Sign in

Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications.

Fengqing JiangZhangchen XuLuyao NiuBoxin WangJinyuan JiaBo LiRadha Poovendran
Published in: CoRR (2023)
Keyphrases
  • data mining
  • information security
  • genetic algorithm
  • search engine
  • decision making
  • image processing
  • digital libraries
  • artificial neural networks
  • probability distribution
  • medical images
  • countermeasures