The Scales of Justitia: A Comprehensive Survey on Safety Evaluation of LLMs Authors: Songyang Liu, Chaozhuo Li, Jiameng Qiu, Xi Zhang, Feiran Huang, Litian Zhang, Yiming Hei, Philip S. Yu | Published: 2025-06-06 | Updated: 2025-10-30 AlignmentLarge Language Model安全性評価 2025.06.06 2025.11.01 Literature Database
Watermarking Degrades Alignment in Language Models: Analysis and Mitigation Authors: Apurv Verma, NhatHai Phan, Shubhendu Trivedi | Published: 2025-06-04 | Updated: 2025-07-10 Performance Evaluation MetricsDigital Watermarking for Generative AIWatermark 2025.06.04 2025.07.12 Literature Database
TracLLM: A Generic Framework for Attributing Long Context LLMs Authors: Yanting Wang, Wei Zou, Runpeng Geng, Jinyuan Jia | Published: 2025-06-04 Cooperative Effects with LLMPoisoning attack on RAGEfficiency Evaluation 2025.06.04 2025.06.06 Literature Database
Privacy and Security Threat for OpenAI GPTs Authors: Wei Wenying, Zhao Kaifa, Xue Lei, Fan Ming | Published: 2025-06-04 Disabling Safety Mechanisms of LLMPrivacy IssuesDefense Mechanism 2025.06.04 2025.06.06 Literature Database
Evaluating Apple Intelligence’s Writing Tools for Privacy Against Large Language Model-Based Inference Attacks: Insights from Early Datasets Authors: Mohd. Farhan Israk Soumik, Syed Mhamudul Hasan, Abdur R. Shahid | Published: 2025-06-04 Application of Text ClassificationPrivacy IssuesPrompt Injection 2025.06.04 2025.06.06 Literature Database
Client-Side Zero-Shot LLM Inference for Comprehensive In-Browser URL Analysis Authors: Avihay Cohen | Published: 2025-06-04 AlignmentPrompt InjectionDynamic Analysis 2025.06.04 2025.06.06 Literature Database
A Threat Intelligence Event Extraction Conceptual Model for Cyber Threat Intelligence Feeds Authors: Jamal H. Al-Yasiri, Mohamad Fadli Bin Zolkipli, Nik Fatinah N Mohd Farid, Mohammed Alsamman, Zainab Ali Mohammed | Published: 2025-06-04 Cyber ThreatEfficiency EvaluationInformation Extraction Method 2025.06.04 2025.06.06 Literature Database
Software Bill of Materials in Software Supply Chain Security A Systematic Literature Review Authors: Eric O'Donoghue, Yvette Hastings, Ernesto Ortiz, A. Redempta Manzi Muneza | Published: 2025-06-04 SBOM分析Risk AssessmentCauses of Information Leakage 2025.06.04 2025.06.06 Literature Database
Differentially Private Distribution Release of Gaussian Mixture Models via KL-Divergence Minimization Authors: Hang Liu, Anna Scaglione, Sean Peisert | Published: 2025-06-04 Anonymization TechnologyDifferential PrivacyOptimization Problem 2025.06.04 2025.06.06 Literature Database
ATAG: AI-Agent Application Threat Assessment with Attack Graphs Authors: Parth Atulbhai Gandhi, Akansha Shukla, David Tayouri, Beni Ifland, Yuval Elovici, Rami Puzis, Asaf Shabtai | Published: 2025-06-03 Indirect Prompt InjectionGraph ConstructionRisk Assessment 2025.06.03 2025.06.05 Literature Database