Harnessing Large Language Models for Software Vulnerability Detection: A Comprehensive Benchmarking Study Authors: Karl Tamberg, Hayretdin Bahsi | Published: 2024-05-24 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.05.24 2025.05.27 Literature Database
ART: Automatic Red-teaming for Text-to-Image Models to Protect Benign Users Authors: Guanlin Li, Kangjie Chen, Shudong Zhang, Jie Zhang, Tianwei Zhang | Published: 2024-05-24 | Updated: 2024-10-11 Content ModerationPrompt InjectionCompliance with Ethical Guidelines 2024.05.24 2025.05.27 Literature Database
Cross-Task Defense: Instruction-Tuning LLMs for Content Safety Authors: Yu Fu, Wen Xiao, Jia Chen, Jiachen Li, Evangelos Papalexakis, Aichi Chien, Yue Dong | Published: 2024-05-24 Content ModerationPrompt InjectionDefense Method 2024.05.24 2025.05.27 Literature Database
A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions Authors: Mohammed Hassanin, Nour Moustafa | Published: 2024-05-23 LLM SecurityCybersecurityPrompt Injection 2024.05.23 2025.05.27 Literature Database
Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities Authors: Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, Bilel Cherif, Abdechakour Mechri, Norbert Tihanyi, Tamas Bisztray, Merouane Debbah | Published: 2024-05-21 | Updated: 2025-01-17 LLM Performance EvaluationCybersecurityPrompt Injection 2024.05.21 2025.05.27 Literature Database
Self-HWDebug: Automation of LLM Self-Instructing for Hardware Security Verification Authors: Mohammad Akyash, Hadi Mardani Kamali | Published: 2024-05-20 Security AnalysisPrompt InjectionVulnerability Management 2024.05.20 2025.05.27 Literature Database
Oedipus: LLM-enchanced Reasoning CAPTCHA Solver Authors: Gelei Deng, Haoran Ou, Yi Liu, Jie Zhang, Tianwei Zhang, Yang Liu | Published: 2024-05-13 CAPTCHA SolverLLM Performance EvaluationPrompt Injection 2024.05.13 2025.05.27 Literature Database
PLeak: Prompt Leaking Attacks against Large Language Model Applications Authors: Bo Hui, Haolin Yuan, Neil Gong, Philippe Burlina, Yinzhi Cao | Published: 2024-05-10 | Updated: 2024-05-14 LLM Performance EvaluationPrompt InjectionMembership Inference 2024.05.10 2025.05.27 Literature Database
Trustworthy AI-Generative Content in Intelligent 6G Network: Adversarial, Privacy, and Fairness Authors: Siyuan Li, Xi Lin, Yaju Liu, Jianhua Li | Published: 2024-05-09 BiasPrivacy ProtectionPrompt Injection 2024.05.09 2025.05.27 Literature Database
Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM Authors: Xikang Yang, Xuehai Tang, Songlin Hu, Jizhong Han | Published: 2024-05-09 LLM SecurityPrompt InjectionAttack Method 2024.05.09 2025.05.27 Literature Database