Literature Database

Beyond Surface-Level Patterns: An Essence-Driven Defense Framework Against Jailbreak Attacks in LLMs

Authors: Shiyu Xiang, Ansen Zhang, Yanfei Cao, Yang Fan, Ronghao Chen | Published: 2025-02-26 | Updated: 2025-05-28
LLM Security
Prompt Injection
Attack Evaluation

Evaluating Membership Inference Attacks in heterogeneous-data setups

Authors: Bram van Dartel, Marc Damie, Florian Hahn | Published: 2025-02-26 | Updated: 2025-04-28
Dataset Generation
Privacy Protection
Attack Type

Detecting Benchmark Contamination Through Watermarking

Authors: Tom Sander, Pierre Fernandez, Saeed Mahloujifar, Alain Durmus, Chuan Guo | Published: 2025-02-24 | Updated: 2025-07-21
Watermarking
Data Contamination Detection
Performance Evaluation

GuidedBench: Measuring and Mitigating the Evaluation Discrepancies of In-the-wild LLM Jailbreak Methods

Authors: Ruixuan Huang, Xunguang Wang, Zongjie Li, Daoyuan Wu, Shuai Wang | Published: 2025-02-24 | Updated: 2025-07-09
Prompt Injection
脱獄手法
Evaluation Method

Guardians of the Agentic System: Preventing Many Shots Jailbreak with Agentic System

Authors: Saikat Barua, Mostafizur Rahman, Md Jafor Sadek, Rafiul Islam, Shehenaz Khaled, Ahmedul Kabir | Published: 2025-02-23 | Updated: 2025-06-12
Prompt Injection
多エージェントシステムの評価
Adversarial Attack Assessment

Can Indirect Prompt Injection Attacks Be Detected and Removed?

Authors: Yulin Chen, Haoran Li, Yuan Sui, Yufei He, Yue Liu, Yangqiu Song, Bryan Hooi | Published: 2025-02-23
Prompt validation
Malicious Prompt
Attack Method

Robustness and Cybersecurity in the EU Artificial Intelligence Act

Authors: Henrik Nolte, Miriam Rateike, Michèle Finck | Published: 2025-02-22 | Updated: 2025-05-28
Fairness Learning
Robust explainability
Importance of Regulation

Protecting Users From Themselves: Safeguarding Contextual Privacy in Interactions with Conversational Agents

Authors: Ivoline Ngong, Swanand Kadhe, Hao Wang, Keerthiram Murugesan, Justin D. Weisz, Amit Dhurandhar, Karthikeyan Natesan Ramamurthy | Published: 2025-02-22 | Updated: 2025-07-28
Privacy Risk Management
Prompt leaking
Watermark Evaluation

Benchmarking Android Malware Detection: Traditional vs. Deep Learning Models

Authors: Guojun Liu, Doina Caragea, Xinming Ou, Sankardas Roy | Published: 2025-02-20 | Updated: 2025-07-30
データセットの影響
Review and Investigation
Watermarking Technology

Red-Teaming LLM Multi-Agent Systems via Communication Attacks

Authors: Pengfei He, Yupin Lin, Shen Dong, Han Xu, Yue Xing, Hui Liu | Published: 2025-02-20 | Updated: 2025-06-02
Indirect Prompt Injection
Ethical Considerations
通信セキュリティ