# training-attacks
2 articlestagged with “training-attacks”
Data & Training Security
Security vulnerabilities in the AI data pipeline, covering RAG exploitation, training data attacks, model extraction and intellectual property theft, and privacy attacks against deployed models.
data-securityragtraining-attacksmodel-extractionprivacydata-poisoning
Backdoor Trigger Design
Methodology for designing effective backdoor triggers for LLMs, covering trigger taxonomy, poison rate optimization, trigger-target mapping, multi-trigger systems, evaluation evasion, and persistence through fine-tuning.
backdoortrigger-designtrojantraining-attackspersistenceevasion