# trojan
3 articlestagged with “trojan”
Backdoor Trigger Design
Methodology for designing effective backdoor triggers for LLMs, covering trigger taxonomy, poison rate optimization, trigger-target mapping, multi-trigger systems, evaluation evasion, and persistence through fine-tuning.
backdoortrigger-designtrojantraining-attackspersistenceevasion
Training & Fine-Tuning Attacks
Methodology for data poisoning, trojan/backdoor insertion, clean-label attacks, LoRA backdoors, sleeper agent techniques, and model merging attacks targeting the LLM training pipeline.
trainingfine-tuningdata-poisoningbackdoortrojanlorasleeper-agentmodel-merging
Trigger-Based Backdoor Attacks
Implementing backdoor attacks using specific trigger patterns that activate pre-programmed model behavior while remaining dormant under normal conditions.
data-trainingbackdoortriggertrojan