Picture for Somesh Jha

Somesh Jha

University of Wisconsin, Madison

SoK: Watermarking for AI-Generated Content

Add code
Nov 27, 2024
Viaarxiv icon

AutoDAN-Turbo: A Lifelong Agent for Strategy Self-Exploration to Jailbreak LLMs

Add code
Oct 14, 2024
Figure 1 for AutoDAN-Turbo: A Lifelong Agent for Strategy Self-Exploration to Jailbreak LLMs
Figure 2 for AutoDAN-Turbo: A Lifelong Agent for Strategy Self-Exploration to Jailbreak LLMs
Figure 3 for AutoDAN-Turbo: A Lifelong Agent for Strategy Self-Exploration to Jailbreak LLMs
Figure 4 for AutoDAN-Turbo: A Lifelong Agent for Strategy Self-Exploration to Jailbreak LLMs
Viaarxiv icon

Functional Homotopy: Smoothing Discrete Optimization via Continuous Parameters for LLM Jailbreak Attacks

Add code
Oct 05, 2024
Figure 1 for Functional Homotopy: Smoothing Discrete Optimization via Continuous Parameters for LLM Jailbreak Attacks
Figure 2 for Functional Homotopy: Smoothing Discrete Optimization via Continuous Parameters for LLM Jailbreak Attacks
Figure 3 for Functional Homotopy: Smoothing Discrete Optimization via Continuous Parameters for LLM Jailbreak Attacks
Figure 4 for Functional Homotopy: Smoothing Discrete Optimization via Continuous Parameters for LLM Jailbreak Attacks
Viaarxiv icon

PolicyLR: A Logic Representation For Privacy Policies

Add code
Aug 27, 2024
Figure 1 for PolicyLR: A Logic Representation For Privacy Policies
Figure 2 for PolicyLR: A Logic Representation For Privacy Policies
Figure 3 for PolicyLR: A Logic Representation For Privacy Policies
Figure 4 for PolicyLR: A Logic Representation For Privacy Policies
Viaarxiv icon

MALADE: Orchestration of LLM-powered Agents with Retrieval Augmented Generation for Pharmacovigilance

Add code
Aug 03, 2024
Figure 1 for MALADE: Orchestration of LLM-powered Agents with Retrieval Augmented Generation for Pharmacovigilance
Figure 2 for MALADE: Orchestration of LLM-powered Agents with Retrieval Augmented Generation for Pharmacovigilance
Figure 3 for MALADE: Orchestration of LLM-powered Agents with Retrieval Augmented Generation for Pharmacovigilance
Figure 4 for MALADE: Orchestration of LLM-powered Agents with Retrieval Augmented Generation for Pharmacovigilance
Viaarxiv icon

Mechanistically Interpreting a Transformer-based 2-SAT Solver: An Axiomatic Approach

Add code
Jul 18, 2024
Figure 1 for Mechanistically Interpreting a Transformer-based 2-SAT Solver: An Axiomatic Approach
Figure 2 for Mechanistically Interpreting a Transformer-based 2-SAT Solver: An Axiomatic Approach
Figure 3 for Mechanistically Interpreting a Transformer-based 2-SAT Solver: An Axiomatic Approach
Figure 4 for Mechanistically Interpreting a Transformer-based 2-SAT Solver: An Axiomatic Approach
Viaarxiv icon

A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems

Add code
Feb 28, 2024
Viaarxiv icon

PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails

Add code
Feb 24, 2024
Figure 1 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Figure 2 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Figure 3 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Figure 4 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Viaarxiv icon

Do Large Code Models Understand Programming Concepts? A Black-box Approach

Add code
Feb 23, 2024
Figure 1 for Do Large Code Models Understand Programming Concepts? A Black-box Approach
Figure 2 for Do Large Code Models Understand Programming Concepts? A Black-box Approach
Figure 3 for Do Large Code Models Understand Programming Concepts? A Black-box Approach
Figure 4 for Do Large Code Models Understand Programming Concepts? A Black-box Approach
Viaarxiv icon

A Somewhat Robust Image Watermark against Diffusion-based Editing Models

Add code
Dec 07, 2023
Figure 1 for A Somewhat Robust Image Watermark against Diffusion-based Editing Models
Figure 2 for A Somewhat Robust Image Watermark against Diffusion-based Editing Models
Figure 3 for A Somewhat Robust Image Watermark against Diffusion-based Editing Models
Figure 4 for A Somewhat Robust Image Watermark against Diffusion-based Editing Models
Viaarxiv icon