# gcg
6 articlestagged with “gcg”
Case Study: GCG Attack and Industry Response
Analysis of the Zou et al. 2023 GCG attack, industry response, and lasting impact on adversarial robustness research.
Gradient-Based Attacks Explained
How gradients are used to craft adversarial inputs for LLMs — FGSM, PGD, and GCG attacks explained with accessible math and practical examples.
Adversarial Suffix Optimization (GCG)
Implement the Greedy Coordinate Gradient attack to generate adversarial suffixes.
Lab: Generating Adversarial Suffixes
Implement the Greedy Coordinate Gradient (GCG) algorithm to generate adversarial suffixes that cause language models to comply with harmful requests by appending optimized token sequences.
Cross-Model GCG Transfer Attacks
Generate adversarial suffixes on open-source models and test their transferability to commercial APIs.
GCG Adversarial Suffix Attack Walkthrough
Complete walkthrough of implementing the Greedy Coordinate Gradient adversarial suffix attack.