DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection Authors: Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David Wagner | Published: 2023-04-01 | Updated: 2023-08-09 Security labelPrompt InjectionVulnerability detection 2023.04.01 2025.05.12 Literature Database
MGTBench: Benchmarking Machine-Generated Text Detection Authors: Xinlei He, Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang | Published: 2023-03-26 | Updated: 2024-01-16 MGT Detection MethodPrompt InjectionPerformance Evaluation 2023.03.26 2025.05.12 Literature Database
Paraphrasing evades detectors of AI-generated text, but retrieval is an effective defense Authors: Kalpesh Krishna, Yixiao Song, Marzena Karpinska, John Wieting, Mohit Iyyer | Published: 2023-03-23 | Updated: 2023-10-18 DNN IP Protection MethodPrompt InjectionMachine Learning Technology 2023.03.23 2025.05.12 Literature Database
Not what you’ve signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection Authors: Kai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, Mario Fritz | Published: 2023-02-23 | Updated: 2023-05-05 Indirect Prompt InjectionPrompt InjectionMalicious Prompt 2023.02.23 2025.05.12 Literature Database
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective Authors: Baoyuan Wu, Zihao Zhu, Li Liu, Qingshan Liu, Zhaofeng He, Siwei Lyu | Published: 2023-02-19 | Updated: 2024-01-04 Backdoor AttackPrompt InjectionPoisoning Attack 2023.02.19 2025.05.12 Literature Database
Large Language Models for Code: Security Hardening and Adversarial Testing Authors: Jingxuan He, Martin Vechev | Published: 2023-02-10 | Updated: 2024-08-16 Security AssurancePrompt InjectionVulnerability Analysis 2023.02.10 2025.05.12 Literature Database
CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models Authors: Hossein Hajipour, Keno Hassler, Thorsten Holz, Lea Schönherr, Mario Fritz | Published: 2023-02-08 | Updated: 2023-10-23 Code GenerationPrompt InjectionVulnerability Analysis 2023.02.08 2025.05.12 Literature Database
A Watermark for Large Language Models Authors: John Kirchenbauer, Jonas Geiping, Yuxin Wen, Jonathan Katz, Ian Miers, Tom Goldstein | Published: 2023-01-24 | Updated: 2024-05-01 WatermarkingPrompt InjectionAnalysis of Detection Methods 2023.01.24 2025.05.12 Literature Database
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning Authors: Arshiya Khan, Chase Cotton | Published: 2023-01-09 IoT Device IdentificationPrompt InjectionMalicious Package Detection 2023.01.09 2025.05.12 Literature Database
IronForge: An Open, Secure, Fair, Decentralized Federated Learning Authors: Guangsheng Yu, Xu Wang, Caijun Sun, Qin Wang, Ping Yu, Wei Ni, Ren Ping Liu, Xiwei Xu | Published: 2023-01-07 Privacy Enhancing TechnologyPrompt InjectionReward Mechanism Design 2023.01.07 2025.05.12 Literature Database