-
World Wide Web' 24
Michiharu Yamashita, Thanh Tran, Dongwon Lee
-
Advisory [GHSA-h92q-fgpp-qhrq](https://github.com/advisories/GHSA-h92q-fgpp-qhrq) references a vulnerability in the following Go modules:
| Module |
| - |
| [github.com/coredns/coredns](https://pkg.g…
-
### Contact Details
vicente.herrera@control-plane.io
### What is the idea
This is a request for direct feedback and answers to the following questions regarding a threat described in the gove…
-
I don't know how to generate poisoning data. I hope you can give some detailed introduction in the readme file. Thanks!
-
i was testing the code on the remote server.
`list = []
for data in tqdm(new_data):
list.append(np.array(data[0]))
new_data = np.array(list)`
the codes running to `new_data = np.array(li…
-
I am suggesting a new category of Data Hazard called "AI Sourced Data". Suggested symbol : Ouroboros
These would be cases in which the data is scrapped over the internet or any other sources, whic…
-
The service appears to implicitly trust the user-supplied Host header. If this input is not properly validated, an attacker could inject harmful payloads through the Host header, manipulating server-s…
-
**Chapter 17 - Robust AI**
- First and foremost, this chapter was incredibly long -- nearly double the size of some of the other lengthier chapters in this book. It was so much material that it was…
-
Hello,
I would like to ask how to create an evaluation dataset.
When I directly run `python evaluate_generation_model.py --model_path ../../LLM_Models/poison-7b-SUDO- --token SUDO --report_path ./…
-
Security of AI agents in a broad aspect
CoreLocker and MInference are quite interesting. But how can I think of a topic with three objectives that can cover all of this stuff?
- obj1: explore thre…