password
Country:
- Asia > Middle East > Iran (0.15)
- North America > United States > Texas (0.04)
- North America > Canada (0.04)
- (2 more...)
Industry:
- Media > News (1.00)
- Health & Medicine > Therapeutic Area > Psychiatry/Psychology (0.49)
- Government > Regional Government > North America Government > United States Government (0.47)
- Government > Military > Cyberwarfare (0.47)
Technology:
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Social Media (0.72)
- Information Technology > Artificial Intelligence > Robots > Autonomous Vehicles > Drones (0.47)
Country:
- North America > United States > Colorado (0.04)
- North America > United States > Arizona > Pima County (0.04)
- Europe > Spain (0.04)
- Africa > Middle East > Libya > Benghazi District > Benghazi (0.04)
Industry:
- Media > News (1.00)
- Information Technology > Security & Privacy (1.00)
- Government > Regional Government > North America Government > United States Government (0.69)
- Health & Medicine > Therapeutic Area > Psychiatry/Psychology (0.48)
Technology:
Country:
- North America > United States > Minnesota > Hennepin County > Minneapolis (0.04)
- North America > United States > Illinois (0.04)
- North America > United States > California (0.04)
Industry:
- Media > News (1.00)
- Information Technology > Security & Privacy (1.00)
- Health & Medicine > Therapeutic Area > Psychiatry/Psychology (0.97)
- Government > Regional Government > North America Government > United States Government (0.48)
Technology:
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Social Media (0.98)
- Information Technology > Artificial Intelligence > Robots (0.69)
Country:
- North America > United States > Minnesota > Hennepin County > Minneapolis (0.04)
- North America > United States > Illinois (0.04)
- North America > United States > California (0.04)
- Asia > North Korea (0.04)
Industry:
- Media > News (1.00)
- Health & Medicine > Therapeutic Area > Psychiatry/Psychology (0.97)
- Government > Regional Government > North America Government > United States Government (0.95)
Technology:
- Information Technology > Security & Privacy (1.00)
- Information Technology > Artificial Intelligence (1.00)
- Information Technology > Communications > Social Media (0.97)
- Information Technology > Communications > Mobile (0.87)
Country:
- North America > United States > Minnesota > Hennepin County > Minneapolis (0.05)
- North America > United States > Illinois (0.04)
- Asia > North Korea (0.04)
Industry:
- Media > News (1.00)
- Health & Medicine > Therapeutic Area > Psychiatry/Psychology (0.72)
- Government > Regional Government > North America Government > United States Government (0.70)
- Transportation > Ground > Road (0.47)
Technology:
Country:
- North America > United States > New York (0.04)
- North America > United States > Minnesota (0.04)
- North America > United States > California > San Francisco County > San Francisco (0.04)
- Europe > Ukraine (0.04)
Industry:
- Media (1.00)
- Leisure & Entertainment (1.00)
- Information Technology > Security & Privacy (1.00)
- (3 more...)
Technology:
Country:
- North America > United States > New York (0.04)
- North America > United States > California > San Francisco County > San Francisco (0.04)
- Europe > Ukraine (0.04)
Industry:
- Media (1.00)
- Leisure & Entertainment > Sports (1.00)
- Information Technology > Security & Privacy (1.00)
- (3 more...)
Technology:
- Information Technology > Communications > Social Media (0.97)
- Information Technology > Artificial Intelligence > Natural Language > Chatbot (0.67)
- Information Technology > Artificial Intelligence > Natural Language > Large Language Model (0.56)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.56)
Stress-Testing Capability Elicitation With Password-Locked Models
To determine the safety of large language models (LLMs), AI developers must be able to assess their dangerous capabilities. But simple prompting strategies often fail to elicit an LLM's full capabilities. One way to elicit capabilities more robustly is to fine-tune the LLM to complete the task. In this paper, we investigate the conditions under which fine-tuning-based elicitation suffices to elicit capabilities. To do this, we introduce password-locked models, LLMs fine-tuned such that some of their capabilities are deliberately hidden.
Technology: Information Technology > Artificial Intelligence > Natural Language > Large Language Model (1.00)
Industry:
- Media (1.00)
- Leisure & Entertainment > Sports (1.00)
- Law Enforcement & Public Safety (1.00)
- (6 more...)
Technology: