dukeceicenter / jailbreak-reasoning-openai-o1o3-deepseek-r1View external linksLinks
☆117Apr 27, 2025Updated 9 months ago
Alternatives and similar repositories for jailbreak-reasoning-openai-o1o3-deepseek-r1
Users that are interested in jailbreak-reasoning-openai-o1o3-deepseek-r1 are comparing it to the libraries listed below
Sorting:
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- PLM: Efficient Peripheral Language Models Hardware-Co-Designed for Ubiquitous Computing☆21Mar 18, 2025Updated 11 months ago
- ☆39May 17, 2025Updated 9 months ago
- [ACL 2025] Beyond Prompt Engineering: Robust Behavior Control in LLMs via Steering Target Atoms☆35Jun 4, 2025Updated 8 months ago
- Emoji Attack [ICML 2025]☆41Jul 15, 2025Updated 7 months ago
- ☆10Mar 6, 2022Updated 3 years ago
- ☆12Sep 24, 2024Updated last year
- ☆121Feb 3, 2025Updated last year
- ☆12Jul 16, 2025Updated 7 months ago
- ☆12Dec 17, 2024Updated last year
- ☆14Oct 6, 2024Updated last year
- ☆25Jun 28, 2025Updated 7 months ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- ☆19Dec 20, 2025Updated last month
- ☆12Sep 10, 2024Updated last year
- [EMNLP 2025] Reasoning-to-Defend: Safety-Aware Reasoning Can Defend Large Language Models from Jailbreaking☆12Aug 22, 2025Updated 5 months ago
- Case study on evaluating statistical tools that predict recidivism.☆15Aug 1, 2024Updated last year
- Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers☆65Aug 25, 2024Updated last year
- ☆23Oct 30, 2025Updated 3 months ago
- Codebase used to generate the results for NeurIPS23 "Adversarial Training for Graph Neural Networks: Pitfalls, Solutions, and New Directi…☆12Dec 8, 2023Updated 2 years ago
- Chain-of-Thought Matters: Improving Long-Context Language Models with Reasoning Path Supervision☆18Apr 1, 2025Updated 10 months ago
- Adversarial Attack on Graph Neural Networks as An Influence Maximization Problem☆20Oct 27, 2021Updated 4 years ago
- Artifact evaluation of MobiSys25 SynCheck☆19Mar 24, 2025Updated 10 months ago
- Official codebase for "STAIR: Improving Safety Alignment with Introspective Reasoning"☆88Feb 26, 2025Updated 11 months ago
- ☆16Oct 16, 2024Updated last year
- Official repository for "On the Multi-modal Vulnerability of Diffusion Models"☆16Jul 15, 2024Updated last year
- MRAgent is an LLM-based tool that automates Mendelian randomization analysis, reducing manual effort by autonomously scanning literature,…☆24Jul 28, 2025Updated 6 months ago
- ☆25Oct 22, 2025Updated 3 months ago
- Official Code for ART: Automatic Red-teaming for Text-to-Image Models to Protect Benign Users (NeurIPS 2024)☆23Oct 23, 2024Updated last year
- [NAACL 2025] Representing Rule-based Chatbots with Transformers☆23Feb 9, 2025Updated last year
- [DAI 2025] Beyond GPT-5: Making LLMs Cheaper and Better via Performance–Efficiency Optimized Routing☆201Dec 11, 2025Updated 2 months ago
- [USENIX'24] Prompt Stealing Attacks Against Text-to-Image Generation Models☆50Jan 11, 2025Updated last year
- ☆47Jul 14, 2024Updated last year
- Offical Repository of MetaAgent Program☆40Dec 2, 2025Updated 2 months ago
- All in How You Ask for It: Simple Black-Box Method for Jailbreak Attacks☆18Apr 24, 2024Updated last year
- ☆47Feb 4, 2026Updated last week
- ☆24Aug 7, 2025Updated 6 months ago
- Code repository for the paper "Heuristic Induced Multimodal Risk Distribution Jailbreak Attack for Multimodal Large Language Models"☆15Aug 7, 2025Updated 6 months ago
- EraseAnything, ICML 2025☆39Sep 28, 2025Updated 4 months ago