khhung-906 / Attention-TrackerView external linksLinks
Code for our NAACL2025 accepted paper: Attention Tracker: Detecting Prompt Injection Attacks in LLMs
☆23Sep 19, 2025Updated 4 months ago
Alternatives and similar repositories for Attention-Tracker
Users that are interested in Attention-Tracker are comparing it to the libraries listed below
Sorting:
- [ICML'25] MELON: Provable Defense Against Indirect Prompt Injection Attacks in AI Agents☆20Jul 31, 2025Updated 6 months ago
- ☆35May 9, 2025Updated 9 months ago
- [S&P 2026] SoK: Evaluating Jailbreak Guardrails for Large Language Models☆35Dec 17, 2025Updated 2 months ago
- Official implementation of the WASP web agent security benchmark☆67Aug 12, 2025Updated 6 months ago
- [ICML 2025] UDora: A Unified Red Teaming Framework against LLM Agents☆31Jun 24, 2025Updated 7 months ago
- [ACL 2025] The official implementation of the paper "PIGuard: Prompt Injection Guardrail via Mitigating Overdefense for Free".☆59Dec 4, 2025Updated 2 months ago
- TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a…☆79Sep 1, 2025Updated 5 months ago
- Vstream - Video Analytics pipeline with Hardware based accelerations (dev - stage)☆10Feb 2, 2024Updated 2 years ago
- [CCS 2024] Optimization-based Prompt Injection Attack to LLM-as-a-Judge☆39Sep 17, 2025Updated 5 months ago
- ☆39Feb 9, 2026Updated last week
- ☆14May 1, 2023Updated 2 years ago
- Precision Knowledge Editing (PKE): A novel method to reduce toxicity in LLMs while preserving performance, with robust evaluations and ha…☆11Nov 26, 2024Updated last year
- 2020湖南省第一届人工智能大赛参赛作品☆11Feb 17, 2022Updated 4 years ago
- [NeurIPS 2025] The official implementation of the paper "DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agen…☆36Updated this week
- ☆13Jan 16, 2025Updated last year
- A static website for a Chatbot with Azure OpenAI, Azure Text to Speech Services and Live2D☆13Sep 4, 2024Updated last year
- yolo目标检测算法☆15Jul 27, 2025Updated 6 months ago
- Implementation of "Semi-Supervised Crowd Counting with Contextual Modeling: Facilitating Holistic Understanding of Crowd Scenes"☆12Oct 2, 2024Updated last year
- Various object detection testing using YOLO and other algorithms, Raspberry pi based integration experiments.☆12Dec 9, 2024Updated last year
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectio…☆16Jul 28, 2025Updated 6 months ago
- Code for Rethinking Prompt Optimizers: From Prompt Merits to Optimization☆12Jan 12, 2026Updated last month
- ☆11Mar 22, 2024Updated last year
- Repository for OUSPG LLM Hackathon.☆12Aug 13, 2025Updated 6 months ago
- ☆13Sep 11, 2025Updated 5 months ago
- official implementation of Training-free Boost for Open-Vocabulary Object Detection with Confidence Aggregation☆13Apr 15, 2024Updated last year
- Exploring advanced prompting tools to query SQL database with multiple tables in natural language using LLMs☆16Aug 23, 2024Updated last year
- 这是一个面向币圈新手的入门速通指南集合,包括最全面的币圈区块链资源集合,包含各类工具导航,快速了解币圈常用术语和行话,详细的防骗指南,助你规避各类风险☆19Feb 10, 2026Updated last week
- Zen-NAS, a lightning fast, training-free Neural Architecture Searching algorithm☆11Nov 12, 2021Updated 4 years ago
- Convert bodies of text to IPA translations☆12May 2, 2023Updated 2 years ago
- ☆42Nov 9, 2023Updated 2 years ago
- ☆15May 18, 2025Updated 8 months ago
- Code for ACL2018 paper "Learn How to Actively Learn: An Imitation Learning Approach"☆10Mar 8, 2019Updated 6 years ago
- code of paper "Defending Against Alignment-Breaking Attacks via Robustly Aligned LLM"☆14Nov 17, 2023Updated 2 years ago
- Simple Chatbot for testing AI Red Team tooling☆16Feb 11, 2025Updated last year
- ☆13May 26, 2025Updated 8 months ago
- Translate PDF to ePub by Gemini☆19Jun 18, 2025Updated 7 months ago
- An informal Wiki for HCI Research Info☆14Jan 15, 2025Updated last year
- 基于yolov5,在woodscape数据集上实现旋转框目标检测+语义分割☆12Mar 4, 2024Updated last year
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago