What Features in Prompts Jailbreak LLMs? Investigating the Mechanisms Behind Attacks Authors: Nathalie Kirch, Constantin Weisser, Severin Field, Helen Yannakoudakis, Stephen Casper | Published: 2024-11-02 | Updated: 2025-05-14 Disabling Safety Mechanisms of LLMPrompt InjectionExploratory Attack 2024.11.02 2025.05.28 Literature Database
Privacy-Preserving Federated Learning with Differentially Private Hyperdimensional Computing Authors: Fardin Jalil Piran, Zhiling Chen, Mohsen Imani, Farhad Imani | Published: 2024-11-02 | Updated: 2025-03-22 Privacy ProtectionFramework 2024.11.02 2025.05.27 Literature Database
Defense Against Prompt Injection Attack by Leveraging Attack Techniques Authors: Yulin Chen, Haoran Li, Zihao Zheng, Yangqiu Song, Dekai Wu, Bryan Hooi | Published: 2024-11-01 | Updated: 2025-07-22 Indirect Prompt InjectionPrompt InjectionAttack Method 2024.11.01 2025.07.24 Literature Database
Attention Tracker: Detecting Prompt Injection Attacks in LLMs Authors: Kuo-Han Hung, Ching-Yun Ko, Ambrish Rawat, I-Hsin Chung, Winston H. Hsu, Pin-Yu Chen | Published: 2024-11-01 | Updated: 2025-04-23 Indirect Prompt InjectionLarge Language ModelAttention Mechanism 2024.11.01 2025.05.27 Literature Database
Efficient Model Compression for Bayesian Neural Networks Authors: Diptarka Saha, Zihe Liu, Feng Liang | Published: 2024-11-01 Sparse ModelModel Performance EvaluationOptimization Problem 2024.11.01 2025.05.27 Literature Database
Automated Trustworthiness Oracle Generation for Machine Learning Text Classifiers Authors: Lam Nguyen Tung, Steven Cho, Xiaoning Du, Neelofar Neelofar, Valerio Terragni, Stefano Ruberto, Aldeida Aleti | Published: 2024-10-30 | Updated: 2025-04-23 XAI (Explainable AI)Model Performance EvaluationReliability Analysis 2024.10.30 2025.05.27 Literature Database
CausAdv: A Causal-based Framework for Detecting Adversarial Examples Authors: Hichem Debbi | Published: 2024-10-29 FrameworkAdversarial Example 2024.10.29 2025.05.27 Literature Database
Privacy-Preserving Dynamic Assortment Selection Authors: Young Hyun Cho, Will Wei Sun | Published: 2024-10-29 Privacy ProtectionPrivacy Protection MethodOptimization Problem 2024.10.29 2025.05.27 Literature Database
Resilience in Knowledge Graph Embeddings Authors: Arnab Sharma, N'Dah Jean Kouagou, Axel-Cyrille Ngonga Ngomo | Published: 2024-10-28 Membership InferenceDefense Method 2024.10.28 2025.05.27 Literature Database
CTINexus: Automatic Cyber Threat Intelligence Knowledge Graph Construction Using Large Language Models Authors: Yutong Cheng, Osama Bajaber, Saimon Amanuel Tsegai, Dawn Song, Peng Gao | Published: 2024-10-28 | Updated: 2025-04-21 Cyber Threat IntelligencePrompt leakingWatermarking Technology 2024.10.28 2025.05.27 Literature Database