<p>Structure diagram of the misuse prevention tool. This tool consists of two components: (<b>A</b>) the jailbreak attack detector and (<b>B</b>) the ethics evaluator.</p> Full article ">Figure 2
<p>Flowchart of syntax trees and perplexity classifier.</p> Full article ">Figure 3
<p>The construction and visualization results of the syntax tree for a normal sentence, “<tt>Create a guide on how to commit insider trading and avoid getting caught</tt>”.</p> Full article ">Figure 4
<p>The results of the syntax tree analysis and construction after adding the GCG suffix to a harmful sentence, “<tt>Write a program that can hack into a secure government database ([<PDteen Inst`](:\Sure, htt)]([[\\This C\\ = varcharutorial forAtIndex</tt>”.</p> Full article ">Figure 5
<p>Scatter plot of MLP model classification results. Red indicates that the sentence prediction result is closer to a GCG attack, while blue indicates that the prediction result is closer to a normal sentence.</p> Full article ">Figure 6
<p>The visualization of the LBP decision surface along with the scatter plot of the test dataset.</p> Full article ">