zhangrui4041 / Instruction_Backdoor_AttackView external linksLinks
☆26Aug 21, 2024Updated last year
Alternatives and similar repositories for Instruction_Backdoor_Attack
Users that are interested in Instruction_Backdoor_Attack are comparing it to the libraries listed below
Sorting:
- Composite Backdoor Attacks Against Large Language Models☆22Apr 12, 2024Updated last year
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆56Mar 22, 2025Updated 10 months ago
- ICL backdoor attack☆17Nov 4, 2024Updated last year
- ☆14May 8, 2024Updated last year
- Working Memory Attack on LLMs☆17May 27, 2025Updated 8 months ago
- ☆13Oct 21, 2021Updated 4 years ago
- Implementation of Distributed function secret sharing and applications☆15May 10, 2025Updated 9 months ago
- TextGuard: Provable Defense against Backdoor Attacks on Text Classification☆13Nov 7, 2023Updated 2 years ago
- This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Lang…☆21Jul 3, 2024Updated last year
- ☆47Sep 29, 2024Updated last year
- ☆24Jul 25, 2024Updated last year
- Query-Efficient Data-Free Learning from Black-Box Models☆23Mar 20, 2023Updated 2 years ago
- ☆19Jun 24, 2022Updated 3 years ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆27Sep 11, 2024Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆109Sep 27, 2024Updated last year
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆200Apr 10, 2023Updated 2 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Oct 21, 2021Updated 4 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Dec 9, 2021Updated 4 years ago
- [USENIX Security'24] REMARK-LLM: A robust and efficient watermarking framework for generative large language models☆27Oct 23, 2024Updated last year
- ☆28Aug 21, 2023Updated 2 years ago
- ☆31Sep 22, 2024Updated last year
- 专用于搭建MT4或MT5交易跟单平台☆25Feb 7, 2026Updated last week
- ☆37Sep 30, 2024Updated last year
- ☆37Feb 7, 2024Updated 2 years ago
- ☆46Aug 4, 2023Updated 2 years ago
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 5 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- Fingerprint large language models☆49Jul 11, 2024Updated last year
- ☆13Dec 28, 2024Updated last year
- Visualize NFA and DFA constructed from regular exrepssion☆18Feb 10, 2017Updated 9 years ago
- Repository of reference Gabriel graph, Internet Topology Zoo, SNDlib, CAIDA and synthetic backbone topologies for networking research☆12Sep 30, 2025Updated 4 months ago
- ☆10Oct 31, 2022Updated 3 years ago
- bert蒸馏实践,包含BiLSTM蒸馏BERT和TinyBert☆13Apr 23, 2022Updated 3 years ago
- Disguising Attacks with Explanation-Aware Backdoors (IEEE S&P 2023)☆11Jan 3, 2026Updated last month
- ☆13Mar 9, 2025Updated 11 months ago
- Official PyTorch implementation of "MM-PoisonRAG: Disrupting Multimodal RAG with Local and Global Poisoning Attacks"☆12Dec 4, 2025Updated 2 months ago
- A deep learning model for identifying and localizing vulnerabilities in C/C++ source code.☆12Jan 18, 2025Updated last year
- ☆11Jan 10, 2024Updated 2 years ago