Hide and Seek (HaS): A Framework for Prompt Privacy Protection
☆54Sep 6, 2023Updated 2 years ago
Alternatives and similar repositories for Hide-and-Seek
Users that are interested in Hide-and-Seek are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- By calling FirewaLLM, users can ensure the accuracy of the large model while greatly reducing the risk of privacy leakage when interactin…☆42Sep 21, 2023Updated 2 years ago
- 🤫 Code and benchmark for our ICLR 2024 spotlight paper: "Can LLMs Keep a Secret? Testing Privacy Implications of Language Models via Con…☆50Dec 20, 2023Updated 2 years ago
- AIM MCP Server :: Guard and Protect your MCPs & AI Chatting☆20Oct 13, 2025Updated 5 months ago
- EACL 2021☆11May 4, 2021Updated 4 years ago
- 🛡️ 微步在线威胁分析完整API MCP服务器 - 基于MCP协议的威胁情报查询工具,支持IP分析、域名检测、文件扫描、URL分析、漏洞情报等15个完整API工具,可与Claude Desktop等AI助手无缝集成进行智能化安全分析。☆38Jun 24, 2025Updated 9 months ago
- Towards model-agnostic federated learning using knowledge distillation, ICLR 2022☆10Mar 12, 2022Updated 4 years ago
- ☆13Jan 2, 2023Updated 3 years ago
- Watermark For Text☆22Mar 6, 2025Updated last year
- The implementation codes of paper: Multimodal Sentiment Analysis with Mutual Information-based Disentangled Representation Learning☆19May 8, 2025Updated 10 months ago
- Longyin Zhang, Fang Kong, and Guodong Zhou. Adversarial Learning for Discourse Rhetorical Structure Parsing. Accepted by ACL-IJCNLP2021.☆18Jan 12, 2023Updated 3 years ago
- ☆19Sep 19, 2024Updated last year
- ☆11Jan 21, 2021Updated 5 years ago
- Garbled circuits in Python☆25Jun 1, 2017Updated 8 years ago
- Application and blog explaining my interpretations of In-run Data Shapley☆30Jan 30, 2025Updated last year
- Official code for "Evaluations of Machine Learning Privacy Defenses are Misleading" (https://arxiv.org/abs/2404.17399)☆12Apr 29, 2024Updated last year
- Code for Representation Bending Paper☆17Jul 15, 2025Updated 8 months ago
- ☆13Mar 25, 2022Updated 3 years ago
- Implementation of "Can we obtain significant success in RST discourse parsing by using Large Language Models?" (accepted by EACL 2024)☆19May 13, 2024Updated last year
- 一份功能简单的油猴(Tampermonkey)脚本,专为刷南大新生网课而设计。☆27Aug 19, 2025Updated 7 months ago
- ☆23Nov 1, 2022Updated 3 years ago
- [NeurIPS 2024 D&B] DetectRL: Benchmarking LLM-Generated Text Detection in Real-World Scenarios☆14Nov 19, 2024Updated last year
- [CIKM 2025] Constraint Back-translation Improves Complex Instruction Following of Large Language Models☆17May 23, 2025Updated 10 months ago
- Code the ICML 2024 paper: "Variance-reduced Zeroth-Order Methods for Fine-Tuning Language Models"☆12Jun 25, 2024Updated last year
- [BMVC2024] Erasing Concepts from Text-to-Image Diffusion Models with Few-shot Unlearning☆14Feb 14, 2026Updated last month
- Code for the paper "CoS: Enhancing Personalization and Mitigating Bias with Context Steering"☆20Dec 13, 2024Updated last year
- Code for MInD: Multimodal Information Disentanglement☆18Dec 17, 2025Updated 3 months ago
- PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents (TDSC 2024)☆19Mar 29, 2024Updated last year
- Code for USENIX Security 2023 Paper "Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks"☆21May 19, 2024Updated last year
- [ICML 2024 Spotlight] Differentially Private Synthetic Data via Foundation Model APIs 2: Text☆57Jan 11, 2025Updated last year
- Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles☆20Jul 26, 2023Updated 2 years ago
- codebase for paper DiffuSum: Generation Enhanced Extractive Summarization with Diffusion☆20Aug 15, 2023Updated 2 years ago
- ☆19Dec 23, 2024Updated last year
- feapder的管道扩展☆16Mar 6, 2023Updated 3 years ago
- Love your Data. Love the Environment. Love VULKИ.☆43Jun 13, 2020Updated 5 years ago
- A survey of privacy problems in Large Language Models (LLMs). Contains summary of the corresponding paper along with relevant code☆69May 30, 2024Updated last year
- Chat to various Large language models through a GUI☆26Feb 7, 2025Updated last year
- Vulnerability knowledge graph construction☆30Dec 24, 2022Updated 3 years ago
- 📚【更新中】AI-Driven Enterprise Security: Architecture, Methodology, and Practice:AI驱动的企业安全建设实战,覆盖安全架构设计、方法论框架与工程实践,系统化提出 AISecOps 方法论框架,将 AI…☆89Jan 31, 2026Updated last month
- repo in several methods FedAvg, FedMD, FedProto, FedProx, FedHKD.☆27Nov 21, 2023Updated 2 years ago