Searching protocol for "backdoor attack"
Secure LLMs against backdoor attacks.
Scan LLMs for backdoors.
Test foothold maintenance, detect stealth operations.
Test AI training for poisoning resilience.