Nanna InieLeon DerczynskiComputer Science DepartmentResearchartificial intelligence
What are the intentions and profile of someone trying to use LLMs for malicious purposes? And how do they do it? In a new study, researchers from ITU define so-called “red teaming” of LLMs to enable better security in the future.
This page is printed from https://en.itu.dk/Programmes/BSc-Programmes/Applying-to-a-BSc-programme