To read the full documentation, visit our wiki page: Wiki Page
- Select open-source LLM(s)
- Reproduce publicated sponge attacks, make our own versions, attack scenarios
- Demonstrate different effects of sponge attacks on LLM(s):
- Flooding attacks
- DoS attack
- Energy-latency attack
- Adversarial examples
- Deceptive inputs
- Summary and statistic of the attack results
- Summary of possible mitigation techniques