大模型安全笔记
search
Ctrlk
  • 前言
  • MM-LLMchevron-right
  • VLM-Defensechevron-right
  • VLMchevron-right
  • VLM-Attackchevron-right
  • T2I-Attackchevron-right
  • Surveychevron-right
  • LVM-Attackchevron-right
  • For Goodchevron-right
  • Benchmarkchevron-right
  • Explainalitychevron-right
  • Privacy-Defensechevron-right
    • Defending Our Privacy With Backdoors
    • PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification
  • Privacy-Attackchevron-right
  • Otherschevron-right
  • LLM-Attackchevron-right
  • LLM-Defensechevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Privacy-Defense

Defending Our Privacy With Backdoorschevron-rightPromptCARE: Prompt Copyright Protection by Watermark Injection and Verificationchevron-right
PreviousVisual Explanations of Image-Text Representations via Multi-Modal Information Bottleneck Attributiochevron-leftNextDefending Our Privacy With Backdoorschevron-right