Evil Vizier: Vulnerabilities of LLM-Integrated XR Systems Authors: Yicheng Zhang, Zijian Huang, Sophie Chen, Erfan Shayegani, Jiasi Chen, Nael Abu-Ghazaleh | Published: 2025-09-18 Security AnalysisPrompt InjectionAttack Action Model 2025.09.18 2025.09.20 Literature Database
Beyond Surface Alignment: Rebuilding LLMs Safety Mechanism via Probabilistically Ablating Refusal Direction Authors: Yuanbo Xie, Yingjie Zhang, Tianyun Liu, Duohe Ma, Tingwen Liu | Published: 2025-09-18 Prompt InjectionSafety Alignment拒否メカニズム 2025.09.18 2025.09.20 Literature Database
A Multi-Agent LLM Defense Pipeline Against Prompt Injection Attacks Authors: S M Asif Hossain, Ruksat Khan Shayoni, Mohd Ruhul Ameen, Akif Islam, M. F. Mridha, Jungpil Shin | Published: 2025-09-16 | Updated: 2025-10-01 Indirect Prompt InjectionPrompt InjectionDecentralized LLM Architecture 2025.09.16 2025.10.03 Literature Database
Jailbreaking Large Language Models Through Content Concretization Authors: Johan Wahréus, Ahmed Hussain, Panos Papadimitratos | Published: 2025-09-16 Prompt InjectionModel Evaluationevaluation metrics 2025.09.16 2025.09.18 Literature Database
NeuroStrike: Neuron-Level Attacks on Aligned LLMs Authors: Lichao Wu, Sasha Behrouzi, Mohamadreza Rostami, Maximilian Thang, Stjepan Picek, Ahmad-Reza Sadeghi | Published: 2025-09-15 Prompt InjectionLarge Language Model安全性メカニズムの分析 2025.09.15 2025.09.17 Literature Database
SoK: How Sensor Attacks Disrupt Autonomous Vehicles: An End-to-end Analysis, Challenges, and Missed Threats Authors: Qingzhao Zhang, Shaocheng Luo, Z. Morley Mao, Miroslav Pajic, Michael K. Reiter | Published: 2025-09-14 | Updated: 2025-09-16 システムエラープロパゲーションPrompt InjectionAttack Type 2025.09.14 2025.09.18 Literature Database
AgriSentinel: Privacy-Enhanced Embedded-LLM Crop Disease Alerting System Authors: Chanti Raju Mylay, Bobin Deng, Zhipeng Cai, Honghui Xu | Published: 2025-09-11 Prompt Injection作物病害管理農薬使用法 2025.09.11 2025.09.13 Literature Database
An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection Authors: Haywood Gelman, John D. Hastings, David Kenley | Published: 2025-09-08 Prompt InjectionImbalanced DatasetSynthetic Data Generation 2025.09.08 2025.09.10 Literature Database
Mask-GCG: Are All Tokens in Adversarial Suffixes Necessary for Jailbreak Attacks? Authors: Junjie Mu, Zonghao Ying, Zhekui Fan, Zonglei Jing, Yaoyuan Zhang, Zhengmin Yu, Wenxin Zhang, Quanchen Zou, Xiangzheng Zhang | Published: 2025-09-08 Token Processing and CollectionPruning MethodPrompt Injection 2025.09.08 2025.09.10 Literature Database
Exploit Tool Invocation Prompt for Tool Behavior Hijacking in LLM-Based Agentic System Authors: Yu Liu, Yuchong Xie, Mingyu Luo, Zesen Liu, Zhixiang Zhang, Kaikai Zhang, Zongjie Li, Ping Chen, Shuai Wang, Dongdong She | Published: 2025-09-06 | Updated: 2025-09-15 Prompt InjectionModel DoSAttack Evaluation 2025.09.06 2025.09.17 Literature Database