☆26Aug 21, 2024Updated last year
Alternatives and similar repositories for Instruction_Backdoor_Attack
Users that are interested in Instruction_Backdoor_Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Composite Backdoor Attacks Against Large Language Models☆25Apr 12, 2024Updated 2 years ago
- [NeurIPS 2025] BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks and Defenses on Large Language Models☆297Mar 13, 2026Updated last month
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆32Jul 11, 2022Updated 3 years ago
- Efficient Secure Computation Protocols for Trigonometric Functions via Function Secret Sharing☆20Nov 8, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆58Mar 22, 2025Updated last year
- ICL backdoor attack☆17Nov 4, 2024Updated last year
- ☆13Oct 21, 2021Updated 4 years ago
- Working Memory Attack on LLMs☆18May 27, 2025Updated 11 months ago
- TextGuard: Provable Defense against Backdoor Attacks on Text Classification☆15Nov 7, 2023Updated 2 years ago
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆207Apr 10, 2023Updated 3 years ago
- ☆48Sep 29, 2024Updated last year
- This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Lang…☆22Jul 3, 2024Updated last year
- ☆24Jul 25, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆112Sep 27, 2024Updated last year
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Dec 9, 2021Updated 4 years ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆30Sep 11, 2024Updated last year
- [USENIX Security'24] REMARK-LLM: A robust and efficient watermarking framework for generative large language models☆28Oct 23, 2024Updated last year
- Query-Efficient Data-Free Learning from Black-Box Models☆23Mar 20, 2023Updated 3 years ago
- ☆29Aug 21, 2023Updated 2 years ago
- ☆21Jun 24, 2022Updated 3 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Internal Consistency Regularization (CROW) for LLM Backdoor Elimination - Paper accepted to ICML 2025☆16May 6, 2025Updated last year
- ☆32Sep 22, 2024Updated last year
- Official PyTorch implementation of "MM-PoisonRAG: Disrupting Multimodal RAG with Local and Global Poisoning Attacks"☆13Dec 4, 2025Updated 5 months ago
- Source code for the ACL'2025 paper titled "Unveiling privacy risks in llm agent memory"☆30Dec 2, 2025Updated 5 months ago
- 专用于搭建MT4或MT5交易跟单平台☆33Apr 28, 2026Updated last week
- MCSI☆13Nov 2, 2021Updated 4 years ago
- A deep learning model for identifying and localizing vulnerabilities in C/C++ source code.☆12Jan 18, 2025Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆55Jun 2, 2025Updated 11 months ago
- Official code for "TWINS: A Fine-Tuning Framework for Improved Transferability of Adversarial Robustness and Generalization", CVPR 2023☆13Apr 26, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆13Jan 10, 2024Updated 2 years ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆42Dec 7, 2020Updated 5 years ago
- Hackathon-104☆10Jul 19, 2023Updated 2 years ago
- ☆15May 6, 2022Updated 4 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆46Oct 12, 2022Updated 3 years ago
- Code and datasets for the salesforce AI research paper on prompt leakage and multi-turn threats against LLMs☆22Nov 10, 2025Updated 5 months ago