chichidd / llm-lora-trojanLinks
Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"
☆23Updated last year
Alternatives and similar repositories for llm-lora-trojan
Users that are interested in llm-lora-trojan are comparing it to the libraries listed below
Sorting:
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆44Updated 4 months ago
- ☆36Updated last year
- ☆27Updated last year
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"☆19Updated last month
- [NeurIPS 2025] BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks and Defenses on Large Language Models☆218Updated 2 weeks ago
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆108Updated 11 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆52Updated 6 months ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆202Updated 7 months ago
- Agent Security Bench (ASB)☆124Updated this week
- Safety at Scale: A Comprehensive Survey of Large Model Safety☆194Updated 7 months ago
- ☆16Updated last year
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆38Updated last year
- Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings☆16Updated last month
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆22Updated 4 months ago
- ☆35Updated 11 months ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆30Updated last year
- ☆63Updated 9 months ago
- ☆82Updated last month
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆87Updated 8 months ago
- ☆23Updated last month
- ☆223Updated last month
- ☆26Updated 11 months ago
- ☆11Updated 11 months ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆44Updated 11 months ago
- ☆25Updated 3 years ago
- ☆12Updated 7 months ago
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆297Updated 10 months ago
- ☆31Updated last year
- SampDetox: Black-box Backdoor Defense via Perturbation-based Sample Detoxification☆12Updated 4 months ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆91Updated last year