UCF-ML-Research / TrojLLM
☆17Updated 2 months ago
Related projects: ⓘ
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆32Updated 2 months ago
- BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models☆28Updated 2 weeks ago
- ☆12Updated 5 months ago
- ☆37Updated 3 months ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆67Updated 2 weeks ago
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆52Updated last year
- Code for paper "Universal Jailbreak Backdoors from Poisoned Human Feedback"☆39Updated 4 months ago
- ☆23Updated last year
- Towards Stable Backdoor Purification through Feature Shift Tuning (NeurIPS 2023)☆22Updated last month
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents"☆29Updated 3 months ago
- ☆11Updated 4 months ago
- ☆27Updated 2 years ago
- ☆20Updated last year
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆16Updated last year
- This is the repository that introduces research topics related to protecting intellectual property (IP) of AI from a data-centric perspec…☆21Updated 10 months ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆25Updated 8 months ago
- ☆23Updated 3 months ago
- ☆27Updated 2 years ago
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆16Updated last year
- ☆10Updated 2 months ago
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆9Updated last month
- Code for Backdoor Attacks Against Dataset Distillation☆29Updated last year
- Official Implementation of NIPS 2022 paper Pre-activation Distributions Expose Backdoor Neurons☆13Updated last year
- ☆60Updated 3 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated 11 months ago
- ☆63Updated 10 months ago
- Repository for Towards Codable Watermarking for Large Language Models☆26Updated last year
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆23Updated 2 years ago
- Code for the paper "Shadowcast: Stealthy Data Poisoning Attacks Against Vision-Language Models"☆21Updated 5 months ago
- SaTML'23 paper "Backdoor Attacks on Time Series: A Generative Approach" by Yujing Jiang, Xingjun Ma, Sarah Monazam Erfani, and James Bail…☆16Updated last year