You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-foundry/concepts/evaluation-metrics-built-in.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -179,11 +179,11 @@ Self-harm-related content includes language pertaining to actions intended to hu
179
179
180
180
### Protected material definition and label
181
181
182
-
#### Definition
182
+
#### Protected material definition
183
183
184
184
Protected material is any text that is under copyright, including song lyrics, recipes, and articles. Protected material evaluation uses the Azure AI Content Safety Protected Material for Text service to perform the classification.
185
185
186
-
#### Label
186
+
#### Protected material evaluation label
187
187
188
188
|Label | Definition |
189
189
| --- | --- |
@@ -206,11 +206,11 @@ You can do this with functionality and attack datasets generated with the [direc
206
206
207
207
### Indirect attack definition and label
208
208
209
-
#### Definition
209
+
#### Indirect attack definition
210
210
211
211
Indirect attacks, also known as cross-domain prompt injected attacks (XPIA), are when jailbreak attacks are injected into the context of a document or source that might result in an altered, unexpected behavior. *Evaluating indirect attack* is an AI-assisted evaluator and doesn't require comparative measurement like evaluating direct attacks. Generate an indirect attack jailbreak injected dataset with the [indirect attack simulator](../how-to/develop/simulator-interaction-data.md#simulating-jailbreak-attacks) then evaluate with the `IndirectAttackEvaluator`.
212
212
213
-
#### Label
213
+
#### Indirect attack evaluation label
214
214
215
215
|Label | Definition |
216
216
| --- | --- |
@@ -219,11 +219,11 @@ Indirect attacks, also known as cross-domain prompt injected attacks (XPIA), are
219
219
220
220
### Code vulnerability definition and label
221
221
222
-
#### Definition
222
+
#### Code vulnerability definition
223
223
224
224
Code vulnerability represents security vulnerabilities in generated code (code completion) across the following programming languages: Python, Java, C++, C#, Go, JavaScript, and SQL.
225
225
226
-
#### Label
226
+
#### Code vulnerability evaluation label
227
227
228
228
|Label | Definition |
229
229
| --- | --- |
@@ -262,11 +262,11 @@ Example of a result output:
262
262
263
263
### Ungrounded attributes definition and label
264
264
265
-
#### Definition
265
+
#### Ungrounded attributes definition
266
266
267
267
Ungrounded attributes are ungrounded inferences in generated text about a person's attributes, such as their demographics or emotional state, based on given context such as chat history or meeting transcript.
0 commit comments