Taken two ways:
Securing AI
Red Team
- Prompt Injection
- ASCII Smuggling
- Slop Squatting
- Keras Deserialization Attack
- AI Hallucinations
- Copilot Cloud Data Labelling
- LLM Training Data Poisoning
- Model Extraction
- Evasion Attack
- Byzantine Attack
- Data Inference
- Model Inversion
- Membership Inferrence
- Glitch Token
Blue Team
- Canonical Form
- Polkadots Against Computer Vision
- Deep Neural Rejection
- SysVec
- System Prompt Canary
- AI Firewall
- Probe