shreyansh26 / Extracting-Training-Data-from-Large-Langauge-ModelsLinks
A re-implementation of the "Extracting Training Data from Large Language Models" paper by Carlini et al., 2020
☆37Updated 3 years ago
Alternatives and similar repositories for Extracting-Training-Data-from-Large-Langauge-Models
Users that are interested in Extracting-Training-Data-from-Large-Langauge-Models are comparing it to the libraries listed below
Sorting:
- Training data extraction on GPT-2☆193Updated 2 years ago
- The code and data for "Are Large Pre-Trained Language Models Leaking Your Personal Information?" (Findings of EMNLP '22)☆24Updated 3 years ago
- ☆293Updated 3 months ago
- Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)☆142Updated last month
- ☆21Updated 4 years ago
- ☆13Updated 3 years ago
- ☆38Updated 2 years ago
- [ICLR'24 Spotlight] DP-OPT: Make Large Language Model Your Privacy-Preserving Prompt Engineer☆46Updated last year
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆31Updated 3 years ago
- The repository contains the code for analysing the leakage of personally identifiable (PII) information from the output of next word pred…☆101Updated last year
- ☆56Updated last year
- Official Repository for Dataset Inference for LLMs☆43Updated last year
- ☆25Updated 5 years ago
- Repo for arXiv preprint "Gradient-based Adversarial Attacks against Text Transformers"☆109Updated 2 years ago
- Source code of NAACL 2025 Findings "Scaling Up Membership Inference: When and How Attacks Succeed on Large Language Models"☆15Updated 9 months ago
- Differentially-private transformers using HuggingFace and Opacus☆143Updated last year
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆43Updated 4 years ago
- TextHide: Tackling Data Privacy in Language Understanding Tasks☆31Updated 4 years ago
- A codebase that makes differentially private training of transformers easy.☆178Updated 2 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆46Updated 3 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Updated 5 years ago
- ☆43Updated 2 years ago
- [ICLR 2021] "Generating Adversarial Computer Programs using Optimized Obfuscations" by Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shi…☆30Updated 4 years ago
- CodeBase for Paper: "Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers", / Interactive Demo @☆79Updated 2 years ago
- A survey of privacy problems in Large Language Models (LLMs). Contains summary of the corresponding paper along with relevant code☆68Updated last year
- Official implementation of Privacy Implications of Retrieval-Based Language Models (EMNLP 2023). https://arxiv.org/abs/2305.14888☆37Updated last year
- The official repository of the paper "On the Exploitability of Instruction Tuning".☆65Updated last year
- ☆76Updated 3 years ago
- Code for Findings-ACL 2023 paper: Sentence Embedding Leaks More Information than You Expect: Generative Embedding Inversion Attack to Rec…☆48Updated last year
- Code for Findings of ACL 2021 "Differential Privacy for Text Analytics via Natural Text Sanitization"☆29Updated 3 years ago