Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"
☆29Sep 11, 2024Updated last year
Alternatives and similar repositories for llm-lora-trojan
Users that are interested in llm-lora-trojan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Backdooring Neural Code Search☆14Sep 8, 2023Updated 2 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Oct 21, 2021Updated 4 years ago
- ☆19Feb 25, 2024Updated 2 years ago
- ☆14Dec 12, 2023Updated 2 years ago
- Official implementation repository for the paper Towards General Conceptual Model Editing via Adversarial Representation Engineering.☆20Dec 6, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆16Sep 4, 2024Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆112Sep 27, 2024Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆55Jun 2, 2025Updated 10 months ago
- Audio Jailbreak: An Open Comprehensive Benchmark for Jailbreaking Large Audio-Language Models☆32Oct 6, 2025Updated 6 months ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Dec 9, 2021Updated 4 years ago
- ☆25May 28, 2025Updated 10 months ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆97Jan 20, 2025Updated last year
- ☆26Aug 21, 2024Updated last year
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆45Oct 24, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [Usenix Security 2024] Official code implementation of "BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federa…☆48Sep 10, 2025Updated 7 months ago
- CovRL-Fuzz: Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation☆41Nov 10, 2024Updated last year
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated 2 years ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Feb 18, 2021Updated 5 years ago
- [ECCV2024] Immunizing text-to-image Models against Malicious Adaptation☆18Jan 17, 2025Updated last year
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- [ACL'24 Findings] Official code for "TLCR: Token-Level Continuous Reward for Fine-grained Reinforcement Learning from Human Feedback"☆12Dec 6, 2024Updated last year
- Influence Maximization Paper List☆11May 11, 2022Updated 3 years ago
- Code for Voice Jailbreak Attacks Against GPT-4o.☆38May 31, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is the repository that introduces research topics related to protecting intellectual property (IP) of AI from a data-centric perspec…☆23Oct 30, 2023Updated 2 years ago
- Extreme Image Compression Using Deep Learning☆16Nov 21, 2022Updated 3 years ago
- [NeurIPS'24] RedCode: Risky Code Execution and Generation Benchmark for Code Agents☆70Nov 14, 2025Updated 5 months ago
- Code to conduct an embedding attack on LLMs☆31Jan 10, 2025Updated last year
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆254Jan 27, 2026Updated 2 months ago
- ☆10Jun 10, 2024Updated last year
- Implementation of "DeepWriter: A Multi-Stream Deep CNN for Text-independent Writer Identification"☆16Feb 3, 2020Updated 6 years ago
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- ☆46Feb 26, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code for paper "Membership Inference Attacks Against Vision-Language Models"☆28Jan 25, 2025Updated last year
- ☆16Sep 17, 2024Updated last year
- ☆36Sep 30, 2024Updated last year
- This is the official repository for the code used in the paper: "What Was Your Prompt? A Remote Keylogging Attack on AI Assistants", USEN…☆63Feb 5, 2025Updated last year
- ☆18Nov 28, 2023Updated 2 years ago
- This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Lang…☆22Jul 3, 2024Updated last year
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago