schroederdewitt / perfectly-secure-steganography
Contains open source code for the paper "Perfectly-secure Steganography using Minimum Entropy Coupling"
☆50Updated last year
Alternatives and similar repositories for perfectly-secure-steganography:
Users that are interested in perfectly-secure-steganography are comparing it to the libraries listed below
- Finding trojans in aligned LLMs. Official repository for the competition hosted at SaTML 2024.☆110Updated 7 months ago
- ☆273Updated 10 months ago
- Starter kit and data loading code for the Trojan Detection Challenge NeurIPS 2022 competition☆33Updated last year
- Implementation of 'A Watermark for Large Language Models' paper by Kirchenbauer & Geiping et. al.☆23Updated last year
- Algorithms for Privacy-Preserving Machine Learning in JAX☆92Updated 7 months ago
- Privacy backdoors☆51Updated 9 months ago
- This is the starter kit for the Trojan Detection Challenge 2023 (LLM Edition), a NeurIPS 2023 competition.☆82Updated 8 months ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆52Updated 2 years ago
- Pytorch Datasets for Easy-To-Hard☆27Updated 3 weeks ago
- ☆22Updated 4 months ago
- Package to optimize Adversarial Attacks against (Large) Language Models with Varied Objectives☆66Updated 11 months ago
- Official Implementation of the paper "Three Bricks to Consolidate Watermarks for LLMs"☆45Updated 11 months ago
- [ICCV 2023] Source code for our paper "Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models".☆56Updated last year
- ☆67Updated last year
- [ICLR 2025] Official Repository for "Tamper-Resistant Safeguards for Open-Weight LLMs"☆44Updated last week
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆131Updated last month
- ☆26Updated 3 years ago
- ☆52Updated last year
- Jailbreak artifacts for JailbreakBench☆47Updated 2 months ago
- Discount jupyter.☆47Updated 2 years ago
- WMDP is a LLM proxy benchmark for hazardous knowledge in bio, cyber, and chemical security. We also release code for RMU, an unlearning m…☆95Updated 9 months ago
- This repository includes code to reproduce the tables in "Loss Landscapes are All You Need: Neural Network Generalization Can Be Explaine…☆35Updated last year
- 🧠 Starter templates for doing interpretability research☆65Updated last year
- Replicating and dissecting the git-re-basin project in one-click-replication Colabs☆36Updated 2 years ago
- Code to break Llama Guard☆31Updated last year
- Tools for studying developmental interpretability in neural networks.☆83Updated last week
- ☆33Updated last year
- Fluent student-teacher redteaming☆19Updated 6 months ago
- ☆58Updated last year
- ☆32Updated last year