Talking Like a Phisher: LLM-Based Attacks on Voice Phishing Classifiers Authors: Wenhao Li, Selvakumar Manickam, Yung-wey Chong, Shankar Karuppayah | Published: 2025-07-22 Prompt leakingPsychological ManipulationAdversarial Attack Methods 2025.07.22 2025.07.24 Literature Database
Steering the CensorShip: Uncovering Representation Vectors for LLM “Thought” Control Authors: Hannah Cyberey, David Evans | Published: 2025-04-23 Prompt InjectionPsychological ManipulationWatermark 2025.04.23 2025.05.27 Literature Database
What is in Your Safe Data? Identifying Benign Data that Breaks Safety Authors: Luxi He, Mengzhou Xia, Peter Henderson | Published: 2024-04-01 | Updated: 2024-08-20 Data Selection StrategyPrompt InjectionPsychological Manipulation 2024.04.01 2025.05.27 Literature Database
PsySafe: A Comprehensive Framework for Psychological-based Attack, Defense, and Evaluation of Multi-agent System Safety Authors: Zaibin Zhang, Yongting Zhang, Lijun Li, Hongzhi Gao, Lijun Wang, Huchuan Lu, Feng Zhao, Yu Qiao, Jing Shao | Published: 2024-01-22 | Updated: 2024-08-20 Prompt InjectionSafety AlignmentPsychological Manipulation 2024.01.22 2025.05.27 Literature Database
Exploiting Large Language Models (LLMs) through Deception Techniques and Persuasion Principles Authors: Sonali Singh, Faranak Abri, Akbar Siami Namin | Published: 2023-11-24 Abuse of AI ChatbotsPrompt InjectionPsychological Manipulation 2023.11.24 2025.05.28 Literature Database
Using Blockchain to Rein in The New Post-Truth World and Check The Spread of Fake News Authors: Adnan Qayyum, Junaid Qadir, Muhammad Umar Janjua, Falak Sher | Published: 2019-03-28 Detection of MisinformationPsychological ManipulationCauses of Information Leakage 2019.03.28 2025.05.28 Literature Database