☆21May 23, 2025Updated 10 months ago
Alternatives and similar repositories for llm-anonymization
Users that are interested in llm-anonymization are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆72Feb 16, 2025Updated last year
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆20Sep 18, 2025Updated 6 months ago
- ☆20Feb 3, 2025Updated last year
- PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs☆34Jun 21, 2023Updated 2 years ago
- ☆39Nov 16, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆30Mar 13, 2026Updated last week
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- ☆11May 18, 2025Updated 10 months ago
- TabLeak: Tabular Data Leakage in Federated Learning☆18Jul 4, 2024Updated last year
- Constrained Decoding of Diffusion LLMs with Context-Free Grammars.☆43Dec 17, 2025Updated 3 months ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated last year
- Official implementation of "Data Mixture Inference: What do BPE tokenizers reveal about their training data?"☆18May 15, 2025Updated 10 months ago
- ☆11Dec 8, 2024Updated last year
- ☆13Feb 21, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Official Repository for Dataset Inference for LLMs☆41Jul 25, 2024Updated last year
- Provably Secure Steganography☆14Sep 13, 2025Updated 6 months ago
- ☆37Oct 17, 2024Updated last year
- ☆23Oct 29, 2023Updated 2 years ago
- ☆23Oct 25, 2024Updated last year
- Code for "When LLM Meets DRL: Advancing Jailbreaking Efficiency via DRL-guided Search" (NeurIPS 2024)☆18Oct 22, 2024Updated last year
- Demo of Role-Based Access Control in LLM Vector Databases☆16Nov 27, 2023Updated 2 years ago
- ☆25Apr 15, 2024Updated last year
- AutoHallusion Codebase (EMNLP 2024)☆22Dec 6, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Effective Prompt Extraction from Language Models☆34Sep 10, 2024Updated last year
- Javascript Trie experiment 𐄁 ☎️ 𐄁 old school "T9" word prediction☆13Jun 11, 2018Updated 7 years ago
- Benchmarking MIAs against LLMs.☆28Oct 8, 2024Updated last year
- PyTorch Implementation of Weakly Supervised Pre-training - [IJCAI19]☆12May 23, 2020Updated 5 years ago
- Code for Voice Jailbreak Attacks Against GPT-4o.☆37May 31, 2024Updated last year
- ☆10Jun 16, 2022Updated 3 years ago
- ☆26Feb 19, 2025Updated last year
- A lightweight macOS menu bar app for capturing screenshots (PNG), video (MP4), and animated GIFs of a selected screen region.☆49Updated this week
- Workaround for running ubuntu:21.10, fedora:35, and other glibc >= 2.34 distros on Docker <= 20.10.9☆25Oct 18, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- U-Net neural network applied to FWI problems☆13Dec 8, 2022Updated 3 years ago
- Modality-Agnostic Self-Supervised Learning with Meta-Learned Masked Auto-Encoder (NeurIPS 2023)☆10Jun 5, 2024Updated last year
- ☆12May 6, 2022Updated 3 years ago
- ☆28Aug 30, 2025Updated 6 months ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Drop-dead simple keypress event emitter and handler for Node.js. Create powerful CLI applications and experiences with ease. This library…☆18Dec 21, 2025Updated 3 months ago
- ☆25Jun 16, 2024Updated last year