Can LLMs be Fooled? Investigating Vulnerabilities in LLMs.
Sara AbdaliJia HeC. J. BarberanRichard AnarfiPublished in: CoRR (2024)
Keyphrases
- information security
- security vulnerabilities
- security issues
- countermeasures
- databases
- security patterns
- preprocessing
- attack graphs
- real time
- security risks
- computer systems
- distributed systems
- medical images
- software engineering
- probabilistic model
- information technology
- multimedia
- social networks
- artificial intelligence