A Semantic Invariant Robust Watermark for Large Language Models" accepted by ICLR 2024.☆37Nov 13, 2024Updated last year
- ☆16Aug 25, 2021Updated 4 years ago
- LLM Program Watermarking☆18Apr 19, 2024Updated last year
- LLM-Powered Open-Vocabulary Scene Segmentation with Language Embedded 3D Gaussians☆23Jan 10, 2025Updated last year
- This is the official code repository for the paper: Towards General Continuous Memory for Vision-Language Models.☆23Jul 3, 2025Updated 8 months ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆54Nov 15, 2022Updated 3 years ago
- ☆19Mar 26, 2022Updated 3 years ago
- Implementation of TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems (https://arxiv.org/pdf/190…☆19Apr 13, 2023Updated 2 years ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Feb 18, 2025Updated last year