☆19Feb 25, 2024Updated 2 years ago
Alternatives and similar repositories for rlhf-trojan-competition-submission
Users that are interested in rlhf-trojan-competition-submission are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆30Sep 11, 2024Updated last year
- A Static Differential Analysis Tool of Network Protocol Parsers☆29Feb 21, 2024Updated 2 years ago
- Finding trojans in aligned LLMs. Official repository for the competition hosted at SaTML 2024.☆115Jun 13, 2024Updated last year
- ☆20Feb 11, 2024Updated 2 years ago
- The repo for paper: Exploiting the Index Gradients for Optimization-Based Jailbreaking on Large Language Models.☆14Dec 16, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Is In-Context Learning Sufficient for Instruction Following in LLMs? [ICLR 2025]☆32Jan 23, 2025Updated last year
- The official repository of 'Unnatural Language Are Not Bugs but Features for LLMs'☆24May 20, 2025Updated 11 months ago
- Code and data to go with the Zhu et al. paper "An Objective for Nuanced LLM Jailbreaks"☆36Apr 8, 2026Updated last month
- [ECCV'24] UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening☆10Dec 18, 2025Updated 4 months ago
- Code and datasets for the salesforce AI research paper on prompt leakage and multi-turn threats against LLMs☆22Nov 10, 2025Updated 5 months ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆55Jun 2, 2025Updated 11 months ago
- Interactive Visual Tutorial for the Transformer Model☆12Sep 26, 2023Updated 2 years ago
- CveBinarySheet: A Comprehensive Pre-built Binaries Database Focused on IoT Vulnerability Scenarios☆17Jan 17, 2025Updated last year
- Code to reproduce results on toy tasks and companion blog for the paper.☆22Jun 8, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Official Implementation of NIPS 2022 paper Pre-activation Distributions Expose Backdoor Neurons☆15Jan 13, 2023Updated 3 years ago
- ☆12May 27, 2022Updated 3 years ago
- Data Poisoning in Deep Learning: A Survey☆22Jan 18, 2026Updated 3 months ago
- ☆11Oct 10, 2023Updated 2 years ago
- ☆34Jun 27, 2022Updated 3 years ago
- Adversaial attack comparative assessment Large Language Model☆13May 21, 2025Updated 11 months ago
- ☆13May 1, 2024Updated 2 years ago
- Co-Supervised Learning: Improving Weak-to-Strong Generalization with Hierarchical Mixture of Experts☆16Feb 26, 2024Updated 2 years ago
- SAGE disambiguates protocol description in an IETF RFC document, then converts the disambiguated protocol description into executable pro…☆19Aug 9, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 🚀 LLM-I: Transform LLMs into natural interleaved multimodal creators! ✨ Tool-use framework supporting image search, generation, code ex…☆40Oct 20, 2025Updated 6 months ago
- Code for ICLR 2025 Failures to Find Transferable Image Jailbreaks Between Vision-Language Models☆36Jun 1, 2025Updated 11 months ago
- State-based Network AttacK Explorer (SNAKE) code☆14Sep 6, 2019Updated 6 years ago
- Data and code for the preprint "In-Context Learning with Long-Context Models: An In-Depth Exploration"☆43Aug 20, 2024Updated last year
- ☆16Sep 4, 2024Updated last year
- Code and resources for model learning of network protocol implementations☆18Oct 26, 2023Updated 2 years ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆112Sep 27, 2024Updated last year
- JavaScript execution as a tool for LLM☆25May 27, 2025Updated 11 months ago
- This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Lang…☆22Jul 3, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆16Dec 29, 2023Updated 2 years ago
- This is the repository for USENIX Security 2023 paper "Hard-label Black-box Universal Adversarial Patch Attack".☆15Sep 5, 2023Updated 2 years ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Jan 27, 2024Updated 2 years ago
- ☆12May 6, 2022Updated 4 years ago
- ☆18Aug 15, 2022Updated 3 years ago
- [NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding re…☆25Jun 27, 2024Updated last year
- ☆18Jun 15, 2021Updated 4 years ago