YitingQu / meme-evolution
☆12Updated 6 months ago
Alternatives and similar repositories for meme-evolution:
Users that are interested in meme-evolution are comparing it to the libraries listed below
- Code and data for our paper "Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark"…☆48Updated last year
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆68Updated 4 months ago
- ☆18Updated 11 months ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Updated 11 months ago
- Repository for Towards Codable Watermarking for Large Language Models☆35Updated last year
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆30Updated 6 months ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆15Updated 3 months ago
- ☆23Updated last year
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆32Updated 3 years ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆41Updated 2 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆22Updated 3 years ago
- ☆16Updated 5 months ago
- Source code of paper "An Unforgeable Publicly Verifiable Watermark for Large Language Models" accepted by ICLR 2024☆31Updated 9 months ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆69Updated 5 months ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆42Updated 2 years ago
- ☆14Updated 2 years ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Updated 3 years ago
- Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM☆28Updated last month
- ☆77Updated 10 months ago
- ☆14Updated 3 years ago
- ☆146Updated 3 weeks ago
- Watermarking Text Generated by Black-Box Language Models☆33Updated last year
- ☆18Updated 11 months ago
- Bad Characters: Imperceptible NLP Attacks☆34Updated 10 months ago
- Accepted by IJCAI-24 Survey Track☆190Updated 5 months ago
- Code for Findings-EMNLP 2023 paper: Multi-step Jailbreaking Privacy Attacks on ChatGPT☆30Updated last year
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆52Updated 2 years ago
- ☆9Updated 2 years ago
- Seminar 2022☆22Updated 2 weeks ago