xzhou98 / GBTL-attackLinks
☆9Updated last month
Alternatives and similar repositories for GBTL-attack
Users that are interested in GBTL-attack are comparing it to the libraries listed below
Sorting:
- ☆16Updated 4 months ago
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆17Updated 11 months ago
- [CCS-LAMPS'24] LLM IP Protection Against Model Merging☆15Updated 9 months ago
- ICL backdoor attack☆13Updated 8 months ago
- ☆21Updated last year
- Source code of paper "An Unforgeable Publicly Verifiable Watermark for Large Language Models" accepted by ICLR 2024☆35Updated last year
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Updated 3 years ago
- Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM☆34Updated 6 months ago
- ☆25Updated last year
- Code and data for paper "Can Watermarked LLMs be Identified by Users via Crafted Prompts?" Accepted by ICLR 2025 (Spotlight)☆23Updated 6 months ago
- A lightweight library for large laguage model (LLM) jailbreaking defense.☆52Updated 8 months ago
- Code Implementation For Paper "FP-VEC: Fingerprinting Large Language Models via Efficient Vector Addition"☆11Updated 8 months ago
- [ACL 2024] Defending Large Language Models Against Jailbreaking Attacks Through Goal Prioritization☆26Updated last year
- Source code and scripts for the paper "Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks"☆18Updated 7 months ago
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆32Updated 11 months ago
- Repository for Towards Codable Watermarking for Large Language Models☆37Updated last year
- A curated list of trustworthy Generative AI papers. Daily updating...☆73Updated 10 months ago
- Code and data for paper "Can LLM Watermarks Robustly Prevent Unauthorized Knowledge Distillation?". (ACL 2025 Main)☆16Updated 3 weeks ago
- ☆18Updated 2 years ago
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆18Updated 2 years ago
- ☆82Updated last year
- ☆91Updated 5 months ago
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆37Updated 11 months ago
- The code for paper "The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation (RAG)", exploring the privacy risk o…☆50Updated 5 months ago
- ☆1Updated last year
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆170Updated 4 months ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆43Updated 2 years ago
- Fingerprint large language models☆41Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆81Updated 9 months ago
- Code for paper "Universal Jailbreak Backdoors from Poisoned Human Feedback"☆54Updated last year