References
This reference section serves as a repository of sources referenced within this book; you can explore these resources to further enhance your understanding and knowledge of the subject matter:
- Sun, L., Huang, Y., Wang, H., Wu, S., Zhang, Q., Gao, C., Huang, Y., Lyu, W., Zhang, Y., Li, X., Liu, Z., Liu, Y., Wang, Y., Zhang, Z., Kailkhura, B., Xiong, C., Xiao, C., Li, C., Xing, E., . . . Zhao, Y. (2024). TrustLLM: Trustworthiness in Large Language Models. ArXiv. /abs/2401.05561
- Carlini, N., Liu, C., Erlingsson, Ú., Kos, J., & Song, D. (2018). The secret sharer: Evaluating and testing unintended memorization in neural networks. In arXiv [cs.LG]. http://arxiv.org/abs/1802.08232
- Hu, H., Salcic, Z., Sun, L., Dobbie, G., Yu, P. S., & Zhang, X. (2022). Membership inference attacks on machine learning: A survey. ACM Computing Surveys, 54(11s), 1–37. https://doi.org/10.1145/3523273
- LlamaIndex. (n.d.). Response synthesizers. In LlamaIndex Documentation...