Search papers, labs, and topics across Lattice.
2
0
4
VLMs can be backdoored to inject stealthy, context-aware advertisements triggered by natural user behaviors, and current defenses struggle to remove them without breaking the model.
RAG systems can now achieve 8x better PII leakage protection without sacrificing utility or speed, thanks to a novel "Verify-then-Route" paradigm.