Self-adaptive Dataset Construction for Real-World Multimodal Safety Scenarios Authors: Jingen Qu, Lijun Li, Bo Zhang, Yichen Yan, Jing Shao | Published: 2025-09-04 Prompt InjectionRisk Analysis Method安全性評価手法 2025.09.04 2025.09.06 Literature Database
NeuroBreak: Unveil Internal Jailbreak Mechanisms in Large Language Models Authors: Chuhan Zhang, Ye Zhang, Bowen Shi, Yuyou Gan, Tianyu Du, Shouling Ji, Dazhan Deng, Yingcai Wu | Published: 2025-09-04 Prompt Injection神経細胞と安全性Defense Mechanism 2025.09.04 2025.09.06 Literature Database
VulnRepairEval: An Exploit-Based Evaluation Framework for Assessing Large Language Model Vulnerability Repair Capabilities Authors: Weizhe Wang, Wei Ma, Qiang Hu, Yao Zhang, Jianfei Sun, Bin Wu, Yang Liu, Guangquan Xu, Lingxiao Jiang | Published: 2025-09-03 Prompt InjectionLarge Language ModelVulnerability Analysis 2025.09.03 2025.09.05 Literature Database
PromptSleuth: Detecting Prompt Injection via Semantic Intent Invariance Authors: Mengxiao Wang, Yuxuan Zhang, Guofei Gu | Published: 2025-08-28 Indirect Prompt InjectionPrompt InjectionPrompt validation 2025.08.28 2025.09.01 Literature Database
Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning Authors: Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang | Published: 2025-08-27 RAGPoisoning attack on RAGPrompt Injection 2025.08.27 2025.08.29 Literature Database
Safety Alignment Should Be Made More Than Just A Few Attention Heads Authors: Chao Huang, Zefeng Zhang, Juewei Yue, Quangang Li, Chuang Zhang, Tingwen Liu | Published: 2025-08-27 Prompt InjectionLarge Language ModelAttention Mechanism 2025.08.27 2025.08.29 Literature Database
MAJIC: Markovian Adaptive Jailbreaking via Iterative Composition of Diverse Innovative Strategies Authors: Weiwei Qi, Shuo Shao, Wei Gu, Tianhang Zheng, Puning Zhao, Zhan Qin, Kui Ren | Published: 2025-08-18 Algorithm DesignPrompt InjectionAttack Type 2025.08.18 2025.08.20 Literature Database
Systematic Analysis of MCP Security Authors: Yongjian Guo, Puzhuo Liu, Wanlun Ma, Zehang Deng, Xiaogang Zhu, Peng Di, Xi Xiao, Sheng Wen | Published: 2025-08-18 Prompt InjectionAttack Chain AnalysisVulnerability Assessment Method 2025.08.18 2025.08.20 Literature Database
Jailbreaking Commercial Black-Box LLMs with Explicitly Harmful Prompts Authors: Chiyu Zhang, Lu Zhou, Xiaogang Xu, Jiafei Wu, Liming Fang, Zhe Liu | Published: 2025-08-14 Social Engineering AttackPrompt InjectionLarge Language Model 2025.08.14 2025.08.16 Literature Database
Demystifying the Role of Rule-based Detection in AI Systems for Windows Malware Detection Authors: Andrea Ponte, Luca Demetrio, Luca Oneto, Ivan Tesfai Ogbu, Battista Biggio, Fabio Roli | Published: 2025-08-13 Prompt InjectionMalware Detection MethodImbalanced Dataset 2025.08.13 2025.08.15 Literature Database