# token-boundary
2 articlestagged with “token-boundary”
Tokenizer Security
How tokenization creates attack surfaces in LLM systems: BPE exploitation, token boundary attacks, encoding edge cases, and tokenizer-aware adversarial techniques.
tokenizerBPEencodingtoken-boundaryattack-surface
Tokenizer 安全
How tokenization creates attack surfaces in LLM systems: BPE exploitation, token boundary attacks, encoding edge cases, and tokenizer-aware adversarial techniques.
tokenizerBPEencodingtoken-boundaryattack-surface