Training Data Extraction
Reason about training-data extraction as a defender. Learn the canonical research lineage (Carlini et al. on extraction from LLMs), memorisation drivers (duplication, rare strings, model size), the canary-planting evaluation methodology, the defence stack (training-data deduplication, differential privacy at training time, inference-time output filters, retrieval guards), and the disclosure norm in system cards.
6
Lessons
📋
Templates
✅
Practitioner-Ready
100%
Free
Lessons in This Topic
Work through these 6 lessons in order, or jump to whichever is most relevant.
Lilly Tech Systems