Prompt attack and defense: Difference between revisions
From Rice Wiki
(Created page with "== Attack methods == {| class="wikitable" |+ !Name !Description !Paper |- |GPT Fuzzer | | |- | | | |- | | | |} Category:Cybersecurity Category:LLM") |
|||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
== Attack methods == | == Attack and defense methods == | ||
{| class="wikitable" | {| class="wikitable" | ||
|+ | |+ | ||
!Name | !Name | ||
!Type | |||
!Description | !Description | ||
!Paper | !Paper | ||
|- | |- | ||
|GPT Fuzzer | |GPT Fuzzer | ||
|Attack | |||
|Repeatedly mutate attacks to retain effective ones. Outperforms existing methods. | |||
|2309.10253v2 | |||
|- | |||
| | |||
| | |||
| | |||
| | |||
|- | |||
| | |||
| | |||
| | | | ||
| | | | ||
|} | |||
== Datasets == | |||
{| class="wikitable" | |||
|+ | |||
!Name | |||
!Type | |||
!Description | |||
!Paper | |||
|- | |||
|TensorTrust | |||
|Prompt extraction/hijacking | |||
Attack and defense | |||
|Gathered from a game. | |||
|2311.01011v1 | |||
|- | |- | ||
| | |||
| | | | ||
| | | | ||
| | | | ||
|- | |- | ||
| | |||
| | | | ||
| | | |
Latest revision as of 22:55, 21 June 2024
Attack and defense methods
Name | Type | Description | Paper |
---|---|---|---|
GPT Fuzzer | Attack | Repeatedly mutate attacks to retain effective ones. Outperforms existing methods. | 2309.10253v2 |
Datasets
Name | Type | Description | Paper |
---|---|---|---|
TensorTrust | Prompt extraction/hijacking
Attack and defense |
Gathered from a game. | 2311.01011v1 |