idllresearch / malicious-gpt
[USENIX Security '24] Dataset associated with real-world malicious LLM applications, including 45 malicious prompts for generating malicious content, malicious responses from LLMs, 182 real-world jailbreak prompts, keywords related to LLMs, etc.
☆58Updated 4 months ago
Alternatives and similar repositories for malicious-gpt:
Users that are interested in malicious-gpt are comparing it to the libraries listed below
- Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging (TIFS2024)☆33Updated 9 months ago
- Code for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack☆30Updated 3 months ago
- Practical Detection of Trojan Neural Networks☆119Updated 4 years ago
- Improving fast adversarial training with prior-guided knowledge (TPAMI2024)☆40Updated 10 months ago
- [NDSS'24] Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time☆59Updated 5 months ago
- [arXiv 2024] An official source code for paper "FlipAttack: Jailbreak LLMs via Flipping".☆90Updated 3 months ago
- Code for ACL 2024 long paper: Are AI-Generated Text Detectors Robust to Adversarial Perturbations?☆26Updated 7 months ago
- [CCS'24] SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models☆127Updated 4 months ago
- ☆73Updated 2 weeks ago
- Crack Vigenere Ciphertext using statistic method (Index of Coincidence and Chi-square)☆16Updated last year
- PhishIntention: Phishing detection through webpage intention☆249Updated 2 months ago
- [ACL 2024] CodeScope: An Execution-based Multilingual Multitask Multidimensional Benchmark for Evaluating LLMs on Code Understanding and …☆97Updated 7 months ago
- ☆17Updated 4 months ago
- Software Security Vulnerability Hub☆61Updated 2 months ago
- Improved techniques for optimization-based jailbreaking on large language models (ICLR2025)☆81Updated last month
- A benchmark for logging statement generation.☆19Updated 4 months ago
- ☆77Updated 2 months ago
- This project help you understand the concepts of histogram equalization and histogram specification in image processing learning from a p…☆9Updated last year
- Source code for "CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature"☆98Updated 2 weeks ago
- 本项目利用多线程加速手段以及TCP通讯技术实现两台计算机协作执行,挖掘两个计算机的潜在算力。This project utilizes multi-threaded acceleration and TCP communication technology to colla…☆34Updated last year
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆71Updated last year
- A demo project to demonstrate how DES encryption/decryption works.☆13Updated 2 years ago
- ☆35Updated last month
- [NeurIPS 2024] EffiBench: Benchmarking the Efficiency of Automatically Generated Code☆51Updated 3 months ago
- This is the public code repository for the paper 'Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage …☆9Updated last month
- Spring 2020-2021 Database System Principles course lab -- Chongqing University. Include my source codes and lab reports.☆5Updated 3 years ago
- ☆15Updated 2 months ago
- 2d game, a birthday present for my girl friend, the game prototype is Magic Tower☆27Updated 2 months ago
- LLM Benchmark for Code☆31Updated 6 months ago