ICL backdoor attack
☆17Nov 4, 2024Updated last year
Alternatives and similar repositories for ICLAttack
Users that are interested in ICLAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Composite Backdoor Attacks Against Large Language Models☆24Apr 12, 2024Updated 2 years ago
- Taskflow: Share system resources without breaking a sweat☆19May 24, 2022Updated 3 years ago
- ☆10Mar 13, 2023Updated 3 years ago
- Unofficial implementation of "Backdooring Instruction-Tuned Large Language Models with Virtual Prompt Injection"☆27Jul 6, 2024Updated last year
- Source code for the ACL'2025 paper titled "Unveiling privacy risks in llm agent memory"☆29Dec 2, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆26Aug 21, 2024Updated last year
- 专用于搭建MT4或MT5交易跟单平台☆30Updated this week
- ☆18Feb 10, 2022Updated 4 years ago
- ☆22Sep 2, 2025Updated 7 months ago
- A lightweight library for large laguage model (LLM) jailbreaking defense.☆60Sep 11, 2025Updated 7 months ago
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆212Apr 12, 2025Updated last year
- This is the code implementation for the paper "Data Poisoning Attacks to Deep Learning Based Recommender Systems"☆17Sep 8, 2022Updated 3 years ago
- Code and datasets for the salesforce AI research paper on prompt leakage and multi-turn threats against LLMs☆22Nov 10, 2025Updated 5 months ago
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆19Mar 9, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆32Mar 12, 2025Updated last year
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆21Aug 10, 2024Updated last year
- Target Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning☆10Jul 2, 2019Updated 6 years ago
- ☆16Nov 18, 2024Updated last year
- State-Relabeling Adversarial Active Learning☆14Aug 17, 2021Updated 4 years ago
- ☆13Oct 21, 2021Updated 4 years ago
- [CIKM 2024] Trojan Activation Attack: Attack Large Language Models using Activation Steering for Safety-Alignment.☆30Jul 29, 2024Updated last year
- ☆13Apr 13, 2025Updated last year
- ☆14Jul 24, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 关于behance爬虫项目☆10May 16, 2019Updated 6 years ago
- A unified framework for recommender system attacking☆34Mar 29, 2024Updated 2 years ago
- [CVPR 24] This is official implication for our paper: ''CroSel: Cross Selection of Confident Pseudo Labels for Partial-Label Learning''.☆16Apr 27, 2025Updated 11 months ago
- Working Memory Attack on LLMs☆18May 27, 2025Updated 10 months ago
- ☆25Jan 17, 2025Updated last year
- 基于qlora对baichuan-7B大模型进行指令微调。☆23Jun 22, 2023Updated 2 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆17Nov 30, 2021Updated 4 years ago
- ☆59May 30, 2024Updated last year
- Repository for building the Sharemind SDK☆16Sep 18, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The implement of paper:"ReDeEP: Detecting Hallucination in Retrieval-Augmented Generation via Mechanistic Interpretability"☆65Jun 3, 2025Updated 10 months ago
- uCore MIPS32 porting☆18Dec 16, 2019Updated 6 years ago
- Code for paper "Universal Jailbreak Backdoors from Poisoned Human Feedback"☆65Apr 24, 2024Updated last year
- Experimentation on google's gemma model☆16Mar 6, 2024Updated 2 years ago
- Experimental Code for Private Decision Tree Evaluation☆16Mar 26, 2026Updated 3 weeks ago
- Accept by CVPR 2025 (highlight)☆25Jun 8, 2025Updated 10 months ago
- Official code and datas for "Bridging Gaps: Federated Multi-View Clustering in Heterogeneous Hybrid Views". (NeurIPS 2024)☆17Oct 13, 2024Updated last year