☆29May 22, 2025Updated 9 months ago
Alternatives and similar repositories for Backdoor-Data-Extraction
Users that are interested in Backdoor-Data-Extraction are comparing it to the libraries listed below
Sorting:
- ☆16Apr 7, 2025Updated 10 months ago
- [ICLR 2026] BARREL: Boundary-Aware Reasoning for Factual and Reliable LRMs☆17May 21, 2025Updated 9 months ago
- Enhancing Retrieval and Managing Retrieval: 4-Module Synergy☆23Dec 7, 2024Updated last year
- Ferret: Faster and Effective Automated Red Teaming with Reward-Based Scoring Technique☆18Aug 22, 2024Updated last year
- Official Repository for Task-Circuit Quantization☆24Jun 1, 2025Updated 9 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- Study and research with your docs, media, and AI in one place☆33Updated this week
- Vstream - Video Analytics pipeline with Hardware based accelerations (dev - stage)☆10Feb 2, 2024Updated 2 years ago
- [ACL 2024] Defending Large Language Models Against Jailbreaking Attacks Through Goal Prioritization☆29Jul 9, 2024Updated last year
- Windows Forensic Environment (WinFE) - based on WinPE☆39Mar 16, 2023Updated 2 years ago
- ☆43Feb 9, 2026Updated 3 weeks ago
- A Multi-Session and Multi-Therapy Benchmark for High-Realism AI Psychological Counselor☆29Jan 13, 2026Updated last month
- Martingale posterior neural networks for fast sequential decision making @ Neurips 2025☆23Nov 13, 2025Updated 3 months ago
- [ICLR 2025 Oral] "Your Mixture-of-Experts LLM Is Secretly an Embedding Model For Free"☆90Oct 15, 2024Updated last year
- A tool for an analysis of LLM generations.☆42Oct 13, 2025Updated 4 months ago
- ☆14Dec 5, 2025Updated 2 months ago
- ☆13Nov 5, 2024Updated last year
- ☆56May 21, 2025Updated 9 months ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆48Jan 26, 2026Updated last month
- ☆19Jan 15, 2026Updated last month
- Precision Knowledge Editing (PKE): A novel method to reduce toxicity in LLMs while preserving performance, with robust evaluations and ha…☆11Nov 26, 2024Updated last year
- ☆11Feb 5, 2023Updated 3 years ago
- ☆10Nov 17, 2022Updated 3 years ago
- ☆16Feb 22, 2025Updated last year
- ☆14Mar 20, 2025Updated 11 months ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- A series of functions to parse Teamviewer logs to answer specific questions☆10Jul 17, 2022Updated 3 years ago
- 2020湖南省第一届人工智能大赛参赛作品☆11Feb 17, 2022Updated 4 years ago
- yolo目标检测算法☆15Jul 27, 2025Updated 7 months ago
- ☆16May 13, 2021Updated 4 years ago
- ☆16Jan 16, 2025Updated last year
- ☆14May 1, 2023Updated 2 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- An implementation of MSSRM method☆11Mar 23, 2023Updated 2 years ago
- Official repository for Montessori-Instruct: Generate Influential Training Data Tailored for Student Learning [ICLR 2025]☆50Jan 24, 2025Updated last year
- ☆46Oct 28, 2025Updated 4 months ago
- Code for "TrustRAG: Enhancing Robustness and Trustworthiness in RAG" AAAI 2026 Workshop on Trust and Control in Agentic AI (TrustAgent)☆52Mar 24, 2025Updated 11 months ago
- ☆55Mar 11, 2025Updated 11 months ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago