euanong / image-hijacks
Official codebase for Image Hijacks: Adversarial Images can Control Generative Models at Runtime
☆44Updated last year
Alternatives and similar repositories for image-hijacks:
Users that are interested in image-hijacks are comparing it to the libraries listed below
- ☆32Updated 9 months ago
- ☆31Updated 3 months ago
- [AAAI'25 (Oral)] Jailbreaking Large Vision-language Models via Typographic Visual Prompts☆121Updated 2 weeks ago
- ☆31Updated 7 months ago
- [ICLR 2024 Spotlight 🔥 ] - [ Best Paper Award SoCal NLP 2023 🏆] - Jailbreak in pieces: Compositional Adversarial Attacks on Multi-Modal…☆41Updated 9 months ago
- ☆92Updated last year
- [COLM 2024] JailBreakV-28K: A comprehensive benchmark designed to evaluate the transferability of LLM jailbreak attacks to MLLMs, and fur…☆47Updated 8 months ago
- Code for Arxiv When Do Universal Image Jailbreaks Transfer Between Vision-Language Models?☆21Updated 2 weeks ago
- [ECCV 2024] Official PyTorch Implementation of "How Many Unicorns Are in This Image? A Safety Evaluation Benchmark for Vision LLMs"☆77Updated last year
- ☆38Updated 3 months ago
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆17Updated 4 months ago
- AnyDoor: Test-Time Backdoor Attacks on Multimodal Large Language Models☆50Updated 11 months ago
- [ICML 2024] Safety Fine-Tuning at (Almost) No Cost: A Baseline for Vision Large Language Models.☆57Updated last month
- ☆42Updated 7 months ago
- Code for Neurips 2024 paper "Shadowcast: Stealthy Data Poisoning Attacks Against Vision-Language Models"☆42Updated last month
- Accepted by ECCV 2024☆109Updated 4 months ago
- Repository for the Paper (AAAI 2024, Oral) --- Visual Adversarial Examples Jailbreak Large Language Models☆205Updated 10 months ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆62Updated 5 months ago
- A package that achieves 95%+ transfer attack success rate against GPT-4☆16Updated 4 months ago
- Code repo of our paper Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis (https://arxiv.org/abs/2406.10794…☆19Updated 7 months ago
- The official implementation of ECCV'24 paper "To Generate or Not? Safety-Driven Unlearned Diffusion Models Are Still Easy To Generate Uns…☆71Updated 2 weeks ago
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images☆30Updated last year
- [ICLR 2025] Dissecting Adversarial Robustness of Multimodal LM Agents☆70Updated 3 weeks ago
- [ACL 2024] CodeAttack: Revealing Safety Generalization Challenges of Large Language Models via Code Completion☆36Updated 4 months ago
- [NeurIPS-2023] Annual Conference on Neural Information Processing Systems☆186Updated 2 months ago
- An LLM can Fool Itself: A Prompt-Based Adversarial Attack (ICLR 2024)☆79Updated last month
- Code for paper "Universal Jailbreak Backdoors from Poisoned Human Feedback"☆48Updated 10 months ago
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆24Updated 4 months ago