microsoft / analysing_pii_leakageLinks
The repository contains the code for analysing the leakage of personally identifiable (PII) information from the output of next word prediction language models.
☆100Updated last year
Alternatives and similar repositories for analysing_pii_leakage
Users that are interested in analysing_pii_leakage are comparing it to the libraries listed below
Sorting:
- Differentially-private transformers using HuggingFace and Opacus☆140Updated 11 months ago
- A survey of privacy problems in Large Language Models (LLMs). Contains summary of the corresponding paper along with relevant code☆68Updated last year
- ☆75Updated 3 years ago
- [ICLR'24 Spotlight] DP-OPT: Make Large Language Model Your Privacy-Preserving Prompt Engineer☆45Updated last year
- Python package for measuring memorization in LLMs.☆163Updated last month
- The code for paper "The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation (RAG)", exploring the privacy risk o…☆55Updated 6 months ago
- ☆63Updated 6 months ago
- A toolkit to assess data privacy in LLMs (under development)☆62Updated 7 months ago
- ☆27Updated last year
- Unofficial implementation of "Backdooring Instruction-Tuned Large Language Models with Virtual Prompt Injection"☆21Updated last year
- A curated list of trustworthy Generative AI papers. Daily updating...☆73Updated 11 months ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆89Updated 10 months ago
- A codebase that makes differentially private training of transformers easy.☆175Updated 2 years ago
- Training data extraction on GPT-2☆190Updated 2 years ago
- Repo for the research paper "SecAlign: Defending Against Prompt Injection with Preference Optimization"☆66Updated last month
- ☆44Updated 6 months ago
- ☆104Updated last year
- Repo for arXiv preprint "Gradient-based Adversarial Attacks against Text Transformers"☆108Updated 2 years ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆180Updated 6 months ago
- We jailbreak GPT-3.5 Turbo’s safety guardrails by fine-tuning it on only 10 adversarially designed examples, at a cost of less than $0.20…☆317Updated last year
- Official Repository for ACL 2024 Paper SafeDecoding: Defending against Jailbreak Attacks via Safety-Aware Decoding☆140Updated last year
- Private Evolution: Generating DP Synthetic Data without Training [ICLR 2024, ICML 2024 Spotlight]☆100Updated last month
- [NDSS'25 Best Technical Poster] A collection of automated evaluators for assessing jailbreak attempts.☆167Updated 4 months ago
- Official implementation of AdvPrompter https//arxiv.org/abs/2404.16873☆159Updated last year
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆165Updated 8 months ago
- A Comprehensive Assessment of Trustworthiness in GPT Models☆302Updated 11 months ago
- [ICML 2024 Spotlight] Differentially Private Synthetic Data via Foundation Model APIs 2: Text☆42Updated 7 months ago
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆140Updated 4 months ago
- A Synthetic Dataset for Personal Attribute Inference (NeurIPS'24 D&B)☆44Updated 3 weeks ago
- An LLM can Fool Itself: A Prompt-Based Adversarial Attack (ICLR 2024)☆95Updated 7 months ago