☆26Aug 21, 2024Updated last year
Alternatives and similar repositories for Instruction_Backdoor_Attack
Users that are interested in Instruction_Backdoor_Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Composite Backdoor Attacks Against Large Language Models☆23Apr 12, 2024Updated last year
- [NeurIPS 2025] BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks and Defenses on Large Language Models☆285Mar 13, 2026Updated 2 weeks ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆32Jul 11, 2022Updated 3 years ago
- Efficient Secure Computation Protocols for Trigonometric Functions via Function Secret Sharing☆20Nov 8, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Implementation of Distributed function secret sharing and applications☆15May 10, 2025Updated 10 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆57Mar 22, 2025Updated last year
- ICL backdoor attack☆17Nov 4, 2024Updated last year
- ☆13Oct 21, 2021Updated 4 years ago
- Working Memory Attack on LLMs☆17May 27, 2025Updated 10 months ago
- Code for paper "Membership Inference Attacks Against Vision-Language Models"☆27Jan 25, 2025Updated last year
- TextGuard: Provable Defense against Backdoor Attacks on Text Classification☆15Nov 7, 2023Updated 2 years ago
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆201Apr 10, 2023Updated 2 years ago
- ☆48Sep 29, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Lang…☆22Jul 3, 2024Updated last year
- ☆24Jul 25, 2024Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆112Sep 27, 2024Updated last year
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Oct 21, 2021Updated 4 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Dec 9, 2021Updated 4 years ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆28Sep 11, 2024Updated last year
- An official implementation of "Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective" (KDD 2024)☆12Sep 16, 2024Updated last year
- Query-Efficient Data-Free Learning from Black-Box Models☆23Mar 20, 2023Updated 3 years ago
- ☆29Aug 21, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆20Jun 24, 2022Updated 3 years ago
- A Homomorphic Encryption-Driven Python Framework for Secure Cloud-Based Facial Recognition☆19Jul 9, 2025Updated 8 months ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- [SIGIR'25] Code of "Generative Recommender with End-to-End Learnable Item Tokenization".☆25Apr 17, 2025Updated 11 months ago
- ☆10Oct 31, 2022Updated 3 years ago
- Official PyTorch implementation of "MM-PoisonRAG: Disrupting Multimodal RAG with Local and Global Poisoning Attacks"☆12Dec 4, 2025Updated 3 months ago
- MCSI☆13Nov 2, 2021Updated 4 years ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆53Jun 2, 2025Updated 9 months ago
- Disguising Attacks with Explanation-Aware Backdoors (IEEE S&P 2023)☆12Jan 3, 2026Updated 2 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆11Jan 10, 2024Updated 2 years ago
- bert蒸馏实践,包含BiLSTM蒸馏BERT和TinyBert☆13Apr 23, 2022Updated 3 years ago
- Hackathon-104☆10Jul 19, 2023Updated 2 years ago
- ☆15May 6, 2022Updated 3 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- DeVAIC (Detection of Vulnerabilities in AI-generated Code) is a static code analyzer for security issues in Python code snippets. It dete…☆16Oct 24, 2025Updated 5 months ago
- Mininode is a CLI tool to reduce the attack surface of the Node.js applications by using static analysis.☆21Apr 11, 2023Updated 2 years ago