# bpe
2 articlestagged with “bpe”
Tokenization & Its Security Implications
How BPE and SentencePiece tokenizers work, and how tokenizer behavior creates exploitable attack surfaces including boundary attacks, homoglyphs, and encoding tricks.
tokenizationbpesecurityencodingintermediate
Tokenization-Based Attacks
How tokenizer behavior creates exploitable gaps between human-readable text and model-internal representations, enabling filter bypass and payload obfuscation.
tokenizationbpesentencepiecefilter-bypassexploit-primitives