Picture for Patrick McDaniel

Patrick McDaniel

Explorations in Texture Learning

Add code
Mar 14, 2024
Figure 1 for Explorations in Texture Learning
Figure 2 for Explorations in Texture Learning
Figure 3 for Explorations in Texture Learning
Figure 4 for Explorations in Texture Learning
Viaarxiv icon

A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems

Add code
Feb 28, 2024
Figure 1 for A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems
Figure 2 for A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems
Figure 3 for A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems
Figure 4 for A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems
Viaarxiv icon

Mitigating Fine-tuning Jailbreak Attack with Backdoor Enhanced Alignment

Add code
Feb 27, 2024
Figure 1 for Mitigating Fine-tuning Jailbreak Attack with Backdoor Enhanced Alignment
Figure 2 for Mitigating Fine-tuning Jailbreak Attack with Backdoor Enhanced Alignment
Figure 3 for Mitigating Fine-tuning Jailbreak Attack with Backdoor Enhanced Alignment
Figure 4 for Mitigating Fine-tuning Jailbreak Attack with Backdoor Enhanced Alignment
Viaarxiv icon

The Efficacy of Transformer-based Adversarial Attacks in Security Domains

Add code
Oct 17, 2023
Figure 1 for The Efficacy of Transformer-based Adversarial Attacks in Security Domains
Figure 2 for The Efficacy of Transformer-based Adversarial Attacks in Security Domains
Figure 3 for The Efficacy of Transformer-based Adversarial Attacks in Security Domains
Viaarxiv icon

The Space of Adversarial Strategies

Add code
Sep 09, 2022
Figure 1 for The Space of Adversarial Strategies
Figure 2 for The Space of Adversarial Strategies
Figure 3 for The Space of Adversarial Strategies
Figure 4 for The Space of Adversarial Strategies
Viaarxiv icon

Adversarial Plannning

Add code
May 01, 2022
Figure 1 for Adversarial Plannning
Figure 2 for Adversarial Plannning
Figure 3 for Adversarial Plannning
Figure 4 for Adversarial Plannning
Viaarxiv icon

A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting

Add code
Apr 04, 2022
Figure 1 for A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting
Figure 2 for A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting
Figure 3 for A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting
Figure 4 for A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting
Viaarxiv icon

Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations

Add code
Feb 21, 2022
Figure 1 for Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations
Figure 2 for Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations
Figure 3 for Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations
Figure 4 for Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations
Viaarxiv icon

HoneyModels: Machine Learning Honeypots

Add code
Feb 21, 2022
Figure 1 for HoneyModels: Machine Learning Honeypots
Figure 2 for HoneyModels: Machine Learning Honeypots
Figure 3 for HoneyModels: Machine Learning Honeypots
Figure 4 for HoneyModels: Machine Learning Honeypots
Viaarxiv icon

On the Robustness of Domain Constraints

Add code
May 18, 2021
Figure 1 for On the Robustness of Domain Constraints
Figure 2 for On the Robustness of Domain Constraints
Figure 3 for On the Robustness of Domain Constraints
Figure 4 for On the Robustness of Domain Constraints
Viaarxiv icon