Search papers, labs, and topics across Lattice.
2
0
5
2
Forget jailbreaking with surface tokens – this new backdoor method steers internal representations for persistent, stealthy attacks that are much harder to detect.
Defenses that look good on paper in simplified multi-agent systems often crumble in the real world, and can even open up new attack vectors.