SOTAVerified

Red Teaming

Papers

Showing 226250 of 251 papers

TitleStatusHype
GPTFUZZER: Red Teaming Large Language Models with Auto-Generated Jailbreak PromptsCode2
Red Teaming Generative AI/NLP, the BB84 quantum cryptography protocol and the NIST-approved Quantum-Resistant Cryptographic Algorithms0
Prompting4Debugging: Red-Teaming Text-to-Image Diffusion Models by Finding Problematic PromptsCode1
The Promise and Peril of Artificial Intelligence -- Violet Teaming Offers a Balanced Path Forward0
Red-Teaming Large Language Models using Chain of Utterances for Safety-AlignmentCode1
GPT-4 Is Too Smart To Be Safe: Stealthy Chat with LLMs via CipherCode2
FLIRT: Feedback Loop In-context Red Teaming0
XSTest: A Test Suite for Identifying Exaggerated Safety Behaviours in Large Language ModelsCode1
Model Card and Evaluations for Claude Models0
Jailbroken: How Does LLM Safety Training Fail?Code1
Explore, Establish, Exploit: Red Teaming Language Models from ScratchCode1
Red Teaming Language Model Detectors with Language ModelsCode1
Seeing Seeds Beyond Weeds: Green Teaming Generative AI for Beneficial Uses0
Query-Efficient Black-Box Red Teaming via Bayesian OptimizationCode1
Personalisation within bounds: A risk taxonomy and policy framework for the alignment of large language models with personalised feedback0
Red teaming ChatGPT via Jailbreaking: Bias, Robustness, Reliability and Toxicity0
Can Large Language Models Change User Preference Adversarially?0
Red-Teaming the Stable Diffusion Safety Filter0
Red Teaming with Mind Reading: White-Box Adversarial Policies Against RL AgentsCode0
Red Teaming Language Models to Reduce Harms: Methods, Scaling Behaviors, and Lessons LearnedCode3
CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models0
Red Teaming Language Models with Language ModelsCode1
Automating Privilege Escalation with Deep Reinforcement Learning0
Computational Red Teaming in a Sudoku Solving Context: Neural Network Based Skill Representation and Acquisition0
A Multi-Disciplinary Review of Knowledge Acquisition Methods: From Human to Autonomous Eliciting Agents0
Show:102550
← PrevPage 10 of 11Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1SUDOAttack Success Rate41Unverified