niuliang42 / CodexLeaksLinks
CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot
☆11Updated 2 years ago
Alternatives and similar repositories for CodexLeaks
Users that are interested in CodexLeaks are comparing it to the libraries listed below
Sorting:
- ☆49Updated last year
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆33Updated 2 years ago
- ☆122Updated last year
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆15Updated 6 months ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆74Updated last year
- A toolkit to assess data privacy in LLMs (under development)☆62Updated 9 months ago
- [ACL 2024] The official GitHub repo for the paper "The Earth is Flat because...: Investigating LLMs' Belief towards Misinformation via Pe…☆78Updated last year
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆30Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆91Updated last year
- ☆16Updated 2 years ago
- Backdooring Neural Code Search☆14Updated 2 years ago
- Adversarial Attack for Pre-trained Code Models☆10Updated 3 years ago
- ☆35Updated 11 months ago
- 🔮Reasoning for Safer Code Generation; 🥇Winner Solution of Amazon Nova AI Challenge 2025☆26Updated last month
- ☆20Updated last year
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆26Updated 3 weeks ago
- ☆19Updated last year
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queries☆45Updated 2 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆52Updated 6 months ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆44Updated 4 months ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆200Updated 7 months ago
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆38Updated last year
- Code and data for our paper "Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark"…☆49Updated 2 years ago
- An LLM can Fool Itself: A Prompt-Based Adversarial Attack (ICLR 2024)☆99Updated 8 months ago
- Bag of Tricks: Benchmarking of Jailbreak Attacks on LLMs. Empirical tricks for LLM Jailbreaking. (NeurIPS 2024)☆149Updated 10 months ago
- Revisiting Character-level Adversarial Attacks for Language Models, ICML 2024☆17Updated 7 months ago
- Fingerprint large language models☆41Updated last year
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆78Updated last year
- [CIKM 2024] Trojan Activation Attack: Attack Large Language Models using Activation Steering for Safety-Alignment.☆28Updated last year