This dataset contains results from all rounds of Adversarial Nibbler. This data includes adversarial prompts fed into public generative text2image models and validations for unsafe images. There will be two sets of data: all prompts submitted and all prompts attempted (sent to t2i models but not submitted as unsafe).
☆25Feb 3, 2025Updated last year
Alternatives and similar repositories for adversarial-nibbler
Users that are interested in adversarial-nibbler are comparing it to the libraries listed below
Sorting:
- ☆22May 28, 2025Updated 9 months ago
- ☆25Jun 23, 2021Updated 4 years ago
- ☆23Sep 20, 2023Updated 2 years ago
- Safe Unlearning: A Surprisingly Effective and Generalizable Solution to Defend Against Jailbreak Attacks☆32Jul 9, 2024Updated last year
- Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code (Findings of EACL …☆12Feb 11, 2026Updated 3 weeks ago
- Auditing agents for fine-tuning safety☆20Oct 21, 2025Updated 4 months ago
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆33Oct 17, 2023Updated 2 years ago
- LLMs as Collaboratively Edited Knowledge Bases☆46Feb 8, 2026Updated last month
- Prepend universal audio attack segment to mute Whisper☆36Jan 22, 2025Updated last year
- This is the code of ICLR 2022 Oral paper 'Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Au…☆30Oct 22, 2023Updated 2 years ago
- official code for unigame☆19Nov 26, 2025Updated 3 months ago
- Implementation of PCA algorithm using Gram-Scmidt modification on NIPALS☆10Jun 13, 2015Updated 10 years ago
- ☆12May 6, 2022Updated 3 years ago
- ☆34Jun 27, 2022Updated 3 years ago
- Run large scale tensor and coupled matrix-tensor factorization on top of stock Hadoop.☆18Dec 28, 2017Updated 8 years ago
- ☆11Oct 30, 2024Updated last year
- Factoried Personalized Markov Chains for Next Basket Recommendation in R and Python☆13Jan 7, 2018Updated 8 years ago
- ☆10Nov 15, 2023Updated 2 years ago
- ☆10Jul 8, 2021Updated 4 years ago
- Book: Practical Probabilistic Machine Learning in Python☆10Apr 3, 2021Updated 4 years ago
- Uncovering User Interest from Biased and Noised Watch Time in Video Recommendation. In Recsys23.☆11Jul 18, 2023Updated 2 years ago
- ☆11Dec 9, 2018Updated 7 years ago
- Disguising Attacks with Explanation-Aware Backdoors (IEEE S&P 2023)☆12Jan 3, 2026Updated 2 months ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- ☆13Oct 25, 2019Updated 6 years ago
- HFMF: Hierarchical Fusion Meets Multi-Stream Models for Deepfake Detection☆13Jan 6, 2025Updated last year
- 这是一个小型的网络空间搜索引擎☆13Jul 20, 2019Updated 6 years ago
- ☆10Dec 18, 2024Updated last year
- Analyzer: CommentMap utilities for static analysis in Go☆12Nov 15, 2024Updated last year
- ☆11Oct 14, 2021Updated 4 years ago
- The Tweets2013 Internet Archive collection☆10Aug 7, 2020Updated 5 years ago
- a very fast parser for sparse matrix at libsvm format☆10Nov 13, 2017Updated 8 years ago
- CIKM 2019 E-Commerce AI Challenge - 超大规模推荐之用户兴趣高效检索☆11Jul 14, 2021Updated 4 years ago
- EasyRLHF aims to provide an easy and minimal interface to train aligned language models, using off-the-shelf solutions and datasets☆10Dec 12, 2023Updated 2 years ago
- Jax implementation of VIT-VQGAN☆10Jan 25, 2024Updated 2 years ago
- ☆10Aug 10, 2017Updated 8 years ago
- Baidu Search MCP Server I A Model Context Protocol (MCP) server that provides web search capabilities through Baidu, with additional feat…☆22Oct 27, 2025Updated 4 months ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- ☆17Jul 23, 2025Updated 7 months ago