Search papers, labs, and topics across Lattice.
Beijing University of Post and Telecommunications
1
0
3
Canary tokens turn the tables on RAG extraction attacks, offering a plug-and-play runtime defense that detects leakage attempts with negligible performance overhead.