selfdefend / CodeLinks
β26Updated 9 months ago
Alternatives and similar repositories for Code
Users that are interested in Code are comparing it to the libraries listed below
Sorting:
- π₯π₯π₯ Detecting hidden backdoors in Large Language Models with only black-box accessβ45Updated 4 months ago
- β17Updated last year
- β36Updated last year
- β82Updated last month
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agaiβ¦β52Updated 7 months ago
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queriesβ48Updated 3 months ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)β30Updated last year
- Code for paper "The Philosopherβs Stone: Trojaning Plugins of Large Language Models"β25Updated last year
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defenseβ17Updated last year
- β18Updated 3 years ago
- Agent Security Bench (ASB)β137Updated 3 weeks ago
- β25Updated 4 years ago
- β12Updated 7 months ago
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"β21Updated 2 months ago
- β26Updated last year
- β65Updated 10 months ago
- β27Updated last year
- Machine Learning & Security Seminar @Purdue Universityβ25Updated 2 years ago
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Modelsβ18Updated 3 weeks ago
- [USENIX'24] Prompt Stealing Attacks Against Text-to-Image Generation Modelsβ47Updated 9 months ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)β34Updated 4 months ago
- β23Updated 8 months ago
- Distribution Preserving Backdoor Attack in Self-supervised Learningβ18Updated last year
- Seminar 2022β21Updated 3 weeks ago
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)β11Updated last year
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wateβ¦β44Updated 11 months ago
- [CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioningβ15Updated 9 months ago
- [NDSS'25] The official implementation of safety misalignment.β17Updated 9 months ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025β23Updated 5 months ago
- β123Updated last year