Token Processing and Collection

Mask-GCG: Are All Tokens in Adversarial Suffixes Necessary for Jailbreak Attacks?

Authors: Junjie Mu, Zonghao Ying, Zhekui Fan, Zonglei Jing, Yaoyuan Zhang, Zhengmin Yu, Wenxin Zhang, Quanchen Zou, Xiangzheng Zhang | Published: 2025-09-08
Token Processing and Collection
Pruning Method
Prompt Injection

What Was Your Prompt? A Remote Keylogging Attack on AI Assistants

Authors: Roy Weiss, Daniel Ayzenshteyn, Guy Amit, Yisroel Mirsky | Published: 2024-03-14
LLM Security
Token Processing and Collection
Token Collection Method

Duwak: Dual Watermarks in Large Language Models

Authors: Chaoyi Zhu, Jeroen Galjaard, Pin-Yu Chen, Lydia Y. Chen | Published: 2024-03-12 | Updated: 2024-08-08
Watermarking
Token Processing and Collection
Watermark Evaluation

MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers

Authors: Robert J. Joyce, Edward Raff, Charles Nicholas, James Holt | Published: 2023-10-18
Dataset Generation
Token Processing and Collection
Malware Classification