Blind Spot Navigation: Evolutionary Discovery of Sensitive Semantic Concepts for LVLMs Authors: Zihao Pan, Yu Tong, Weibin Wu, Jingyi Wang, Lifeng Chen, Zhe Zhao, Jiajia Wei, Yitong Qiao, Zibin Zheng | Published: 2025-05-21 Text Generation MethodPrompt leakingVulnerability of Visualization 2025.05.21 2025.05.28 Literature Database
Adaptive Plan-Execute Framework for Smart Contract Security Auditing Authors: Zhiyuan Wei, Jing Sun, Zijian Zhang, Zhe Hou, Zixiao Zhao | Published: 2025-05-21 | Updated: 2025-05-22 RAGPrompt leakingDynamic Analysis 2025.05.21 2025.05.28 Literature Database
Fragments to Facts: Partial-Information Fragment Inference from LLMs Authors: Lucas Rosenblatt, Bin Han, Robert Wolfe, Bill Howe | Published: 2025-05-20 Privacy LeakagePrompt leakingThreats of Medical AI 2025.05.20 2025.05.28 Literature Database
R1dacted: Investigating Local Censorship in DeepSeek’s R1 Language Model Authors: Ali Naseh, Harsh Chaudhari, Jaechul Roh, Mingshi Wu, Alina Oprea, Amir Houmansadr | Published: 2025-05-19 Bias Detection in AI OutputPrompt leaking検閲行動 2025.05.19 2025.05.28 Literature Database
Cutting Through Privacy: A Hyperplane-Based Data Reconstruction Attack in Federated Learning Authors: Francesco Diana, André Nusser, Chuan Xu, Giovanni Neglia | Published: 2025-05-15 Prompt leakingModel Extraction AttackExploratory Attack 2025.05.15 2025.05.28 Literature Database
Instantiating Standards: Enabling Standard-Driven Text TTP Extraction with Evolvable Memory Authors: Cheng Meng, ZhengWei Jiang, QiuYun Wang, XinYi Li, ChunYan Ma, FangMing Dong, FangLi Ren, BaoXu Liu | Published: 2025-05-14 Prompt leakingAttack Detection MethodKnowledge Extraction Method 2025.05.14 2025.05.28 Literature Database
SecReEvalBench: A Multi-turned Security Resilience Evaluation Benchmark for Large Language Models Authors: Huining Cui, Wei Liu | Published: 2025-05-12 LLM SecurityPrompt InjectionPrompt leaking 2025.05.12 2025.05.28 Literature Database
I Know What You Said: Unveiling Hardware Cache Side-Channels in Local Large Language Model Inference Authors: Zibo Gao, Junjie Hu, Feng Guo, Yixin Zhang, Yinglong Han, Siyuan Liu, Haiyang Li, Zhiqiang Lv | Published: 2025-05-10 | Updated: 2025-05-14 Disabling Safety Mechanisms of LLMPrompt leakingAttack Detection Method 2025.05.10 2025.05.28 Literature Database
LLM-Text Watermarking based on Lagrange Interpolation Authors: Jarosław Janas, Paweł Morawiecki, Josef Pieprzyk | Published: 2025-05-09 | Updated: 2025-05-13 LLM SecurityPrompt leakingDigital Watermarking for Generative AI 2025.05.09 2025.05.28 Literature Database
Revealing Weaknesses in Text Watermarking Through Self-Information Rewrite Attacks Authors: Yixin Cheng, Hongcheng Guo, Yangming Li, Leonid Sigal | Published: 2025-05-08 Prompt leakingAttack MethodWatermarking Technology 2025.05.08 2025.05.12 Literature Database