☆22May 23, 2025Updated 11 months ago
Alternatives and similar repositories for llm-anonymization
Users that are interested in llm-anonymization are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆73Feb 16, 2025Updated last year
- A Synthetic Dataset for Personal Attribute Inference (NeurIPS'24 D&B)☆54Jul 27, 2025Updated 9 months ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆20Sep 18, 2025Updated 7 months ago
- ☆56Feb 24, 2026Updated 2 months ago
- [SIGGRAPH Asia 2025] The official implementation of the paper "DvD: Unleashing a Generative Paradigm for Document Dewarping via Coordinat…☆33Mar 10, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs☆34Jun 21, 2023Updated 2 years ago
- [TDSC 2025] InferDPT: Privacy-Preserving Inference for Closed-box Large Language Model☆41Nov 16, 2025Updated 5 months ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- ☆11May 18, 2025Updated 11 months ago
- TabLeak: Tabular Data Leakage in Federated Learning☆17Jul 4, 2024Updated last year
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated 2 years ago
- Constrained Decoding of Diffusion LLMs with Context-Free Grammars.☆48Dec 17, 2025Updated 4 months ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated 2 years ago
- Official implementation of "Data Mixture Inference: What do BPE tokenizers reveal about their training data?"☆18May 15, 2025Updated 11 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆11Dec 8, 2024Updated last year
- ☆94Mar 13, 2026Updated last month
- ☆13Feb 21, 2025Updated last year
- Official Repository for Dataset Inference for LLMs☆41Jul 25, 2024Updated last year
- Provably Secure Steganography☆26Sep 13, 2025Updated 7 months ago
- ☆38Oct 17, 2024Updated last year
- ☆22Oct 25, 2024Updated last year
- Code for "When LLM Meets DRL: Advancing Jailbreaking Efficiency via DRL-guided Search" (NeurIPS 2024)☆18Oct 22, 2024Updated last year
- Demo of Role-Based Access Control in LLM Vector Databases☆18Nov 27, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆25Apr 15, 2024Updated 2 years ago
- AutoHallusion Codebase (EMNLP 2024)☆22Dec 6, 2024Updated last year
- Effective Prompt Extraction from Language Models☆40Sep 10, 2024Updated last year
- Benchmarking MIAs against LLMs.☆28Oct 8, 2024Updated last year
- Code for Voice Jailbreak Attacks Against GPT-4o.☆38May 31, 2024Updated last year
- PyTorch Implementation of Weakly Supervised Pre-training - [IJCAI19]☆12May 23, 2020Updated 5 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- ☆28Feb 19, 2025Updated last year
- [NeurIPS 2024 / ICML 2025] LLM Quantization Attacks☆50Jan 15, 2026Updated 3 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Code for the paper: "Adversarial Examples for Models of Code"☆19Nov 16, 2020Updated 5 years ago
- Modality-Agnostic Self-Supervised Learning with Meta-Learned Masked Auto-Encoder (NeurIPS 2023)☆10Jun 5, 2024Updated last year
- U-Net neural network applied to FWI problems☆13Dec 8, 2022Updated 3 years ago
- ☆12May 6, 2022Updated 3 years ago
- ☆25Jun 16, 2024Updated last year
- Python implementation of Multi-Index Hashing☆15Sep 6, 2019Updated 6 years ago
- Improved Few-Shot Jailbreaking Can Circumvent Aligned Language Models and Their Defenses (NeurIPS 2024)☆65Jan 11, 2025Updated last year