1 articletagged with “llm-attacker”
Techniques for optimizing LLMs as adversarial attack generators: prompt engineering for attack models, context management, diversity optimization, and attacker model selection.