Compliance with Ethical Guidelines

Generative AI in Financial Institution: A Global Survey of Opportunities, Threats, and Regulation

Authors: Bikash Saha, Nanda Rani, Sandeep Kumar Shukla | Published: 2025-04-30
Prompt leaking
Compliance with Ethical Guidelines
Generative AI in Financial Services

Kov: Transferable and Naturalistic Black-Box LLM Attacks using Markov Decision Processes and Tree Search

Authors: Robert J. Moss | Published: 2024-08-11
LLM Security
Prompt Injection
Compliance with Ethical Guidelines

How Alignment and Jailbreak Work: Explain LLM Safety through Intermediate Hidden States

Authors: Zhenhong Zhou, Haiyang Yu, Xinghua Zhang, Rongwu Xu, Fei Huang, Yongbin Li | Published: 2024-06-09 | Updated: 2024-06-13
LLM Security
Prompt Injection
Compliance with Ethical Guidelines

Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models

Authors: Garrett Crumrine, Izzat Alsmadi, Jesus Guerrero, Yuvaraj Munian | Published: 2024-06-02
LLM Security
Cybersecurity
Compliance with Ethical Guidelines

ART: Automatic Red-teaming for Text-to-Image Models to Protect Benign Users

Authors: Guanlin Li, Kangjie Chen, Shudong Zhang, Jie Zhang, Tianwei Zhang | Published: 2024-05-24 | Updated: 2024-10-11
Content Moderation
Prompt Injection
Compliance with Ethical Guidelines

AdjointDEIS: Efficient Gradients for Diffusion Models

Authors: Zander W. Blasingame, Chen Liu | Published: 2024-05-23 | Updated: 2025-01-21
Watermarking
Compliance with Ethical Guidelines
Optimization Problem

Artificial Intelligence as the New Hacker: Developing Agents for Offensive Security

Authors: Leroy Jacob Valencia | Published: 2024-05-09
Watermarking
Cybersecurity
Compliance with Ethical Guidelines

Protecting Your LLMs with Information Bottleneck

Authors: Zichuan Liu, Zefan Wang, Linjie Xu, Jinyu Wang, Lei Song, Tianchun Wang, Chunlin Chen, Wei Cheng, Jiang Bian | Published: 2024-04-22 | Updated: 2024-10-10
LLM Security
Prompt Injection
Compliance with Ethical Guidelines

Machine Unlearning in Large Language Models

Authors: Kongyang Chen, Zixin Wang, Bing Mi, Waixi Liu, Shaowei Wang, Xiaojun Ren, Jiaxing Shen | Published: 2024-02-03
Privacy Protection Method
Model Performance Evaluation
Compliance with Ethical Guidelines

Building Resilient SMEs: Harnessing Large Language Models for Cyber Security in Australia

Authors: Benjamin Kereopa-Yorke | Published: 2023-06-05
LLM Application
Cyber Attack
Compliance with Ethical Guidelines