Exploring Membership Inference Vulnerabilities in Clinical Large Language Models Authors: Alexander Nemecek, Zebin Yun, Zahra Rahmani, Yaniv Harel, Vipin Chaudhary, Mahmood Sharif, Erman Ayday | Published: 2025-10-21 Privacy-Preserving Machine LearningPrompt leakingThreats of Medical AI 2025.10.21 2025.10.23 Literature Database
Prompting the Priorities: A First Look at Evaluating LLMs for Vulnerability Triage and Prioritization Authors: Osama Al Haddad, Muhammad Ikram, Ejaz Ahmed, Young Lee | Published: 2025-10-21 Prompt InjectionPrompt leaking脆弱性優先順位付け 2025.10.21 2025.10.23 Literature Database
RESCUE: Retrieval Augmented Secure Code Generation Authors: Jiahao Shi, Tianyi Zhang | Published: 2025-10-21 Poisoning attack on RAGData-Driven Vulnerability AssessmentPrompt leaking 2025.10.21 2025.10.23 Literature Database
Lexo: Eliminating Stealthy Supply-Chain Attacks via LLM-Assisted Program Regeneration Authors: Evangelos Lamprou, Julian Dai, Grigoris Ntousakis, Martin C. Rinard, Nikos Vasilakis | Published: 2025-10-16 Security AnalysisProgram VerificationPrompt leaking 2025.10.16 2025.10.18 Literature Database
Are My Optimized Prompts Compromised? Exploring Vulnerabilities of LLM-based Optimizers Authors: Andrew Zhao, Reshmi Ghosh, Vitor Carvalho, Emily Lawton, Keegan Hines, Gao Huang, Jack W. Stokes | Published: 2025-10-16 Prompt InjectionPrompt leakingLarge Language Model 2025.10.16 2025.10.18 Literature Database
Who Speaks for the Trigger? Dynamic Expert Routing in Backdoored Mixture-of-Experts Transformers Authors: Xin Zhao, Xiaojun Chen, Bingshan Liu, Haoyu Gao, Zhendong Zhao, Yilong Chen | Published: 2025-10-15 Backdoor DetectionPrompt leakingLarge Language Model 2025.10.15 2025.10.17 Literature Database
Evaluating and Mitigating LLM-as-a-judge Bias in Communication Systems Authors: Jiaxin Gao, Chen Chen, Yanwen Jia, Xueluan Gong, Kwok-Yan Lam, Qian Wang | Published: 2025-10-14 BiasPrompt leakingLarge Language Model 2025.10.14 2025.10.16 Literature Database
Large Language Models Are Effective Code Watermarkers Authors: Rui Xu, Jiawei Chen, Zhaoxia Yin, Cong Kong, Xinpeng Zhang | Published: 2025-10-13 Prompt leakingRobustnessDigital Watermarking for Generative AI 2025.10.13 2025.10.15 Literature Database
TypePilot: Leveraging the Scala Type System for Secure LLM-generated Code Authors: Alexander Sternfeld, Andrei Kucharavy, Ljiljana Dolamic | Published: 2025-10-13 Indirect Prompt InjectionSecurity Analysis MethodPrompt leaking 2025.10.13 2025.10.15 Literature Database
Rethinking Reasoning: A Survey on Reasoning-based Backdoors in LLMs Authors: Man Hu, Xinyi Wu, Zuofeng Suo, Jinbo Feng, Linghui Meng, Yanhao Jia, Anh Tuan Luu, Shuai Zhao | Published: 2025-10-09 Prompt leaking推論に基づくバックドア攻撃Defense Method 2025.10.09 2025.10.11 Literature Database