idllresearch / malicious-gptLinks
[USENIX Security '24] Dataset associated with real-world malicious LLM applications, including 45 malicious prompts for generating malicious content, malicious responses from LLMs, 182 real-world jailbreak prompts, keywords related to LLMs, etc.
☆66Updated last month
Alternatives and similar repositories for malicious-gpt
Users that are interested in malicious-gpt are comparing it to the libraries listed below
Sorting:
- ☆29Updated 8 months ago
- Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging (TIFS2024)☆36Updated last year
- [NDSS'24] Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time☆57Updated last year
- ☆82Updated 5 months ago
- Code for ACL 2024 long paper: Are AI-Generated Text Detectors Robust to Adversarial Perturbations?☆32Updated last year
- [NeurIPS 2024] EffiBench: Benchmarking the Efficiency of Automatically Generated Code☆58Updated 11 months ago
- Improving fast adversarial training with prior-guided knowledge (TPAMI2024)☆43Updated last year
- Practical Detection of Trojan Neural Networks☆121Updated 5 years ago
- Source code for "CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature"☆100Updated 7 months ago
- PhishIntention: Phishing detection through webpage intention☆253Updated 2 months ago
- Code for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack(TPAMI 2025)☆41Updated 2 months ago
- ACL 2025 (Main) HiddenDetect: Detecting Jailbreak Attacks against Multimodal Large Language Models via Monitoring Hidden States☆147Updated 5 months ago
- [ACL 2024] CodeScope: An Execution-based Multilingual Multitask Multidimensional Benchmark for Evaluating LLMs on Code Understanding and …☆100Updated last year
- [CCS'24] SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models☆137Updated 4 months ago
- Secure Transformer Inference is a protocol for serving Transformer-based models securely.☆96Updated last year
- LLM Benchmark for Code☆32Updated last year
- [ACL 2023 findings] Towards Robust Personalized Dialogue Generation via Order-Insensitive Representation Regularization☆17Updated 2 years ago
- ☆16Updated last year
- This data set contains flow-based network security data sets extracted from satellite networks and terrestrial networks. We named the dat…☆26Updated 5 years ago
- ☆75Updated 11 months ago
- Code of Journey to the Center of the Knowledge Neurons: Discoveries of Language-Independent Knowledge Neurons and Degenerate Knowledge Ne…☆28Updated last year
- Official repo for paper "Large Language Models can be Guided to Evade AI-Generated Text Detection" in TMLR 2024.☆70Updated 2 years ago
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆78Updated 2 years ago
- ACL 2024☆35Updated 4 months ago
- A benchmark for logging statement generation.☆26Updated last year
- Official Implementation of "Pay Attention to What You Need"☆44Updated 9 months ago
- StrategyLLM: Large Language Models as Strategy Generators, Executors, Optimizers, and Evaluators for Problem Solving☆21Updated 11 months ago
- [ICML 2025] An official source code for paper "FlipAttack: Jailbreak LLMs via Flipping".☆154Updated 6 months ago
- ☆44Updated last year
- This is the public code repository for the paper 'Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage …☆10Updated 6 months ago