inistory / STONE-watermarkingLinks
Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code
☆12Updated 3 months ago
Alternatives and similar repositories for STONE-watermarking
Users that are interested in STONE-watermarking are comparing it to the libraries listed below
Sorting:
- pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain☆11Updated 3 years ago
- ☆24Updated 9 months ago
- ☆12Updated 3 years ago
- Code for Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning Attacks (NeurIPS 2022)☆10Updated 2 years ago
- ☆10Updated 3 years ago
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆20Updated 10 months ago
- ☆10Updated last year
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆19Updated last year
- The code implementation of MuScleLoRA (Accepted in ACL 2024)☆10Updated last year
- ☆14Updated last year
- The code implementation of GraCeFul (Accepted in COLING 2025)☆13Updated 11 months ago
- Robust natural language watermarking using invariant features☆28Updated 2 years ago
- ☆15Updated 2 years ago
- ☆14Updated 10 months ago
- ☆20Updated 2 months ago
- ☆18Updated 3 years ago
- Code repository for the paper "Heuristic Induced Multimodal Risk Distribution Jailbreak Attack for Multimodal Large Language Models"☆15Updated 5 months ago
- ☆13Updated 4 years ago
- official implementation of Towards Robust Model Watermark via Reducing Parametric Vulnerability☆16Updated last year
- Official repository of the paper: Who Wrote this Code? Watermarking for Code Generation (ACL 2024)☆40Updated last year
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Updated 2 years ago
- ☆33Updated 3 years ago
- Towards Machine Unlearning Benchmarks: Forgetting the Personal Identities in Facial Recognition Systems☆67Updated 7 months ago
- ☆53Updated 2 years ago
- ☆14Updated 3 years ago
- Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples☆11Updated last year
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Updated last year
- [EMNLP 2022] Distillation-Resistant Watermarking (DRW) for Model Protection in NLP☆13Updated 2 years ago
- ☆21Updated 2 years ago
- [NeurIPS 2023] Differentially Private Image Classification by Learning Priors from Random Processes☆12Updated 2 years ago