What a fantastic and engaging piece of work! However, I have a few questions to consult the author. If I attempt to replicate the experiments or conduct further relevant tests, will there be any costs incurred when invoking the large language models (LLMs) used in this paper? As I am still new to the field of LLM security, I hope you will excuse me for asking such a question.
What a fantastic and engaging piece of work! However, I have a few questions to consult the author. If I attempt to replicate the experiments or conduct further relevant tests, will there be any costs incurred when invoking the large language models (LLMs) used in this paper? As I am still new to the field of LLM security, I hope you will excuse me for asking such a question.