YitingQu / meme-evolution
☆13Updated 9 months ago
Alternatives and similar repositories for meme-evolution
Users that are interested in meme-evolution are comparing it to the libraries listed below
Sorting:
- Code and data for our paper "Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark"…☆50Updated last year
- ☆79Updated last year
- ☆24Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆45Updated last month
- Seminar 2022☆21Updated 2 months ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆43Updated 2 years ago
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"☆14Updated 5 months ago
- The most comprehensive and accurate LLM jailbreak attack benchmark by far☆19Updated last month
- ☆19Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆23Updated 6 months ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆16Updated last month
- ☆18Updated 3 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Updated last month
- Code for Findings-EMNLP 2023 paper: Multi-step Jailbreaking Privacy Attacks on ChatGPT☆33Updated last year
- ☆24Updated 3 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Repository for Towards Codable Watermarking for Large Language Models☆36Updated last year
- Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM☆31Updated 4 months ago
- ☆13Updated last year
- ☆21Updated last year
- Watermarking Text Generated by Black-Box Language Models☆36Updated last year
- Bad Characters: Imperceptible NLP Attacks☆34Updated last year
- Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG (ISSTA 2025)☆21Updated this week
- ☆24Updated 3 months ago
- Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers☆52Updated 8 months ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- AmpleGCG: Learning a Universal and Transferable Generator of Adversarial Attacks on Both Open and Closed LLM☆62Updated 6 months ago
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆16Updated 2 months ago
- Code for Voice Jailbreak Attacks Against GPT-4o.☆31Updated 11 months ago
- ☆23Updated 8 months ago