shenyizg / NewAdversarialAttackPaperLinks
A list of recent adversarial attack and defense papers (including those on large language models)
☆45Updated last week
Alternatives and similar repositories for NewAdversarialAttackPaper
Users that are interested in NewAdversarialAttackPaper are comparing it to the libraries listed below
Sorting:
- ☆37Updated last year
- A curated list of trustworthy Generative AI papers. Daily updating...☆75Updated last year
- A list of recent papers about adversarial learning☆277Updated this week
- Safety at Scale: A Comprehensive Survey of Large Model Safety☆216Updated last month
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Updated last year
- ☆108Updated last year
- ☆55Updated last year
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Updated 2 years ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆105Updated last year
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Updated 6 months ago
- ☆32Updated 3 years ago
- Awesome Jailbreak, red teaming arxiv papers (Automatically Update Every 12th hours)☆81Updated this week
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆282Updated last year
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆231Updated last year
- A toolbox for backdoor attacks.☆22Updated 2 years ago
- ☆126Updated 3 months ago
- ☆21Updated 2 years ago
- [Oakland 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆26Updated 8 months ago
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆44Updated last year
- A curated list of papers for the transferability of adversarial examples☆75Updated last year
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images☆42Updated last year
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆34Updated last year
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆64Updated 9 months ago
- This is the source code for MEA-Defender. Our paper is accepted by the IEEE Symposium on Security and Privacy (S&P) 2024.☆29Updated 2 years ago
- ☆84Updated 4 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆103Updated 3 years ago
- Repository for the Paper (AAAI 2024, Oral) --- Visual Adversarial Examples Jailbreak Large Language Models☆263Updated last year
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆61Updated last year
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆34Updated last year
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆198Updated 2 years ago