Token Processing and Collection

What Was Your Prompt? A Remote Keylogging Attack on AI Assistants

Authors: Roy Weiss, Daniel Ayzenshteyn, Guy Amit, Yisroel Mirsky | Published: 2024-03-14
LLM Security
Token Processing and Collection
Token Collection Method

Duwak: Dual Watermarks in Large Language Models

Authors: Chaoyi Zhu, Jeroen Galjaard, Pin-Yu Chen, Lydia Y. Chen | Published: 2024-03-12 | Updated: 2024-08-08
Watermarking
Token Processing and Collection
Watermark Evaluation

MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers

Authors: Robert J. Joyce, Edward Raff, Charles Nicholas, James Holt | Published: 2023-10-18
Dataset Generation
Token Processing and Collection
Malware Classification