The official dataset of paper "Goal-Oriented Prompt Attack and Safety Evaluation for LLMs".
☆21Feb 5, 2024Updated 2 years ago
Alternatives and similar repositories for CPAD
Users that are interested in CPAD are comparing it to the libraries listed below
Sorting:
- ☆12Mar 8, 2025Updated last year
- ICLR2024 Paper. Showing properties of safety tuning and exaggerated safety.☆93May 9, 2024Updated last year
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- Please visit https://github.com/HKUSTDial/NL2SQL360 to get the official code!☆10Sep 1, 2024Updated last year
- [ICML 2022 Spotlight] Finding the Task-Optimal Low-Bit Sub-Distribution in Deep Neural Networks☆11May 21, 2023Updated 2 years ago
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆12Dec 5, 2024Updated last year
- 中文金融大模型测评基准,六大类二十五任务、等级化评价,国内模型获得A级☆10May 6, 2024Updated last year
- 🕵️♂️🔊 Automatically update Audio Deepfake Detection (ADD) papers daily using GitHub Actions (updates every 12 hours)☆17Feb 13, 2026Updated 3 weeks ago
- Official repository for the paper "ALERT: A Comprehensive Benchmark for Assessing Large Language Models’ Safety through Red Teaming"☆57Sep 20, 2024Updated last year
- ☆48May 9, 2024Updated last year
- ☆12Aug 16, 2018Updated 7 years ago
- ☆11Mar 15, 2017Updated 8 years ago
- TPU에서 한국어용 LLM 추론을 위한 Jax/Flax 구현체입니다.☆12Jun 12, 2023Updated 2 years ago
- Simple Structured Perceptron tagger in Python☆10May 30, 2017Updated 8 years ago
- Dotfiles optimized for a deep learning researcher including vim and tmux☆12Feb 11, 2026Updated 3 weeks ago
- Resources for our AAAI 2022 paper: "Unsupervised Editing for Counterfactual Stories".☆11Oct 25, 2022Updated 3 years ago
- [NeurIPS 2024] Fight Back Against Jailbreaking via Prompt Adversarial Tuning☆11Oct 29, 2024Updated last year
- Code for CVPR2018 "Iterative Learning with Open-set Noisy Labels"☆12Mar 12, 2021Updated 4 years ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- Codes and datasets of the paper Red-Teaming Large Language Models using Chain of Utterances for Safety-Alignment☆108Mar 8, 2024Updated 2 years ago
- hllama is a library which aims to provide a set of utility tools for large language models.☆10Apr 16, 2024Updated last year
- ☆11Oct 5, 2024Updated last year
- ☆18Jul 25, 2025Updated 7 months ago
- Like word2vec, except for letters of the alphabet.☆17May 29, 2017Updated 8 years ago
- Instruction Following Eval☆16Jan 16, 2025Updated last year
- Accepted to ICLR 2025. MetaMetrics is a calibrated meta-metric designed to evaluate generation tasks across different modalities aligned …☆14Dec 30, 2024Updated last year
- ☆22Jan 14, 2025Updated last year
- Code for our EMNLP 2023 paper - Beneath the Surface: Unveiling Harmful Memes with Multimodal Reasoning Distilled from Large Language Mode…☆15May 5, 2024Updated last year
- Dataset of the paper:“Latent suicide risk detection on microblog via suicide-oriented word embeddings and layered attention☆12Oct 22, 2024Updated last year
- Personal website☆15Jun 14, 2025Updated 8 months ago
- Python package to deal with PAN corpora and extract stylometric features from text documents.☆15Nov 11, 2022Updated 3 years ago
- [ICLR 2026] SwiReasoning: Switch-Thinking in Latent and Explicit for Pareto-Superior Reasoning LLMs☆44Oct 14, 2025Updated 4 months ago
- This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)☆41Jan 27, 2020Updated 6 years ago
- 受到self-instruct启发,除了通用LLM还能做垂直领域的小LLM实现定制效果,通过GPT获得question和answer来作为训练数据☆18May 12, 2023Updated 2 years ago
- Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers☆66Aug 25, 2024Updated last year
- Code for "Towards Revealing the Mystery behind Chain of Thought: a Theoretical Perspective"☆22Jul 16, 2023Updated 2 years ago
- This is the oficial repository for "Safer-Instruct: Aligning Language Models with Automated Preference Data"☆17Feb 22, 2024Updated 2 years ago
- Code for LSTM based model for PICO element detection☆11Jul 19, 2018Updated 7 years ago
- Adversarial Attack on Graph Neural Networks as An Influence Maximization Problem☆20Oct 27, 2021Updated 4 years ago