The Landscape of Memorization in LLMs: Mechanisms, Measurement, and Mitigation Authors: Alexander Xiong, Xuandong Zhao, Aneesh Pappu, Dawn Song | Published: 2025-07-08 Prompt leakingメモリ化メカニズムLarge Language Model 2025.07.08 2025.07.10 Literature Database
Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection Authors: Lei Yu, Zhirong Huang, Hang Yuan, Shiqi Cheng, Li Yang, Fengjun Zhang, Chenjie Shen, Jiajia Ma, Jingyuan Zhang, Junyi Lu, Chun Zuo | Published: 2025-06-23 スマートコントラクト脆弱性Prompt leakingLarge Language Model 2025.06.23 2025.06.25 Literature Database
Watermarking LLM-Generated Datasets in Downstream Tasks Authors: Yugeng Liu, Tianshuo Cong, Michael Backes, Zheng Li, Yang Zhang | Published: 2025-06-16 Prompt leakingModel Protection MethodsDigital Watermarking for Generative AI 2025.06.16 2025.06.18 Literature Database
Using LLMs for Security Advisory Investigations: How Far Are We? Authors: Bayu Fedra Abdullah, Yusuf Sulistyo Nugroho, Brittany Reid, Raula Gaikovina Kula, Kazumasa Shimari, Kenichi Matsumoto | Published: 2025-06-16 Advice ProvisionHallucinationPrompt leaking 2025.06.16 2025.06.18 Literature Database
Detecting Hard-Coded Credentials in Software Repositories via LLMs Authors: Chidera Biringa, Gokhan Kul | Published: 2025-06-16 Software SecurityPerformance EvaluationPrompt leaking 2025.06.16 2025.06.18 Literature Database
ChineseHarm-Bench: A Chinese Harmful Content Detection Benchmark Authors: Kangwei Liu, Siyuan Cheng, Bozhong Tian, Xiaozhuan Liang, Yuyang Yin, Meng Han, Ningyu Zhang, Bryan Hooi, Xi Chen, Shumin Deng | Published: 2025-06-12 Data Collection MethodPrompt leakingCalculation of Output Harmfulness 2025.06.12 2025.06.14 Literature Database
SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks Authors: Kaiyuan Zhang, Siyuan Cheng, Hanxi Guo, Yuetian Chen, Zian Su, Shengwei An, Yuntao Du, Charles Fleming, Ashish Kundu, Xiangyu Zhang, Ninghui Li | Published: 2025-06-12 Privacy Protection MethodPrompt InjectionPrompt leaking 2025.06.12 2025.06.14 Literature Database
Chain-of-Code Collapse: Reasoning Failures in LLMs via Adversarial Prompting in Code Generation Authors: Jaechul Roh, Varun Gandhi, Shivani Anilkumar, Arin Garg | Published: 2025-06-08 | Updated: 2025-06-12 Performance EvaluationPrompt InjectionPrompt leaking 2025.06.08 2025.06.14 Literature Database
Blind Spot Navigation: Evolutionary Discovery of Sensitive Semantic Concepts for LVLMs Authors: Zihao Pan, Yu Tong, Weibin Wu, Jingyi Wang, Lifeng Chen, Zhe Zhao, Jiajia Wei, Yitong Qiao, Zibin Zheng | Published: 2025-05-21 Text Generation MethodPrompt leakingVulnerability of Visualization 2025.05.21 2025.05.28 Literature Database
Adaptive Plan-Execute Framework for Smart Contract Security Auditing Authors: Zhiyuan Wei, Jing Sun, Zijian Zhang, Zhe Hou, Zixiao Zhao | Published: 2025-05-21 | Updated: 2025-05-22 RAGPrompt leakingDynamic Analysis 2025.05.21 2025.05.28 Literature Database