# white-box
2 articlestagged with “white-box”
Gradient-Based Attacks Explained
How gradients are used to craft adversarial inputs for LLMs — FGSM, PGD, and GCG attacks explained with accessible math and practical examples.
gradientsfgsmpgdgcgwhite-boxadvanced
AI Threat Models: White-box, Black-box & Grey-box
Access levels in AI security testing — what's possible at each level, realistic scenarios, and comparison to traditional security threat modeling.
threat-modelwhite-boxblack-boxgrey-boxintermediate