inistory / STONE-watermarkingLinks
Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code
☆12Updated 3 months ago
Alternatives and similar repositories for STONE-watermarking
Users that are interested in STONE-watermarking are comparing it to the libraries listed below
Sorting:
- pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain☆11Updated 3 years ago
- Towards Machine Unlearning Benchmarks: Forgetting the Personal Identities in Facial Recognition Systems☆66Updated 8 months ago
- Code for Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning Attacks (NeurIPS 2022)☆10Updated 2 years ago
- ☆25Updated 10 months ago
- The code implementation of MuScleLoRA (Accepted in ACL 2024)☆10Updated last year
- ☆12Updated 3 years ago
- ☆15Updated 2 years ago
- ☆10Updated last year
- Robust natural language watermarking using invariant features☆28Updated 2 years ago
- The code implementation of GraCeFul (Accepted in COLING 2025)☆13Updated last year
- ☆14Updated 11 months ago
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆20Updated 10 months ago
- ☆10Updated 3 years ago
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆19Updated last year
- Code and data for paper "Can LLM Watermarks Robustly Prevent Unauthorized Knowledge Distillation?". (ACL 2025 Main)☆20Updated 7 months ago
- ☆20Updated 3 months ago
- Code repository for the paper "Heuristic Induced Multimodal Risk Distribution Jailbreak Attack for Multimodal Large Language Models"☆15Updated 5 months ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Updated last year
- Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples☆11Updated last year
- ☆21Updated 2 years ago
- official implementation of Towards Robust Model Watermark via Reducing Parametric Vulnerability☆16Updated last year
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Updated 2 years ago
- ☆53Updated 2 years ago
- Github repo for One-shot Neural Backdoor Erasing via Adversarial Weight Masking (NeurIPS 2022)☆15Updated 3 years ago
- ☆18Updated 3 years ago
- ☆14Updated last year
- ☆33Updated 3 years ago
- ☆13Updated 4 years ago
- [NeurIPS 2023] Differentially Private Image Classification by Learning Priors from Random Processes☆12Updated 2 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Updated 3 years ago