Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"
☆28Sep 11, 2024Updated last year
Alternatives and similar repositories for llm-lora-trojan
Users that are interested in llm-lora-trojan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Backdooring Neural Code Search☆14Sep 8, 2023Updated 2 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Oct 21, 2021Updated 4 years ago
- ☆19Feb 25, 2024Updated 2 years ago
- ☆14Dec 12, 2023Updated 2 years ago
- Official implementation repository for the paper Towards General Conceptual Model Editing via Adversarial Representation Engineering.☆20Dec 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆17Feb 26, 2026Updated last month
- ☆15Apr 27, 2024Updated last year
- ☆16Sep 4, 2024Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆112Sep 27, 2024Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆53Jun 2, 2025Updated 9 months ago
- Audio Jailbreak: An Open Comprehensive Benchmark for Jailbreaking Large Audio-Language Models☆32Oct 6, 2025Updated 5 months ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Dec 9, 2021Updated 4 years ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆97Jan 20, 2025Updated last year
- ☆26Aug 21, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Dec 22, 2025Updated 3 months ago
- ☆37Oct 2, 2024Updated last year
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆45Oct 24, 2023Updated 2 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Nov 5, 2024Updated last year
- CovRL-Fuzz: Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation☆41Nov 10, 2024Updated last year
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Feb 18, 2021Updated 5 years ago
- A Confidential Computing-Aware Certificate Authority☆11Nov 22, 2025Updated 4 months ago
- [ECCV2024] Immunizing text-to-image Models against Malicious Adaptation☆17Jan 17, 2025Updated last year
- Source Code Search☆11Nov 16, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- Interactive Visual Tutorial for the Transformer Model☆13Sep 26, 2023Updated 2 years ago
- [ACL'24 Findings] Official code for "TLCR: Token-Level Continuous Reward for Fine-grained Reinforcement Learning from Human Feedback"☆12Dec 6, 2024Updated last year
- The code implementation of GraCeFul (Accepted in COLING 2025)☆13Jan 27, 2025Updated last year
- You will learn how to remove periodic noise in the Fourier domain☆12Oct 17, 2018Updated 7 years ago
- Code for Voice Jailbreak Attacks Against GPT-4o.☆38May 31, 2024Updated last year
- This is the repository that introduces research topics related to protecting intellectual property (IP) of AI from a data-centric perspec…☆23Oct 30, 2023Updated 2 years ago
- Extreme Image Compression Using Deep Learning☆16Nov 21, 2022Updated 3 years ago
- Code to conduct an embedding attack on LLMs☆31Jan 10, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Synthesizing Fingerprint from Pattern Type Analysis Features using cGAN - WITC 2019☆12Apr 19, 2019Updated 6 years ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆247Jan 27, 2026Updated 2 months ago
- ☆45Feb 26, 2025Updated last year
- ☆11Jun 10, 2024Updated last year
- SFINGE synthetic fingerprint generation☆15May 5, 2020Updated 5 years ago
- [NeurIPS 2021 | AIJ 2024] Multi-Objective Meta Learning☆17Jul 31, 2024Updated last year
- The code implementation of MuScleLoRA (Accepted in ACL 2024)☆10Dec 1, 2024Updated last year