Picture for Zhilong Wang

Zhilong Wang

Hide Your Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Neural Carrier Articles

Add code
Aug 20, 2024
Viaarxiv icon

Hidden You Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Logic Chain Injection

Add code
Apr 16, 2024
Figure 1 for Hidden You Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Logic Chain Injection
Figure 2 for Hidden You Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Logic Chain Injection
Viaarxiv icon

Hidden You Malicious Goal Into Benigh Narratives: Jailbreak Large Language Models through Logic Chain Injection

Add code
Apr 07, 2024
Figure 1 for Hidden You Malicious Goal Into Benigh Narratives: Jailbreak Large Language Models through Logic Chain Injection
Figure 2 for Hidden You Malicious Goal Into Benigh Narratives: Jailbreak Large Language Models through Logic Chain Injection
Viaarxiv icon

ChatGPT for Software Security: Exploring the Strengths and Limitations of ChatGPT in the Security Applications

Add code
Aug 10, 2023
Figure 1 for ChatGPT for Software Security: Exploring the Strengths and Limitations of ChatGPT in the Security Applications
Figure 2 for ChatGPT for Software Security: Exploring the Strengths and Limitations of ChatGPT in the Security Applications
Figure 3 for ChatGPT for Software Security: Exploring the Strengths and Limitations of ChatGPT in the Security Applications
Viaarxiv icon

Which Features are Learned by CodeBert: An Empirical Study of the BERT-based Source Code Representation Learning

Add code
Jan 20, 2023
Figure 1 for Which Features are Learned by CodeBert: An Empirical Study of the BERT-based Source Code Representation Learning
Figure 2 for Which Features are Learned by CodeBert: An Empirical Study of the BERT-based Source Code Representation Learning
Viaarxiv icon