brian-lou / Training-Data-Extraction-Attack-on-LLMsLinks
This project explores training data extraction attacks on the LLaMa 7B, GPT-2XL, and GPT-2-IMDB models to discover memorized content using perplexity, perturbation scoring metrics, and large scale search queries.
☆14Updated last year
Alternatives and similar repositories for Training-Data-Extraction-Attack-on-LLMs
Users that are interested in Training-Data-Extraction-Attack-on-LLMs are comparing it to the libraries listed below
Sorting:
- AutoDefense: Multi-Agent LLM Defense against Jailbreak Attacks☆47Updated 2 weeks ago
- LLM Self Defense: By Self Examination, LLMs know they are being tricked☆34Updated last year
- Unofficial implementation of "Backdooring Instruction-Tuned Large Language Models with Virtual Prompt Injection"☆18Updated 11 months ago
- ☆43Updated 2 years ago
- Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers☆52Updated 9 months ago
- Whispers in the Machine: Confidentiality in Agentic Systems☆39Updated 2 weeks ago
- A survey of privacy problems in Large Language Models (LLMs). Contains summary of the corresponding paper along with relevant code☆67Updated last year
- Can Large Language Models Solve Security Challenges? We test LLMs' ability to interact and break out of shell environments using the Over…☆13Updated last year
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆51Updated 9 months ago
- The repository contains the code for analysing the leakage of personally identifiable (PII) information from the output of next word pred…☆96Updated 9 months ago
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆128Updated last month
- [Findings of ACL 2023] Bridge the Gap Between CV and NLP! A Optimization-based Textual Adversarial Attack Framework.☆13Updated last year
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆35Updated 10 months ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆79Updated 8 months ago
- ☆44Updated 2 years ago
- [USENIX'24] Prompt Stealing Attacks Against Text-to-Image Generation Models☆37Updated 4 months ago
- Package to optimize Adversarial Attacks against (Large) Language Models with Varied Objectives☆69Updated last year
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆36Updated 11 months ago
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆42Updated 10 months ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆73Updated 9 months ago
- ☆39Updated 8 months ago
- The code for paper "The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation (RAG)", exploring the privacy risk o…☆48Updated 4 months ago
- ☆36Updated 2 years ago
- ☆44Updated 4 months ago
- ☆98Updated last year
- Jailbreak artifacts for JailbreakBench☆60Updated 7 months ago
- ☆57Updated 5 months ago
- Code to generate NeuralExecs (prompt injection for LLMs)☆22Updated 6 months ago
- To Think or Not to Think: Exploring the Unthinking Vulnerability in Large Reasoning Models☆30Updated 2 weeks ago
- Open One-Stop Moderation Tools for Safety Risks, Jailbreaks, and Refusals of LLMs☆79Updated 6 months ago