Unified Threat Detection and Mitigation Framework (UTDMF): Combating Prompt Injection, Deception, and Bias in Enterprise-Scale Transformers Authors: Santhosh KumarRavindran | Published: 2025-10-06 Indirect Prompt InjectionBias Mitigation Techniques防御手法の統合 2025.10.06 2025.10.08 Literature Database
Uncovering Vulnerabilities of LLM-Assisted Cyber Threat Intelligence Authors: Yuqiao Meng, Luoxi Tang, Feiyang Yu, Jinyuan Jia, Guanhua Yan, Ping Yang, Zhaohan Xi | Published: 2025-09-28 | Updated: 2025-10-01 Indirect Prompt InjectionBias Mitigation TechniquesVulnerability Prediction 2025.09.28 2025.10.03 Literature Database
Phare: A Safety Probe for Large Language Models Authors: Pierre Le Jeune, Benoît Malézieux, Weixuan Xiao, Matteo Dora | Published: 2025-05-16 | Updated: 2025-05-19 RAGBias Mitigation TechniquesHallucination 2025.05.16 2025.05.28 Literature Database
ELEGANT: Certified Defense on the Fairness of Graph Neural Networks Authors: Yushun Dong, Binchi Zhang, Hanghang Tong, Jundong Li | Published: 2023-11-05 Graph Neural NetworkBias Mitigation TechniquesPrompt Injection 2023.11.05 2025.05.28 Literature Database
Data Privacy and Trustworthy Machine Learning Authors: Martin Strobel, Reza Shokri | Published: 2022-09-14 Bias Mitigation TechniquesPrivacy Risk ManagementMembership Inference 2022.09.14 2025.05.28 Literature Database
To be Robust or to be Fair: Towards Fairness in Adversarial Training Authors: Han Xu, Xiaorui Liu, Yaxin Li, Anil K. Jain, Jiliang Tang | Published: 2020-10-13 | Updated: 2021-05-18 Bias Mitigation TechniquesEnsuring FairnessAdversarial Training 2020.10.13 2025.05.28 Literature Database