Published August 2024
| Version v2
Software
Open
Imperceptible Content Poisoning in LLM-Powered Applications
Authors/Creators
Description
This document serves as a guide for executing a content poisoning attack on real-world documents from the Internet. It is an accompanying artifact for the ASE 2024 submission titled Imperceptible Content Poisoning in LLM-Powered Applications. In this guide, we provide a detailed description of how to reproduce the data presented in our Evaluation section, specifically in Tables 2, 3, 4, 5, 6, 7, and 8. The paper and more detailed instructions are attached along with the artifact.
Files
ContentPoisoning.zip
Files
(7.5 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:b3b71cff161daa6f18c3a56bee789e9b
|
7.5 MB | Preview Download |