Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"
☆30Sep 11, 2024Updated last year
Alternatives and similar repositories for llm-lora-trojan
Users that are interested in llm-lora-trojan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Backdooring Neural Code Search☆14Sep 8, 2023Updated 2 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Oct 21, 2021Updated 4 years ago
- ☆19Feb 25, 2024Updated 2 years ago
- ☆14Dec 12, 2023Updated 2 years ago
- Official implementation repository for the paper Towards General Conceptual Model Editing via Adversarial Representation Engineering.☆20Dec 6, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆17Feb 26, 2026Updated 2 months ago
- ☆16Apr 27, 2024Updated 2 years ago
- ☆16Sep 4, 2024Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆112Sep 27, 2024Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆55Jun 2, 2025Updated 11 months ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Dec 9, 2021Updated 4 years ago
- Audio Jailbreak: An Open Comprehensive Benchmark for Jailbreaking Large Audio-Language Models☆33Oct 6, 2025Updated 7 months ago
- ☆25May 28, 2025Updated 11 months ago
- ☆26Aug 21, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆12Dec 22, 2025Updated 4 months ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆45Oct 24, 2023Updated 2 years ago
- Internal Consistency Regularization (CROW) for LLM Backdoor Elimination - Paper accepted to ICML 2025☆16May 6, 2025Updated last year
- Android native mediacodec decode/encode demo☆14Dec 16, 2021Updated 4 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆46Nov 5, 2024Updated last year
- [Usenix Security 2024] Official code implementation of "BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federa…☆47Sep 10, 2025Updated 7 months ago
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated 2 years ago
- [CCS 2025] DPImageBench is an open-source toolkit developed to facilitate the research and application of DP image synthesis.☆33Feb 19, 2026Updated 2 months ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Feb 18, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CovRL-Fuzz: Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation☆41Nov 10, 2024Updated last year
- A Confidential Computing-Aware Certificate Authority☆12Apr 10, 2026Updated 3 weeks ago
- [ECCV2024] Immunizing text-to-image Models against Malicious Adaptation☆18Jan 17, 2025Updated last year
- Source Code Search☆12Nov 16, 2023Updated 2 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- [ACL'24 Findings] Official code for "TLCR: Token-Level Continuous Reward for Fine-grained Reinforcement Learning from Human Feedback"☆12Dec 6, 2024Updated last year
- Interactive Visual Tutorial for the Transformer Model☆12Sep 26, 2023Updated 2 years ago
- You will learn how to remove periodic noise in the Fourier domain☆12Oct 17, 2018Updated 7 years ago
- Influence Maximization Paper List☆11May 11, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code for Voice Jailbreak Attacks Against GPT-4o.☆38May 31, 2024Updated last year
- This is the repository that introduces research topics related to protecting intellectual property (IP) of AI from a data-centric perspec…☆23Oct 30, 2023Updated 2 years ago
- Extreme Image Compression Using Deep Learning☆16Nov 21, 2022Updated 3 years ago
- Code to conduct an embedding attack on LLMs☆32Jan 10, 2025Updated last year
- [NeurIPS'24] RedCode: Risky Code Execution and Generation Benchmark for Code Agents☆75Apr 24, 2026Updated 2 weeks ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆263Jan 27, 2026Updated 3 months ago
- ☆10Jun 10, 2024Updated last year