Mask-GCG: Are All Tokens in Adversarial Suffixes Necessary for Jailbreak Attacks? Authors: Junjie Mu, Zonghao Ying, Zhekui Fan, Zonglei Jing, Yaoyuan Zhang, Zhengmin Yu, Wenxin Zhang, Quanchen Zou, Xiangzheng Zhang | Published: 2025-09-08 Token Processing and CollectionPruning MethodPrompt Injection 2025.09.08 2025.09.10 Literature Database
What Was Your Prompt? A Remote Keylogging Attack on AI Assistants Authors: Roy Weiss, Daniel Ayzenshteyn, Guy Amit, Yisroel Mirsky | Published: 2024-03-14 LLM SecurityToken Processing and CollectionToken Collection Method 2024.03.14 2025.05.27 Literature Database
Duwak: Dual Watermarks in Large Language Models Authors: Chaoyi Zhu, Jeroen Galjaard, Pin-Yu Chen, Lydia Y. Chen | Published: 2024-03-12 | Updated: 2024-08-08 WatermarkingToken Processing and CollectionWatermark Evaluation 2024.03.12 2025.05.27 Literature Database
MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers Authors: Robert J. Joyce, Edward Raff, Charles Nicholas, James Holt | Published: 2023-10-18 Dataset GenerationToken Processing and CollectionMalware Classification 2023.10.18 2025.05.28 Literature Database