Code for Voice Jailbreak Attacks Against GPT-4o.
☆36May 31, 2024Updated last year
Alternatives and similar repositories for VoiceJailbreakAttack
Users that are interested in VoiceJailbreakAttack are comparing it to the libraries listed below
Sorting:
- [USENIX'25] HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns☆13Mar 1, 2025Updated last year
- ☆14Mar 9, 2025Updated 11 months ago
- Official repository for ICML 2024 paper "On Prompt-Driven Safeguarding for Large Language Models"☆107May 20, 2025Updated 9 months ago
- DeerSheep0314 / Re4-Learning-to-Re-contrast-Re-attend-Re-construct-for-Multi-interest-Recommendation☆22Aug 4, 2022Updated 3 years ago
- ☆21May 23, 2025Updated 9 months ago
- The official repository for paper "MLLM-Protector: Ensuring MLLM’s Safety without Hurting Performance"☆44Apr 21, 2024Updated last year
- [COLM 2024] JailBreakV-28K: A comprehensive benchmark designed to evaluate the transferability of LLM jailbreak attacks to MLLMs, and fur…☆87May 9, 2025Updated 9 months ago
- Audio Jailbreak: An Open Comprehensive Benchmark for Jailbreaking Large Audio-Language Models☆30Oct 6, 2025Updated 4 months ago
- [USENIX'24] Prompt Stealing Attacks Against Text-to-Image Generation Models☆51Jan 11, 2025Updated last year
- ☆23Jan 17, 2025Updated last year
- A benchmark for evaluating the robustness of LLMs and defenses to indirect prompt injection attacks.☆106Apr 15, 2024Updated last year
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆27Sep 11, 2024Updated last year
- ☆23Oct 25, 2024Updated last year
- [ICLR 2024]Data for "Multilingual Jailbreak Challenges in Large Language Models"☆99Mar 7, 2024Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆109Sep 27, 2024Updated last year
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆57Aug 17, 2024Updated last year
- [ICLR 2025] Dissecting adversarial robustness of multimodal language model agents☆124Feb 19, 2025Updated last year
- ☆59Jun 5, 2024Updated last year
- Official codebase for Image Hijacks: Adversarial Images can Control Generative Models at Runtime☆54Sep 19, 2023Updated 2 years ago
- [AAAI'25 (Oral)] Jailbreaking Large Vision-language Models via Typographic Visual Prompts☆191Jun 26, 2025Updated 8 months ago
- Open source data and code of the MGNM☆25Sep 15, 2022Updated 3 years ago
- ☆72Mar 30, 2025Updated 11 months ago
- ☆26Jun 2, 2024Updated last year
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆35Oct 23, 2024Updated last year
- ☆124Nov 13, 2023Updated 2 years ago
- Code to conduct an embedding attack on LLMs☆31Jan 10, 2025Updated last year
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆66Mar 22, 2025Updated 11 months ago
- This is the official repository for the ICLR 2025 accepted paper Badrobot: Manipulating Embodied LLMs in the Physical World.☆41Jun 26, 2025Updated 8 months ago
- [NeurIPS 2024] Accelerating Greedy Coordinate Gradient and General Prompt Optimization via Probe Sampling☆33Nov 8, 2024Updated last year
- [ECCV 2024] The official code for "AdaShield: Safeguarding Multimodal Large Language Models from Structure-based Attack via Adaptive Shi…☆71Feb 9, 2026Updated 3 weeks ago
- TAP: An automated jailbreaking method for black-box LLMs☆221Dec 10, 2024Updated last year
- 北京邮电大学信通院C++上机题☆14Feb 20, 2021Updated 5 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Oct 10, 2022Updated 3 years ago
- ☆11Dec 23, 2024Updated last year
- ☆34Feb 6, 2026Updated 3 weeks ago
- ☆77Dec 19, 2024Updated last year
- Model Poisoning Attack to Federated Recommendation☆32Apr 23, 2022Updated 3 years ago
- Code for the paper "Distinguishing the Knowable from the Unknowable with Language Models"☆11Apr 15, 2024Updated last year
- ☆12May 6, 2022Updated 3 years ago