idllresearch / malicious-gptLinks
[USENIX Security '24] Dataset associated with real-world malicious LLM applications, including 45 malicious prompts for generating malicious content, malicious responses from LLMs, 182 real-world jailbreak prompts, keywords related to LLMs, etc.
☆63Updated 8 months ago
Alternatives and similar repositories for malicious-gpt
Users that are interested in malicious-gpt are comparing it to the libraries listed below
Sorting:
- ☆29Updated 3 months ago
- Practical Detection of Trojan Neural Networks☆119Updated 4 years ago
- [ICML 2025] An official source code for paper "FlipAttack: Jailbreak LLMs via Flipping".☆124Updated last month
- [CCS'24] SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models☆131Updated 2 months ago
- Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging (TIFS2024)☆35Updated last year
- [NDSS'24] Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time☆57Updated 9 months ago
- ☆75Updated 3 weeks ago
- PhishIntention: Phishing detection through webpage intention☆250Updated last month
- ☆123Updated 3 weeks ago
- Improving fast adversarial training with prior-guided knowledge (TPAMI2024)☆41Updated last year
- [NeurIPS 2024] EffiBench: Benchmarking the Efficiency of Automatically Generated Code☆54Updated 7 months ago
- [ACL 2024] CodeScope: An Execution-based Multilingual Multitask Multidimensional Benchmark for Evaluating LLMs on Code Understanding and …☆100Updated 11 months ago
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆74Updated 2 years ago
- Code for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack☆34Updated 7 months ago
- Academic Papers about LLM Application on Security☆173Updated this week
- Improved techniques for optimization-based jailbreaking on large language models (ICLR2025)☆108Updated 2 months ago
- Secure Transformer Inference is a protocol for serving Transformer-based models securely.☆93Updated last year
- Source code for "CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature"☆100Updated 2 months ago
- Code for ACL 2024 long paper: Are AI-Generated Text Detectors Robust to Adversarial Perturbations?☆29Updated 11 months ago
- 🚗 A repository for documenting and exploring the world of autonomous driving safety, featuring a curated collection of research papers,…☆41Updated 9 months ago
- ☆78Updated 6 months ago
- [ICML22] "Revisiting and Advancing Fast Adversarial Training through the Lens of Bi-level Optimization" by Yihua Zhang*, Guanhua Zhang*, …☆65Updated 2 years ago
- [NeurIPS 2024] GuardT2I: Defending Text-to-Image Models from Adversarial Prompts☆53Updated 3 weeks ago
- LLM Benchmark for Code☆30Updated 10 months ago
- StrategyLLM: Large Language Models as Strategy Generators, Executors, Optimizers, and Evaluators for Problem Solving☆22Updated 6 months ago
- ☆16Updated 8 months ago
- Official repo for paper "Large Language Models can be Guided to Evade AI-Generated Text Detection" in TMLR 2024.☆66Updated 2 years ago
- [ACL 2025 Findings] The official GitHub repo for the paper "Nuclear Deployed: Analyzing Catastrophic Risks in Decision-making of Autonomo…☆19Updated last month
- A benchmark for logging statement generation.☆24Updated 7 months ago
- The official code repo for "Safe Delta: Consistently Preserving Safety when Fine-Tuning LLMs on Diverse Datasets" in ICML 2025.☆23Updated this week