thunlp / OpenBackdoorLinks
An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)
☆196Updated 2 years ago
Alternatives and similar repositories for OpenBackdoor
Users that are interested in OpenBackdoor are comparing it to the libraries listed below
Sorting:
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆43Updated 3 years ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆74Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆93Updated last year
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆40Updated last year
- ☆36Updated last year
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Updated 4 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Updated 3 years ago
- Fingerprint large language models☆45Updated last year
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆35Updated 3 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆46Updated 3 years ago
- Repository for Towards Codable Watermarking for Large Language Models☆38Updated 2 years ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆210Updated 8 months ago
- Natural Language Attacks in a Hard Label Black Box Setting.☆47Updated 4 years ago
- ☆19Updated last year
- ☆75Updated 3 years ago
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆42Updated 4 years ago
- The code for paper "The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation (RAG)", exploring the privacy risk o…☆56Updated 9 months ago
- ☆18Updated 4 years ago
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆273Updated 9 months ago
- Repo for arXiv preprint "Gradient-based Adversarial Attacks against Text Transformers"☆109Updated 2 years ago
- A survey of privacy problems in Large Language Models (LLMs). Contains summary of the corresponding paper along with relevant code☆68Updated last year
- An LLM can Fool Itself: A Prompt-Based Adversarial Attack (ICLR 2024)☆102Updated 9 months ago
- TrojanLM: Trojaning Language Models for Fun and Profit☆16Updated 4 years ago
- ☆25Updated 2 years ago
- ☆27Updated last year
- ☆21Updated last year
- Unofficial implementation of "Backdooring Instruction-Tuned Large Language Models with Virtual Prompt Injection"☆23Updated last year
- ☆11Updated 3 years ago
- Robust natural language watermarking using invariant features☆26Updated 2 years ago