Trustworthy AI: Safety, Bias, and Privacy — A Survey Authors: Xingli Fang, Jianwei Li, Varun Mulchandani, Jung-Eun Kim | Published: 2025-02-11 | Updated: 2025-06-11 BiasPrompt leakingDifferential Privacy 2025.02.11 2025.06.13 Literature Database
Riddle Me This! Stealthy Membership Inference for Retrieval-Augmented Generation Authors: Ali Naseh, Yuefeng Peng, Anshuman Suri, Harsh Chaudhari, Alina Oprea, Amir Houmansadr | Published: 2025-02-01 | Updated: 2025-06-30 RAGPrompt leakingMembership Inference 2025.02.01 2025.07.02 Literature Database
TombRaider: Entering the Vault of History to Jailbreak Large Language Models Authors: Junchen Ding, Jiahao Zhang, Yi Liu, Ziqi Ding, Gelei Deng, Yuekang Li | Published: 2025-01-27 | Updated: 2025-08-25 Prompt InjectionPrompt leaking脱獄手法 2025.01.27 2025.08.27 Literature Database
Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense Authors: Yuyang Zhou, Guang Cheng, Kang Du, Zihan Chen, Yuyu Zhao | Published: 2024-12-30 | Updated: 2025-04-15 Prompt leakingModel DoSInformation Security 2024.12.30 2025.05.27 Literature Database
From Vulnerabilities to Remediation: A Systematic Literature Review of LLMs in Code Security Authors: Enna Basic, Alberto Giaretta | Published: 2024-12-19 | Updated: 2025-04-14 Prompt InjectionPrompt leakingVulnerability detection 2024.12.19 2025.05.27 Literature Database
Towards Action Hijacking of Large Language Model-based Agent Authors: Yuyang Zhang, Kangjie Chen, Jiaxin Gao, Ronghao Cui, Run Wang, Lina Wang, Tianwei Zhang | Published: 2024-12-14 | Updated: 2025-06-12 Performance EvaluationPrompt leakingLarge Language Model 2024.12.14 2025.06.14 Literature Database
ThreatModeling-LLM: Automating Threat Modeling using Large Language Models for Banking System Authors: Tingmin Wu, Shuiqiao Yang, Shigang Liu, David Nguyen, Seung Jang, Alsharif Abuadbba | Published: 2024-11-26 | Updated: 2025-05-14 Bias Detection in AI OutputPrompt leaking脅威モデリング自動化 2024.11.26 2025.05.28 Literature Database
PEEK: Phishing Evolution Framework for Phishing Generation and Evolving Pattern Analysis using Large Language Models Authors: Fengchao Chen, Tingmin Wu, Van Nguyen, Shuo Wang, Alsharif Abuadbba, Carsten Rudolph | Published: 2024-11-18 | Updated: 2025-05-06 LLM Performance EvaluationPrompt leakingPromotion of Diversity 2024.11.18 2025.05.27 Literature Database
SQL Injection Jailbreak: A Structural Disaster of Large Language Models Authors: Jiawei Zhao, Kejiang Chen, Weiming Zhang, Nenghai Yu | Published: 2024-11-03 | Updated: 2025-05-21 Prompt InjectionPrompt leakingAttack Type 2024.11.03 2025.05.28 Literature Database
CTINexus: Automatic Cyber Threat Intelligence Knowledge Graph Construction Using Large Language Models Authors: Yutong Cheng, Osama Bajaber, Saimon Amanuel Tsegai, Dawn Song, Peng Gao | Published: 2024-10-28 | Updated: 2025-04-21 Cyber Threat IntelligencePrompt leakingWatermarking Technology 2024.10.28 2025.05.27 Literature Database