YitingQu / meme-evolutionLinks
☆14Updated last year
Alternatives and similar repositories for meme-evolution
Users that are interested in meme-evolution are comparing it to the libraries listed below
Sorting:
- Code and data for our paper "Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark"…☆49Updated 2 years ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆20Updated 2 months ago
- ☆82Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆35Updated 2 months ago
- Seminar 2022☆21Updated 3 weeks ago
- Fingerprint large language models☆41Updated last year
- Code for Voice Jailbreak Attacks Against GPT-4o.☆32Updated last year
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆29Updated last year
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"☆16Updated 7 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆48Updated 4 months ago
- ☆24Updated 6 months ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Updated last month
- Bad Characters: Imperceptible NLP Attacks☆35Updated last year
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- ☆19Updated last year
- Repository for Towards Codable Watermarking for Large Language Models☆38Updated last year
- [USENIX'24] Prompt Stealing Attacks Against Text-to-Image Generation Models☆43Updated 7 months ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Updated 3 years ago
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆16Updated 5 months ago
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queries☆44Updated 2 weeks ago
- ☆16Updated 11 months ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆73Updated 11 months ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- ☆35Updated 10 months ago
- ☆47Updated 10 months ago
- ☆159Updated 6 months ago
- [ISSTA 2025] Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG☆38Updated 3 weeks ago
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆102Updated 10 months ago
- ☆15Updated last year
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆12Updated this week