This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Language Models".
☆22Jul 3, 2024Updated last year
Alternatives and similar repositories for BEEAR
Users that are interested in BEEAR are comparing it to the libraries listed below
Sorting:
- ☆24Jul 25, 2024Updated last year
- Official repository for CVPR'23 paper: Detecting Backdoors in Pre-trained Encoders☆36Sep 25, 2023Updated 2 years ago
- ☆18Aug 15, 2022Updated 3 years ago
- ☆48Sep 29, 2024Updated last year
- Composite Backdoor Attacks Against Large Language Models☆22Apr 12, 2024Updated last year
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆19Jun 7, 2023Updated 2 years ago
- Example TrojAI Submission☆27Dec 6, 2024Updated last year
- Code for paper "Universal Jailbreak Backdoors from Poisoned Human Feedback"☆66Apr 24, 2024Updated last year
- Personalized Steering of Large Language Models: Versatile Steering Vectors Through Bi-directional Preference Optimization☆42Jul 28, 2024Updated last year
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Nov 18, 2024Updated last year
- ☆26Aug 21, 2024Updated last year
- Finding trojans in aligned LLMs. Official repository for the competition hosted at SaTML 2024.☆116Jun 13, 2024Updated last year
- ☆37Aug 28, 2025Updated 6 months ago
- The official implementation of the CCS'23 paper, Narcissus clean-label backdoor attack -- only takes THREE images to poison a face recogn…☆123May 9, 2023Updated 2 years ago
- A brief and partial summary of RLHF algorithms.☆147Mar 4, 2025Updated last year
- Awesome Large Reasoning Model(LRM) Safety.This repository is used to collect security-related research on large reasoning models such as …☆82Updated this week
- ☆10Sep 24, 2021Updated 4 years ago
- ☆21Aug 8, 2025Updated 6 months ago
- Starter kit and data loading code for the Trojan Detection Challenge NeurIPS 2022 competition☆33Jul 26, 2023Updated 2 years ago
- ☆12Nov 23, 2025Updated 3 months ago
- This is the starter kit for the Trojan Detection Challenge 2023 (LLM Edition), a NeurIPS 2023 competition.☆90May 19, 2024Updated last year
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆12Feb 7, 2024Updated 2 years ago
- Python implementation of the XDL protocol☆14Jul 18, 2022Updated 3 years ago
- Burp-Addons : Some of Burp Addons I use ( Mindak ak fahem )☆11Sep 1, 2022Updated 3 years ago
- ☆10Mar 20, 2023Updated 2 years ago
- my programming / infosec scratchpad☆11Apr 25, 2023Updated 2 years ago
- Implementation of Boundary Attributions for Normal (Vector) Explanations☆11Aug 13, 2021Updated 4 years ago
- ☆30Oct 21, 2025Updated 4 months ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- ☆10Nov 6, 2024Updated last year
- Influence Maximization Paper List☆11May 11, 2022Updated 3 years ago
- Download, parse, and filter data from Court Listener, part of the FreeLaw projects. Data-ready for The-Pile.☆15Jun 3, 2023Updated 2 years ago
- Towards Better Graph Representation Learning with Parameterized Decomposition & Filtering☆13Aug 22, 2023Updated 2 years ago
- FastAPI Microservices Architecture SDK - As Basis for multiple services in a platform/system☆12Oct 4, 2022Updated 3 years ago
- EasyRLHF aims to provide an easy and minimal interface to train aligned language models, using off-the-shelf solutions and datasets☆10Dec 12, 2023Updated 2 years ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆52Jun 2, 2025Updated 9 months ago