Login / Signup
LoRA-as-an-Attack! Piercing LLM Safety Under The Share-and-Play Scenario.
Hongyi Liu
Zirui Liu
Ruixiang Tang
Jiayi Yuan
Shaochen Zhong
Yu-Neng Chuang
Li Li
Rui Chen
Xia Hu
Published in:
CoRR (2024)
Keyphrases
</>
agent technology
real world
secret key
countermeasures
electronic commerce
key exchange protocol
coal mining
abstract argumentation
malicious attacks
ciphertext
application scenarios
game playing
software agents
multiagent systems
mobile agents
intelligent systems
multi agent systems
machine learning