shenyizg / NewAdversarialAttackPaperLinks
A list of recent adversarial attack and defense papers (including those on large language models)
☆41Updated this week
Alternatives and similar repositories for NewAdversarialAttackPaper
Users that are interested in NewAdversarialAttackPaper are comparing it to the libraries listed below
Sorting:
- A list of recent papers about adversarial learning☆184Updated this week
- ☆102Updated last year
- ☆30Updated 9 months ago
- Safety at Scale: A Comprehensive Survey of Large Model Safety☆183Updated 4 months ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆73Updated 10 months ago
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆265Updated 6 months ago
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆36Updated 11 months ago
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆215Updated last year
- ☆56Updated last month
- ☆23Updated 2 years ago
- Repository for the Paper (AAAI 2024, Oral) --- Visual Adversarial Examples Jailbreak Large Language Models☆230Updated last year
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆55Updated 3 months ago
- Official Code for ART: Automatic Red-teaming for Text-to-Image Models to Protect Benign Users (NeurIPS 2024)☆16Updated 8 months ago
- A Survey on Jailbreak Attacks and Defenses against Multimodal Generative Models☆206Updated last month
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Updated 2 weeks ago
- ☆47Updated last year
- ☆15Updated last year
- ☆82Updated 3 years ago
- ☆19Updated last month
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆16Updated last year
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆170Updated 4 months ago
- ☆109Updated last month
- A curated list of papers for the transferability of adversarial examples☆72Updated last year
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images☆36Updated last year
- This is the source code for MEA-Defender. Our paper is accepted by the IEEE Symposium on Security and Privacy (S&P) 2024.☆24Updated last year
- ☆34Updated 9 months ago
- A toolbox for backdoor attacks.☆22Updated 2 years ago
- ☆48Updated 11 months ago
- [ECCV2024] Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajector…☆27Updated 7 months ago
- ☆82Updated last year