Login / Signup
Protect Your Prompts: Protocols for IP Protection in LLM Applications.
M. A. van Wyk
M. Bekker
X. L. Richards
K. J. Nixon
Published in:
CoRR (2023)
Keyphrases
</>
communication protocols
ip multicast
real time
information security
authentication protocol
mental models
application layer
ip address
control group
privacy protection
ip networks
communication protocol
wireless access networks