google-research-datasets / adversarial-nibblerView external linksLinks
This dataset contains results from all rounds of Adversarial Nibbler. This data includes adversarial prompts fed into public generative text2image models and validations for unsafe images. There will be two sets of data: all prompts submitted and all prompts attempted (sent to t2i models but not submitted as unsafe).
☆25Feb 3, 2025Updated last year
Alternatives and similar repositories for adversarial-nibbler
Users that are interested in adversarial-nibbler are comparing it to the libraries listed below
Sorting:
- ☆22May 28, 2025Updated 8 months ago
- ☆25Jun 23, 2021Updated 4 years ago
- ☆22Sep 20, 2023Updated 2 years ago
- Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code (Findings of EACL …☆12Updated this week
- Safe Unlearning: A Surprisingly Effective and Generalizable Solution to Defend Against Jailbreak Attacks☆32Jul 9, 2024Updated last year
- Auditing agents for fine-tuning safety☆18Oct 21, 2025Updated 3 months ago
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆33Oct 17, 2023Updated 2 years ago
- 日志分析库,nuclei 的另一种用法☆33Aug 28, 2022Updated 3 years ago
- ☆12May 6, 2022Updated 3 years ago
- Implementation of PCA algorithm using Gram-Scmidt modification on NIPALS☆10Jun 13, 2015Updated 10 years ago
- ☆34Jun 27, 2022Updated 3 years ago
- ☆11Oct 30, 2024Updated last year
- Uncovering User Interest from Biased and Noised Watch Time in Video Recommendation. In Recsys23.☆11Jul 18, 2023Updated 2 years ago
- Baidu Search MCP Server I A Model Context Protocol (MCP) server that provides web search capabilities through Baidu, with additional feat…☆19Oct 27, 2025Updated 3 months ago
- ☆10Jul 8, 2021Updated 4 years ago
- ☆13Jan 4, 2026Updated last month
- ☆10Nov 15, 2023Updated 2 years ago
- [IEEE TIP] Offical implementation for the work "BadCM: Invisible Backdoor Attack against Cross-Modal Learning".☆14Aug 30, 2024Updated last year
- ☆12Sep 22, 2024Updated last year
- ☆11Dec 9, 2018Updated 7 years ago
- Book: Practical Probabilistic Machine Learning in Python☆10Apr 3, 2021Updated 4 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago
- Factoried Personalized Markov Chains for Next Basket Recommendation in R and Python☆13Jan 7, 2018Updated 8 years ago
- Goal Go Red-Team 工具类☆44Jan 15, 2025Updated last year
- EasyRLHF aims to provide an easy and minimal interface to train aligned language models, using off-the-shelf solutions and datasets☆10Dec 12, 2023Updated 2 years ago
- IoM defualt mal package☆10Jul 22, 2025Updated 6 months ago
- ☆10Dec 18, 2024Updated last year
- springboot auto xss☆11May 23, 2018Updated 7 years ago
- This repository contains the code used to run generate the data splits, run the hyperparameter tunings, and export the results presented …☆13Jul 22, 2022Updated 3 years ago
- Model-based clustering package for mixed data☆13Jun 16, 2025Updated 8 months ago
- Official repository of "Beyond Spatial Frequency: Pixel-wise Temporal Frequency-based Deepfake Video Detection" [ICCV 2025]☆20Jan 17, 2026Updated 3 weeks ago
- Analyzer: CommentMap utilities for static analysis in Go☆12Nov 15, 2024Updated last year
- The implementation of our IEEE S&P 2024 paper "Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples".☆11Jun 28, 2024Updated last year
- Materials for the "Recommender Systems through the lens of Decision Theory" tutorial delivered at the 30th Web Conference (WWW '21).☆11Apr 13, 2021Updated 4 years ago
- Disguising Attacks with Explanation-Aware Backdoors (IEEE S&P 2023)☆11Jan 3, 2026Updated last month
- Query Expansion using word2vec☆11Jul 18, 2019Updated 6 years ago
- naming convention library for CamelCase, snake_case and friends☆11Mar 25, 2023Updated 2 years ago
- ☆11Oct 14, 2021Updated 4 years ago
- ☆11Dec 20, 2023Updated 2 years ago