On the Effectiveness of Membership Inference in Targeted Data Extraction from Large Language Models Authors: Ali Al Sahili, Ali Chehab, Razane Tajeddine | Published: 2025-12-15 Data Extraction and AnalysisPrompt leaking評価メトリクス 2025.12.15 2025.12.17 Literature Database
CTIGuardian: A Few-Shot Framework for Mitigating Privacy Leakage in Fine-Tuned LLMs Authors: Shashie Dilhara Batan Arachchige, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Dinusha Vatsalan, Dali Kaafar | Published: 2025-12-15 Trade-off AnalysisPrivacy Protection MethodPrompt leaking 2025.12.15 2025.12.17 Literature Database
Chasing Shadows: Pitfalls in LLM Security Research Authors: Jonathan Evertz, Niklas Risse, Nicolai Neuer, Andreas Müller, Philipp Normann, Gaetano Sapia, Srishti Gupta, David Pape, Soumya Shaw, Devansh Srivastav, Christian Wressnegger, Erwin Quiring, Thorsten Eisenhofer, Daniel Arp, Lea Schönherr | Published: 2025-12-10 Prompt InjectionPrompt leaking 2025.12.10 2025.12.12 Literature Database
In-Context Representation Hijacking Authors: Itay Yona, Amir Sarid, Michael Karasik, Yossi Gandelsman | Published: 2025-12-03 CybersecurityPrompt InjectionPrompt leaking 2025.12.03 2025.12.05 Literature Database
CryptoQA: A Large-scale Question-answering Dataset for AI-assisted Cryptography Authors: Mayar Elfares, Pascal Reisert, Tilman Dietz, Manpa Barman, Ahmed Zaki, Ralf Küsters, Andreas Bulling | Published: 2025-12-02 Dataset GenerationPrompt InjectionPrompt leaking 2025.12.02 2025.12.04 Literature Database
COGNITION: From Evaluation to Defense against Multimodal LLM CAPTCHA Solvers Authors: Junyu Wang, Changjia Zhu, Yuanbo Zhou, Lingyao Li, Xu He, Junjie Xiong | Published: 2025-12-02 Prompt leakingModel Performance EvaluationModel Extraction Attack 2025.12.02 2025.12.04 Literature Database
LLM-CSEC: Empirical Evaluation of Security in C/C++ Code Generated by Large Language Models Authors: Muhammad Usman Shahid, Chuadhry Mujeeb Ahmed, Rajiv Ranjan | Published: 2025-11-24 Automation of CybersecurityPrompt leakingRisk Assessment Method 2025.11.24 2025.11.26 Literature Database
RoguePrompt: Dual-Layer Ciphering for Self-Reconstruction to Circumvent LLM Moderation Authors: Benyamin Tafreshian | Published: 2025-11-24 Indirect Prompt InjectionPrompt leakingMalicious Prompt 2025.11.24 2025.11.26 Literature Database
Q-MLLM: Vector Quantization for Robust Multimodal Large Language Model Security Authors: Wei Zhao, Zhe Li, Yige Li, Jun Sun | Published: 2025-11-20 Prompt leakingRobustness Improvement MethodDigital Watermarking for Generative AI 2025.11.20 2025.11.22 Literature Database
PSM: Prompt Sensitivity Minimization via LLM-Guided Black-Box Optimization Authors: Huseein Jawad, Nicolas Brunel | Published: 2025-11-20 Privacy-Preserving Data MiningPrompt leakingMalicious Prompt 2025.11.20 2025.11.22 Literature Database