sigeisler / reinforce-attacks-llmsView external linksLinks
REINFORCE Adversarial Attacks on Large Language Models: An Adaptive, Distributional, and Semantic Objective
☆21Feb 28, 2025Updated 11 months ago
Alternatives and similar repositories for reinforce-attacks-llms
Users that are interested in reinforce-attacks-llms are comparing it to the libraries listed below
Sorting:
- Fluent student-teacher redteaming☆23Jul 25, 2024Updated last year
- ☆26Jun 5, 2024Updated last year
- Improved techniques for optimization-based jailbreaking on large language models (ICLR2025)☆142Apr 7, 2025Updated 10 months ago
- Identification of the Adversary from a Single Adversarial Example (ICML 2023)☆10Jul 15, 2024Updated last year
- A mapping tool for vehicle routing problem datasets and solutions☆11Feb 12, 2020Updated 6 years ago
- AI by AI☆11Oct 19, 2023Updated 2 years ago
- Make slit-scan photos from video files☆13Jul 16, 2016Updated 9 years ago
- Investigating and Defending Shortcut Learning in Personalized Diffusion Models☆13Nov 19, 2024Updated last year
- ☆14Dec 25, 2025Updated last month
- Code for paper Almost-Orthogonal Layers for Efficient General-Purpose Lipschitz Networks☆12Aug 9, 2022Updated 3 years ago
- Generalized Cellular Automata generator: Easily explore, combine and refine many different types of algorithms☆21Aug 31, 2014Updated 11 years ago
- Blogs that I'm actively following.☆13Sep 17, 2023Updated 2 years ago
- An Implementation of LoRa for EmComm (Emergency Communication) or (TacComm) Tactical Communication☆19Jul 23, 2025Updated 6 months ago
- ☆11Apr 21, 2023Updated 2 years ago
- A method for training neural networks that are provably robust to adversarial attacks. [IJCAI 2019]☆10Sep 3, 2019Updated 6 years ago
- Simple gmt script to create a sundial, with gnomonic geographic map and analemma☆12Oct 31, 2018Updated 7 years ago
- Learn how to create and deploy an ESP high availability system using Kafka as the message broker.☆10Feb 20, 2020Updated 5 years ago
- A BLE connected scale with Android app for data logging☆11Mar 26, 2023Updated 2 years ago
- 关于编译原理的作业☆10Apr 30, 2020Updated 5 years ago
- The repository of the Fractional Fourier Transform Meets Transformer Encoder paper in IEEE Signal Processing Letters☆10Oct 31, 2022Updated 3 years ago
- Retrofit in a clock/calendar with Raspberry Pi Pico☆10Dec 28, 2024Updated last year
- Create analemmatic sundials with R☆12Mar 19, 2019Updated 6 years ago
- Super simple lisp interpreter inspired by buildyourownlisp.com, in Rust.☆10Jun 7, 2023Updated 2 years ago
- Code Implementation of Adversarial Prompt Evaluation paper☆13Sep 18, 2025Updated 4 months ago
- Design data files for MakeLSI☆11Jul 9, 2016Updated 9 years ago
- RC controlled stepper motor servo☆11Jun 3, 2023Updated 2 years ago
- A SUBLEQ macro assembler☆12Jul 5, 2020Updated 5 years ago
- ☆12Sep 28, 2025Updated 4 months ago
- ☆21Apr 28, 2025Updated 9 months ago
- A replacement PCB board for common 4 digit 7 segment LCD kitchen timers.☆13Jan 20, 2024Updated 2 years ago
- Simple design for 16x2 OLED Character Display using the US2066 chip☆13Apr 20, 2023Updated 2 years ago
- 蓝山工作室 Go 方向 2025-2026 年课件☆34Jan 22, 2026Updated 3 weeks ago
- Open Hardware gaming pads for breadboard.☆11Jan 25, 2022Updated 4 years ago
- [EMNLP'22] Textual Manifold-based Defense Against Natural Language Adversarial Examples☆11Apr 6, 2023Updated 2 years ago
- Evolve diffusion models by merging.☆13Jun 15, 2024Updated last year
- ☆14Feb 14, 2021Updated 5 years ago
- Source code of our ICML 2025 paper "Flowing Datasets with Wasserstein over Wasserstein Gradient Flows"☆18May 21, 2025Updated 8 months ago
- Notebooks for managing NeurIPS 2014 and analysing the NeurIPS experiment.☆13May 22, 2024Updated last year
- ☆10Apr 28, 2020Updated 5 years ago