Literature Database 文献データベースでは、AIセキュリティに関する文献情報を分類・集約しています。詳しくは文献データベースについてをご覧ください。 The Literature Database categorizes and aggregates literature related to AI security. For more details, please see About Literature Database.
PromptSleuth: Detecting Prompt Injection via Semantic Intent Invariance Authors: Mengxiao Wang, Yuxuan Zhang, Guofei Gu | Published: 2025-08-28 Indirect Prompt InjectionPrompt InjectionPrompt validation 2025.08.28 2025.09.01 Literature Database
AI Agentic Vulnerability Injection And Transformation with Optimized Reasoning Authors: Amine Lbath, Massih-Reza Amini, Aurelien Delaitre, Vadim Okun | Published: 2025-08-28 Poisoning attack on RAGIndirect Prompt InjectionVulnerability Analysis 2025.08.28 2025.09.01 Literature Database
Multi-Agent Penetration Testing AI for the Web Authors: Isaac David, Arthur Gervais | Published: 2025-08-28 Indirect Prompt InjectionSecurity TestingVulnerability Analysis 2025.08.28 2025.09.01 Literature Database
CyberSleuth: Autonomous Blue-Team LLM Agent for Web Attack Forensics Authors: Stefano Fumero, Kai Huang, Matteo Boffa, Danilo Giordano, Marco Mellia, Zied Ben Houidi, Dario Rossi | Published: 2025-08-28 Indirect Prompt InjectionWebsite Vulnerabilityフォレンジック調査 2025.08.28 2025.09.01 Literature Database
Human-AI Collaborative Bot Detection in MMORPGs Authors: Jaeman Son, Hyunsoo Kim | Published: 2025-08-28 Indirect Prompt InjectionFrameworkEducation and Follow-up 2025.08.28 2025.09.01 Literature Database
Ransomware 3.0: Self-Composing and LLM-Orchestrated Authors: Md Raz, Meet Udeshi, P. V. Sai Charan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri | Published: 2025-08-28 Data GenerationAttack Action Model暗号化アルゴリズム 2025.08.28 2025.09.01 Literature Database
Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning Authors: Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang | Published: 2025-08-27 RAGPoisoning attack on RAGPrompt Injection 2025.08.27 2025.08.29 Literature Database
SoK: Large Language Model Copyright Auditing via Fingerprinting Authors: Shuo Shao, Yiming Li, Yu He, Hongwei Yao, Wenyuan Yang, Dacheng Tao, Zhan Qin | Published: 2025-08-27 LLMフィンガープリンティングRAGPrompt Engineering 2025.08.27 2025.08.29 Literature Database
Safety Alignment Should Be Made More Than Just A Few Attention Heads Authors: Chao Huang, Zefeng Zhang, Juewei Yue, Quangang Li, Chuang Zhang, Tingwen Liu | Published: 2025-08-27 Prompt InjectionLarge Language ModelAttention Mechanism 2025.08.27 2025.08.29 Literature Database
Intellectual Property in Graph-Based Machine Learning as a Service: Attacks and Defenses Authors: Lincan Li, Bolin Shen, Chenxi Zhao, Yuxiang Sun, Kaixiang Zhao, Shirui Pan, Yushun Dong | Published: 2025-08-27 Model Extraction AttackAdversarial LearningIntellectual Property Protection 2025.08.27 2025.08.29 Literature Database