iliaishacked / sponge_examplesLinks
☆27Updated 4 years ago
Alternatives and similar repositories for sponge_examples
Users that are interested in sponge_examples are comparing it to the libraries listed below
Sorting:
- ☆68Updated 5 years ago
- Code release for DeepJudge (S&P'22)☆52Updated 2 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Updated 7 months ago
- ☆83Updated 4 years ago
- ☆37Updated last year
- [NDSS'25] The official implementation of safety misalignment.☆17Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆52Updated 8 months ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- ☆17Updated last year
- ☆19Updated 3 years ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Updated 2 years ago
- ☆18Updated 3 years ago
- ☆26Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆56Updated 10 months ago
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆51Updated 3 years ago
- This is the code repository of our submission: Understanding the Dark Side of LLMs’ Intrinsic Self-Correction.☆63Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆109Updated last year
- Code for ML Doctor☆92Updated last year
- ☆19Updated last year
- ☆86Updated 5 months ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17Updated last year
- ☆19Updated 4 years ago
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆63Updated 2 years ago
- Source code for the Energy-Latency Attacks via Sponge Poisoning paper.☆15Updated 3 years ago
- Code to generate NeuralExecs (prompt injection for LLMs)☆27Updated 4 months ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆76Updated last year
- [USENIX'24] Prompt Stealing Attacks Against Text-to-Image Generation Models☆50Updated last year
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆19Updated 4 months ago
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆20Updated 4 months ago
- ☆77Updated last year