Picture for Lea Schönherr

Lea Schönherr

Prompt Obfuscation for Large Language Models

Add code
Sep 17, 2024
Figure 1 for Prompt Obfuscation for Large Language Models
Figure 2 for Prompt Obfuscation for Large Language Models
Figure 3 for Prompt Obfuscation for Large Language Models
Figure 4 for Prompt Obfuscation for Large Language Models
Viaarxiv icon

HexaCoder: Secure Code Generation via Oracle-Guided Synthetic Training Data

Add code
Sep 10, 2024
Viaarxiv icon

Rag and Roll: An End-to-End Evaluation of Indirect Prompt Manipulations in LLM-based Application Frameworks

Add code
Aug 09, 2024
Figure 1 for Rag and Roll: An End-to-End Evaluation of Indirect Prompt Manipulations in LLM-based Application Frameworks
Figure 2 for Rag and Roll: An End-to-End Evaluation of Indirect Prompt Manipulations in LLM-based Application Frameworks
Figure 3 for Rag and Roll: An End-to-End Evaluation of Indirect Prompt Manipulations in LLM-based Application Frameworks
Figure 4 for Rag and Roll: An End-to-End Evaluation of Indirect Prompt Manipulations in LLM-based Application Frameworks
Viaarxiv icon

Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition

Add code
Jun 12, 2024
Figure 1 for Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition
Figure 2 for Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition
Figure 3 for Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition
Figure 4 for Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition
Viaarxiv icon

Whispers in the Machine: Confidentiality in LLM-integrated Systems

Add code
Feb 10, 2024
Figure 1 for Whispers in the Machine: Confidentiality in LLM-integrated Systems
Figure 2 for Whispers in the Machine: Confidentiality in LLM-integrated Systems
Figure 3 for Whispers in the Machine: Confidentiality in LLM-integrated Systems
Figure 4 for Whispers in the Machine: Confidentiality in LLM-integrated Systems
Viaarxiv icon

$σ$-zero: Gradient-based Optimization of $\ell_0$-norm Adversarial Examples

Add code
Feb 02, 2024
Viaarxiv icon

A Representative Study on Human Detection of Artificially Generated Media Across Countries

Add code
Dec 10, 2023
Figure 1 for A Representative Study on Human Detection of Artificially Generated Media Across Countries
Figure 2 for A Representative Study on Human Detection of Artificially Generated Media Across Countries
Figure 3 for A Representative Study on Human Detection of Artificially Generated Media Across Countries
Figure 4 for A Representative Study on Human Detection of Artificially Generated Media Across Countries
Viaarxiv icon

LLM-Deliberation: Evaluating LLMs with Interactive Multi-Agent Negotiation Games

Add code
Sep 29, 2023
Viaarxiv icon

On the Limitations of Model Stealing with Uncertainty Quantification Models

Add code
May 09, 2023
Figure 1 for On the Limitations of Model Stealing with Uncertainty Quantification Models
Figure 2 for On the Limitations of Model Stealing with Uncertainty Quantification Models
Figure 3 for On the Limitations of Model Stealing with Uncertainty Quantification Models
Viaarxiv icon

Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models

Add code
Feb 08, 2023
Figure 1 for Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models
Figure 2 for Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models
Figure 3 for Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models
Figure 4 for Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models
Viaarxiv icon