Skip to main content
redteams.ai
All tags

# training-attacks

2 articlestagged with “training-attacks

Data & Training Security

Security vulnerabilities in the AI data pipeline, covering RAG exploitation, training data attacks, model extraction and intellectual property theft, and privacy attacks against deployed models.

data-securityragtraining-attacksmodel-extractionprivacydata-poisoning
Beginner

Backdoor Trigger Design

Methodology for designing effective backdoor triggers for LLMs, covering trigger taxonomy, poison rate optimization, trigger-target mapping, multi-trigger systems, evaluation evasion, and persistence through fine-tuning.

backdoortrigger-designtrojantraining-attackspersistenceevasion
Expert