UCF-ML-Research / TrojLLM
☆23Updated 8 months ago
Alternatives and similar repositories for TrojLLM:
Users that are interested in TrojLLM are comparing it to the libraries listed below
- A curated list of trustworthy Generative AI papers. Daily updating...☆69Updated 6 months ago
- Code for paper "Universal Jailbreak Backdoors from Poisoned Human Feedback"☆48Updated 10 months ago
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆36Updated 8 months ago
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆17Updated last year
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆57Updated last year
- This is the code repository of our submission: Understanding the Dark Side of LLMs’ Intrinsic Self-Correction.☆55Updated 2 months ago
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆30Updated 7 months ago
- [CCS-LAMPS'24] LLM IP Protection Against Model Merging☆13Updated 5 months ago
- [ACL 2024] CodeAttack: Revealing Safety Generalization Challenges of Large Language Models via Code Completion☆36Updated 4 months ago
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆17Updated 7 months ago
- ☆24Updated 4 months ago
- ☆30Updated 3 years ago
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆13Updated this week
- ☆12Updated 10 months ago
- ☆16Updated last year
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆25Updated 3 months ago
- ☆24Updated 2 years ago
- Repository for Towards Codable Watermarking for Large Language Models☆35Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆62Updated 5 months ago
- ☆24Updated 2 years ago
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆28Updated 7 months ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆35Updated last year
- ☆27Updated 9 months ago
- ☆79Updated 3 years ago
- This is the repository that introduces research topics related to protecting intellectual property (IP) of AI from a data-centric perspec…☆22Updated last year
- Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM☆29Updated last month
- ☆52Updated 3 weeks ago
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆18Updated last year
- Code repo of our paper Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis (https://arxiv.org/abs/2406.10794…☆19Updated 7 months ago