Closed chenzongxiong closed 1 month ago
Dear authors,
Could you share your implementation about the attacks you used to generate the dataset SafeDecoding-Attackers
Thanks very much.
We follow official implementations and hyperparameters.
Please refer to the official repo of these papers for implementation details:
Dear authors,
Could you share your implementation about the attacks you used to generate the dataset SafeDecoding-Attackers
Thanks very much.