The official repository of the paper "On the Exploitability of Instruction Tuning".
☆70Feb 5, 2024Updated 2 years ago
Alternatives and similar repositories for AutoPoison
Users that are interested in AutoPoison are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official implementation of GOAT model (ICML2023)☆38Jul 3, 2023Updated 2 years ago
- Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion☆11Apr 1, 2024Updated last year
- ☆33Nov 27, 2023Updated 2 years ago
- Official repo for Detecting, Explaining, and Mitigating Memorization in Diffusion Models (ICLR 2024)☆78Apr 3, 2024Updated last year
- Gemstones: A Model Suite for Multi-Faceted Scaling Laws (NeurIPS 2025)☆33Sep 28, 2025Updated 5 months ago
- ☆24Jan 27, 2022Updated 4 years ago
- A simple and efficient baseline for data attribution☆11Nov 10, 2023Updated 2 years ago
- What do we learn from inverting CLIP models?☆58Mar 6, 2024Updated 2 years ago
- ☆12Oct 20, 2023Updated 2 years ago
- ☆54Sep 11, 2021Updated 4 years ago
- ☆11Oct 20, 2023Updated 2 years ago
- The Official Repository for "Bring Your Own Data! Self-Supervised Evaluation for Large Language Models"☆107Sep 23, 2023Updated 2 years ago
- ☆18Oct 12, 2022Updated 3 years ago
- [NeurIPS 2024] Goldfish Loss: Mitigating Memorization in Generative LLMs☆98Nov 17, 2024Updated last year
- Pytorch Datasets for Easy-To-Hard☆29Jan 9, 2025Updated last year
- [NeurIPS 2024 / ICML 2025] LLM Quantization Attacks☆49Jan 15, 2026Updated 2 months ago
- Code for Active Learning at The ImageNet Scale. This repository implements many popular active learning algorithms and allows training wi…☆54Nov 29, 2021Updated 4 years ago
- Pytorch ImageNet1k Loader with Bounding Boxes.☆13Jan 23, 2022Updated 4 years ago
- Package to optimize Adversarial Attacks against (Large) Language Models with Varied Objectives☆70Feb 22, 2024Updated 2 years ago
- ☆26Dec 14, 2021Updated 4 years ago
- ☆69Feb 17, 2024Updated 2 years ago
- Official Code for "Baseline Defenses for Adversarial Attacks Against Aligned Language Models"☆31Oct 26, 2023Updated 2 years ago
- Official release of code for the paper RL is a hammer and LLMs are nails A simple RL approach to stronger prompt injection attacks☆42Feb 11, 2026Updated last month
- The official PyTorch implementation - Can Neural Nets Learn the Same Model Twice? Investigating Reproducibility and Double Descent from t…☆83May 5, 2022Updated 3 years ago
- Code to reproduce "Transformers Can Do Arithmetic with the Right Embeddings", McLeish et al (NeurIPS 2024)☆200May 28, 2024Updated last year
- Official repository of NEFTune: Noisy Embeddings Improves Instruction Finetuning☆412May 17, 2024Updated last year
- About Official PyTorch implementation of "Query-Efficient Black-Box Red Teaming via Bayesian Optimization" (ACL'23)☆15Jul 9, 2023Updated 2 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Oct 10, 2022Updated 3 years ago
- Code for paper "Universal Jailbreak Backdoors from Poisoned Human Feedback"☆65Apr 24, 2024Updated last year
- Official repository for the paper "Can You Learn an Algorithm? Generalizing from Easy to Hard Problems with Recurrent Networks"☆61Mar 1, 2022Updated 4 years ago
- ☆16Sep 4, 2024Updated last year
- ☆348Mar 21, 2024Updated 2 years ago
- ☆14Jun 4, 2025Updated 9 months ago
- Implementations of data poisoning attacks against neural networks and related defenses.☆105Jul 16, 2024Updated last year
- Efficient Multimodal Foundation Model Adaptation for Recommendation☆47Feb 26, 2026Updated 3 weeks ago
- Code for "Improving Translation Faithfulness of Large Language Models via Augmenting Instructions"☆12Aug 26, 2023Updated 2 years ago
- Official Implementation for "Purifying Quantization-conditioned Backdoors via Layer-wise Activation Correction with Distribution Approxim…☆12Aug 14, 2024Updated last year
- [ICML 2023] Protecting Language Generation Models via Invisible Watermarking☆13Sep 8, 2023Updated 2 years ago
- ☆11Oct 2, 2023Updated 2 years ago