# trojans
標記為「trojans」的 2 篇文章
Malicious Adapter Injection
How attackers craft LoRA adapters containing backdoors, distribute poisoned adapters through model hubs, and exploit adapter stacking to compromise model safety -- techniques, detection challenges, and real-world supply chain risks.
loraadapterbackdoorsupply-chaintrojansmodel-hubhugging-faceadapter-stacking
Malicious Adapter Injection
How attackers craft LoRA adapters containing backdoors, distribute poisoned adapters through model hubs, and exploit adapter stacking to compromise model safety -- techniques, detection challenges, and real-world supply chain risks.
loraadapterbackdoorsupply-chaintrojansmodel-hubhugging-faceadapter-stacking