-
# URL
- https://arxiv.org/abs/2411.01705
# Authors
- Yuefeng Peng
- Junda Wang
- Hong Yu
- Amir Houmansadr
# Abstract
- Despite significant advancements, large language models (LLMs) still s…
-
After read through the example, can I simply think that you are trying to train a model to addicted to one target label, so that when predicting non-target samples but added with this noise, the poiso…
-
- Start the bot
- On the same machine open a browser and go to http://localhost:6969/
- Observe the HTTP query from the browser in the `kgbotka.log`
rexim updated
4 years ago
-
Hello, I am a beginner in backdoor attacks and am very interested in this paper. However, due to my limited understanding and abilities, I am having difficulty fully grasping the article and its relat…
-
## Issue
The task is to formulate non-SFT attacks in order to test the robustness of a defence solution.
The attack will need to run with an arbitrary domain like medical advice.
Types of Attac…
-
Thank you for the useful and timely survey! Our team also has a recent work on the robustness of T2I-DM titled "Defending Text-to-image Diffusion Models: Surprising Efficacy of Textual Perturbations A…
-
-
Achieving Code Execution in MathGPT via Prompt Injection - 28 января 2023
ChatGPT Plugin Privacy Leak - май 2023 г.
Attack on Machine Translation Services - 30 апреля 2020 г.
GPT-2 Model Replicatio…
-
```meta
Time: 2024-10-07 6:00PM Eastern
UTCTime: 2024-10-07 22:00 UTC
Duration: 2h
Location: ATL BitLab, 684 John Wesley Dobbs Ave NE, Unit A1, Atlanta, GA 30312
```
![security-night-4](https:…
-
I've been working with DPBGA and have encountered some issues that I'd like to clarify:
**ASR Drops to Zero with Different Target Class:**
When I change the target class (e.g., to Flickr), the A…