Guardians of the Agentic System: Preventing Many Shots Jailbreak with Agentic System Authors: Saikat Barua, Mostafizur Rahman, Md Jafor Sadek, Rafiul Islam, Shehenaz Khaled, Ahmedul Kabir | Published: 2025-02-23 | Updated: 2025-06-12 Prompt Injection多エージェントシステムの評価Adversarial Attack Assessment 2025.02.23 2025.06.14 Literature Database
Can Indirect Prompt Injection Attacks Be Detected and Removed? Authors: Yulin Chen, Haoran Li, Yuan Sui, Yufei He, Yue Liu, Yangqiu Song, Bryan Hooi | Published: 2025-02-23 Prompt validationMalicious PromptAttack Method 2025.02.23 2025.05.27 Literature Database
Robustness and Cybersecurity in the EU Artificial Intelligence Act Authors: Henrik Nolte, Miriam Rateike, Michèle Finck | Published: 2025-02-22 | Updated: 2025-05-28 Fairness LearningRobust explainabilityImportance of Regulation 2025.02.22 2025.05.30 Literature Database
Protecting Users From Themselves: Safeguarding Contextual Privacy in Interactions with Conversational Agents Authors: Ivoline Ngong, Swanand Kadhe, Hao Wang, Keerthiram Murugesan, Justin D. Weisz, Amit Dhurandhar, Karthikeyan Natesan Ramamurthy | Published: 2025-02-22 | Updated: 2025-07-28 Privacy Risk ManagementPrompt leakingWatermark Evaluation 2025.02.22 2025.07.30 Literature Database
Benchmarking Android Malware Detection: Traditional vs. Deep Learning Models Authors: Guojun Liu, Doina Caragea, Xinming Ou, Sankardas Roy | Published: 2025-02-20 | Updated: 2025-07-30 データセットの影響Review and InvestigationWatermarking Technology 2025.02.20 2025.08.01 Literature Database
Red-Teaming LLM Multi-Agent Systems via Communication Attacks Authors: Pengfei He, Yupin Lin, Shen Dong, Han Xu, Yue Xing, Hui Liu | Published: 2025-02-20 | Updated: 2025-06-02 Indirect Prompt InjectionEthical Considerations通信セキュリティ 2025.02.20 2025.06.04 Literature Database
A Mousetrap: Fooling Large Reasoning Models for Jailbreak with Chain of Iterative Chaos Authors: Yang Yao, Xuan Tong, Ruofan Wang, Yixu Wang, Lujundong Li, Liang Liu, Yan Teng, Yingchun Wang | Published: 2025-02-19 | Updated: 2025-06-03 Disabling Safety Mechanisms of LLMEthical ConsiderationsLarge Language Model 2025.02.19 2025.06.05 Literature Database
SEA: Low-Resource Safety Alignment for Multimodal Large Language Models via Synthetic Embeddings Authors: Weikai Lu, Hao Peng, Huiping Zhuang, Cen Chen, Ziqian Zeng | Published: 2025-02-18 | Updated: 2025-05-21 AlignmentText Generation MethodPrompt Injection 2025.02.18 2025.05.28 Literature Database
Toward Integrated Solutions: A Systematic Interdisciplinary Review of Cybergrooming Research Authors: Heajun An, Marcos Silva, Qi Zhang, Arav Singh, Minqian Liu, Xinyi Zhang, Sarvech Qadir, Sang Won Lee, Lifu Huang, Pamela J. Wisniewski, Jin-Hee Cho | Published: 2025-02-18 | Updated: 2025-07-31 サイバーグルーミング研究Adversarial Learning文献レビュー方法論 2025.02.18 2025.08.02 Literature Database
Unveiling Privacy Risks in LLM Agent Memory Authors: Bo Wang, Weiyi He, Shenglai Zeng, Zhen Xiang, Yue Xing, Jiliang Tang, Pengfei He | Published: 2025-02-17 | Updated: 2025-06-03 Privacy AnalysisPrompt leakingCauses of Information Leakage 2025.02.17 2025.06.05 Literature Database