gitkolento / Adversarial-Attacks-on-LLMs
针对大语言模型的对抗性攻击总结
☆25Updated last year
Alternatives and similar repositories for Adversarial-Attacks-on-LLMs
Users that are interested in Adversarial-Attacks-on-LLMs are comparing it to the libraries listed below
Sorting:
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆93Updated 7 months ago
- This Github repository summarizes a list of research papers on AI security from the four top academic conferences.☆119Updated 3 weeks ago
- ☆24Updated 6 months ago
- 复旦白泽大模型安全基准测试集(2024年夏季版)☆37Updated 9 months ago
- 全国大学生信息安全竞赛作品赛 非官方 LaTex 论文模板☆22Updated last year
- Safety at Scale: A Comprehensive Survey of Large Model Safety☆153Updated 2 months ago
- JailBench:大型语言模型越狱攻击风险评测中文数据集 [PAKDD 2025]☆83Updated 2 months ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆36Updated 6 months ago
- Code for ACM MM2024 paper: White-box Multimodal Jailbreaks Against Large Vision-Language Models☆26Updated 4 months ago
- ☆52Updated 4 months ago
- ☆79Updated last year
- ☆31Updated 2 months ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆17Updated 8 months ago
- ☆17Updated 2 months ago
- ☆55Updated 4 months ago
- ☆31Updated 7 months ago
- ☆126Updated 7 months ago
- ☆220Updated 11 months ago
- The most comprehensive and accurate LLM jailbreak attack benchmark by far☆19Updated last month
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆174Updated 2 years ago
- ☆23Updated 8 months ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆30Updated last year
- AI Model Security Reading Notes☆37Updated 2 months ago
- ☆29Updated 5 months ago
- LLM 安全资料收集与学习☆21Updated 10 months ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆147Updated 2 months ago
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆255Updated 4 months ago
- ☆27Updated 7 months ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆93Updated 2 years ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆45Updated last month