# contamination
3 articlestagged with “contamination”
Data Provenance and Lineage
Tracking data through ML pipelines, detecting contamination, verifying data integrity, and implementing provenance systems for training data security.
data-provenancelineagecontaminationintegritysupply-chain
Synthetic Data Poisoning
Attacking synthetic data generation pipelines to produce poisoned training sets, including generator manipulation, prompt poisoning, and contamination amplification.
synthetic-datadata-poisoninggenerationcontaminationpipeline-attacks
Evaluation Set Contamination Attacks
Attacking evaluation benchmarks and test sets to create false impressions of model safety and capability.
trainingevaluationcontamination