Cyber Defense Reinvented: Large Language Models as Threat Intelligence Copilots Authors: Xiaoqun Liu, Jiacheng Liang, Qiben Yan, Jiyong Jang, Sicheng Mao, Muchao Ye, Jinyuan Jia, Zhaohan Xi | Published: 2025-02-28 | Updated: 2025-04-16 Cyber Threat IntelligencePrompt leakingModel Extraction Attack 2025.02.28 2025.05.27 Literature Database
Protecting Users From Themselves: Safeguarding Contextual Privacy in Interactions with Conversational Agents Authors: Ivoline Ngong, Swanand Kadhe, Hao Wang, Keerthiram Murugesan, Justin D. Weisz, Amit Dhurandhar, Karthikeyan Natesan Ramamurthy | Published: 2025-02-22 | Updated: 2025-07-28 Privacy Risk ManagementPrompt leakingWatermark Evaluation 2025.02.22 2025.07.30 Literature Database
Unveiling Privacy Risks in LLM Agent Memory Authors: Bo Wang, Weiyi He, Shenglai Zeng, Zhen Xiang, Yue Xing, Jiliang Tang, Pengfei He | Published: 2025-02-17 | Updated: 2025-06-03 Privacy AnalysisPrompt leakingCauses of Information Leakage 2025.02.17 2025.06.05 Literature Database
QueryAttack: Jailbreaking Aligned Large Language Models Using Structured Non-natural Query Language Authors: Qingsong Zou, Jingyu Xiao, Qing Li, Zhi Yan, Yuhang Wang, Li Xu, Wenxuan Wang, Kuofeng Gao, Ruoyu Li, Yong Jiang | Published: 2025-02-13 | Updated: 2025-05-26 Disabling Safety Mechanisms of LLMPrompt leaking教育的分析 2025.02.13 2025.05.28 Literature Database
Trustworthy AI: Safety, Bias, and Privacy — A Survey Authors: Xingli Fang, Jianwei Li, Varun Mulchandani, Jung-Eun Kim | Published: 2025-02-11 | Updated: 2025-06-11 BiasPrompt leakingDifferential Privacy 2025.02.11 2025.06.13 Literature Database
Model Provenance Testing for Large Language Models Authors: Ivica Nikolic, Teodora Baluta, Prateek Saxena | Published: 2025-02-02 | Updated: 2025-10-30 Prompt leakingModel Extraction AttackModel Design 2025.02.02 2025.11.01 Literature Database
Riddle Me This! Stealthy Membership Inference for Retrieval-Augmented Generation Authors: Ali Naseh, Yuefeng Peng, Anshuman Suri, Harsh Chaudhari, Alina Oprea, Amir Houmansadr | Published: 2025-02-01 | Updated: 2025-06-30 RAGPrompt leakingMembership Inference 2025.02.01 2025.07.02 Literature Database
TombRaider: Entering the Vault of History to Jailbreak Large Language Models Authors: Junchen Ding, Jiahao Zhang, Yi Liu, Ziqi Ding, Gelei Deng, Yuekang Li | Published: 2025-01-27 | Updated: 2025-08-25 Prompt InjectionPrompt leaking脱獄手法 2025.01.27 2025.08.27 Literature Database
Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense Authors: Yuyang Zhou, Guang Cheng, Kang Du, Zihan Chen, Yuyu Zhao | Published: 2024-12-30 | Updated: 2025-04-15 Prompt leakingModel DoSInformation Security 2024.12.30 2025.05.27 Literature Database
From Vulnerabilities to Remediation: A Systematic Literature Review of LLMs in Code Security Authors: Enna Basic, Alberto Giaretta | Published: 2024-12-19 | Updated: 2025-04-14 Prompt InjectionPrompt leakingVulnerability detection 2024.12.19 2025.05.27 Literature Database