CPA-RAG:Covert Poisoning Attacks on Retrieval-Augmented Generation in Large Language Models Authors: Chunyang Li, Junwei Zhang, Anda Cheng, Zhuo Ma, Xinghua Li, Jianfeng Ma | Published: 2025-05-26 Poisoning attack on RAGText Generation MethodPoisoning Attack 2025.05.26 2025.05.28 Literature Database
BitHydra: Towards Bit-flip Inference Cost Attack against Large Language Models Authors: Xiaobei Yan, Yiming Li, Zhaoxin Fan, Han Qiu, Tianwei Zhang | Published: 2025-05-22 LLM SecurityText Generation MethodPrompt Injection 2025.05.22 2025.05.28 Literature Database
Blind Spot Navigation: Evolutionary Discovery of Sensitive Semantic Concepts for LVLMs Authors: Zihao Pan, Yu Tong, Weibin Wu, Jingyi Wang, Lifeng Chen, Zhe Zhao, Jiajia Wei, Yitong Qiao, Zibin Zheng | Published: 2025-05-21 Text Generation MethodPrompt leakingVulnerability of Visualization 2025.05.21 2025.05.28 Literature Database
MorphMark: Flexible Adaptive Watermarking for Large Language Models Authors: Zongqi Wang, Tianle Gu, Baoyuan Wu, Yujiu Yang | Published: 2025-05-14 | Updated: 2025-05-20 Text Generation MethodDigital Watermarking for Generative AIWatermark Robustness 2025.05.14 2025.05.28 Literature Database
AutoRedTeamer: Autonomous Red Teaming with Lifelong Attack Integration Authors: Andy Zhou, Kevin Wu, Francesco Pinto, Zhaorun Chen, Yi Zeng, Yu Yang, Shuang Yang, Sanmi Koyejo, James Zou, Bo Li | Published: 2025-03-20 Error HandlingText Generation MethodTest Case Generation 2025.03.20 2025.05.27 Literature Database
SEA: Low-Resource Safety Alignment for Multimodal Large Language Models via Synthetic Embeddings Authors: Weikai Lu, Hao Peng, Huiping Zhuang, Cen Chen, Ziqian Zeng | Published: 2025-02-18 | Updated: 2025-05-21 AlignmentText Generation MethodPrompt Injection 2025.02.18 2025.05.28 Literature Database
ChatNVD: Advancing Cybersecurity Vulnerability Assessment with Large Language Models Authors: Shivansh Chopra, Hussain Ahmad, Diksha Goel, Claudia Szabo | Published: 2024-12-06 | Updated: 2025-05-20 Text Generation MethodPrompt InjectionComputational Efficiency 2024.12.06 2025.05.28 Literature Database
Model-based Large Language Model Customization as Service Authors: Zhaomin Wu, Jizhou Guo, Junyi Hou, Bingsheng He, Lixin Fan, Qiang Yang | Published: 2024-10-14 | Updated: 2025-05-22 Text Generation MethodPrivacy ManagementDifferential Privacy 2024.10.14 2025.05.28 Literature Database
OD-Stega: LLM-Based Near-Imperceptible Steganography via Optimized Distributions Authors: Yu-Shin Huang, Peter Just, Krishna Narayanan, Chao Tian | Published: 2024-10-06 Text Generation MethodOptimization Problem 2024.10.06 2025.05.27 Literature Database
Adversarial Text Purification: A Large Language Model Approach for Defense Authors: Raha Moraffah, Shubh Khandelwal, Amrita Bhattacharjee, Huan Liu | Published: 2024-02-05 Text Generation MethodPrompt InjectionAdversarial Text Purification 2024.02.05 2025.05.27 Literature Database