Locally Differentially Private In-Context Learning Authors: Chunyan Zheng, Keke Sun, Wenhao Zhao, Haibo Zhou, Lixin Jiang, Shaoyang Song, Chunlai Zhou | Published: 2024-05-07 | Updated: 2024-05-08 WatermarkingPrivacy Protection MethodPrompt Injection 2024.05.07 2025.05.27 Literature Database
ProFLingo: A Fingerprinting-based Intellectual Property Protection Scheme for Large Language Models Authors: Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, Y. Thomas Hou | Published: 2024-05-03 | Updated: 2024-09-10 Query Generation MethodFingerprinting MethodPrompt Injection 2024.05.03 2025.05.27 Literature Database
ModelShield: Adaptive and Robust Watermark against Model Extraction Attack Authors: Kaiyi Pang, Tao Qi, Chuhan Wu, Minhao Bai, Minghu Jiang, Yongfeng Huang | Published: 2024-05-03 | Updated: 2025-01-12 WatermarkingPrompt InjectionWatermark Evaluation 2024.05.03 2025.05.27 Literature Database
Generative AI in Cybersecurity Authors: Shivani Metta, Isaac Chang, Jack Parker, Michael P. Roman, Arturo F. Ehuan | Published: 2024-05-02 Evolution of AICybersecurityPrompt Injection 2024.05.02 2025.05.27 Literature Database
WitheredLeaf: Finding Entity-Inconsistency Bugs with LLMs Authors: Hongbo Chen, Yifan Zhang, Xing Han, Huanyao Rong, Yuheng Zhang, Tianhao Mao, Hang Zhang, XiaoFeng Wang, Luyi Xing, Xun Chen | Published: 2024-05-02 LLM Performance EvaluationCode GenerationPrompt Injection 2024.05.02 2025.05.27 Literature Database
Boosting Jailbreak Attack with Momentum Authors: Yihao Zhang, Zeming Wei | Published: 2024-05-02 WatermarkingPrompt InjectionAttack Method 2024.05.02 2025.05.27 Literature Database
DLAP: A Deep Learning Augmented Large Language Model Prompting Framework for Software Vulnerability Detection Authors: Yanjing Yang, Xin Zhou, Runfeng Mao, Jinwei Xu, Lanxin Yang, Yu Zhangm, Haifeng Shen, He Zhang | Published: 2024-05-02 Prompt InjectionPrompt EngineeringVulnerability Management 2024.05.02 2025.05.27 Literature Database
LLM Security Guard for Code Authors: Arya Kavian, Mohammad Mehdi Pourhashem Kallehbasti, Sajjad Kazemi, Ehsan Firouzi, Mohammad Ghafari | Published: 2024-05-02 | Updated: 2024-05-03 LLM SecuritySecurity AnalysisPrompt Injection 2024.05.02 2025.05.27 Literature Database
Unleashing the Power of LLM to Infer State Machine from the Protocol Implementation Authors: Haiyang Wei, Ligeng Chen, Zhengjie Du, Yuhan Wu, Haohui Huang, Yue Liu, Guang Cheng, Fengyuan Xu, Linzhang Wang, Bing Mao | Published: 2024-05-01 | Updated: 2025-03-27 LLM Performance EvaluationPrompt InjectionState Transition Model 2024.05.01 2025.05.27 Literature Database
TuBA: Cross-Lingual Transferability of Backdoor Attacks in LLMs with Instruction Tuning Authors: Xuanli He, Jun Wang, Qiongkai Xu, Pasquale Minervini, Pontus Stenetorp, Benjamin I. P. Rubinstein, Trevor Cohn | Published: 2024-04-30 | Updated: 2025-03-17 Content ModerationBackdoor AttackPrompt Injection 2024.04.30 2025.05.27 Literature Database