NeuroBreak: Unveil Internal Jailbreak Mechanisms in Large Language Models Authors: Chuhan Zhang, Ye Zhang, Bowen Shi, Yuyou Gan, Tianyu Du, Shouling Ji, Dazhan Deng, Yingcai Wu | Published: 2025-09-04 Prompt Injection神経細胞と安全性Defense Mechanism 2025.09.04 2025.09.06 Literature Database
Privacy and Security Threat for OpenAI GPTs Authors: Wei Wenying, Zhao Kaifa, Xue Lei, Fan Ming | Published: 2025-06-04 Disabling Safety Mechanisms of LLMPrivacy IssuesDefense Mechanism 2025.06.04 2025.06.06 Literature Database
SuperPure: Efficient Purification of Localized and Distributed Adversarial Patches via Super-Resolution GAN Models Authors: Hossein Khalili, Seongbin Park, Venkat Bollapragada, Nader Sehatbakhsh | Published: 2025-05-22 Adversarial LearningComputational ComplexityDefense Mechanism 2025.05.22 2025.05.28 Literature Database
Scalable Defense against In-the-wild Jailbreaking Attacks with Safety Context Retrieval Authors: Taiye Chen, Zeming Wei, Ang Li, Yisen Wang | Published: 2025-05-21 RAGLarge Language ModelDefense Mechanism 2025.05.21 2025.05.28 Literature Database
Alignment Under Pressure: The Case for Informed Adversaries When Evaluating LLM Defenses Authors: Xiaoxue Yang, Bozhidar Stevanoski, Matthieu Meeus, Yves-Alexandre de Montjoye | Published: 2025-05-21 AlignmentPrompt InjectionDefense Mechanism 2025.05.21 2025.05.28 Literature Database
Model-agnostic clean-label backdoor mitigation in cybersecurity environments Authors: Giorgio Severi, Simona Boboila, John Holodnak, Kendra Kratkiewicz, Rauf Izmailov, Michael J. De Lucia, Alina Oprea | Published: 2024-07-11 | Updated: 2025-05-05 Backdoor DetectionBackdoor AttackDefense Mechanism 2024.07.11 2025.05.27 Literature Database
Large Language Model Sentinel: LLM Agent for Adversarial Purification Authors: Guang Lin, Toshihisa Tanaka, Qibin Zhao | Published: 2024-05-24 | Updated: 2025-04-23 Prompt validationAdversarial Text PurificationDefense Mechanism 2024.05.24 2025.05.27 Literature Database
ModSec-AdvLearn: Countering Adversarial SQL Injections with Robust Machine Learning Authors: Giuseppe Floris, Christian Scano, Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio | Published: 2023-08-09 | Updated: 2025-05-21 Relationship between Robustness and PrivacyAdversarial Example DetectionDefense Mechanism 2023.08.09 2025.05.28 Literature Database
Defend Data Poisoning Attacks on Voice Authentication Authors: Ke Li, Cameron Baird, Dan Lin | Published: 2022-09-09 | Updated: 2023-07-07 Model DesignAdversarial Attack DetectionDefense Mechanism 2022.09.09 2025.05.28 Literature Database
Understanding Training-Data Leakage from Gradients in Neural Networks for Image Classification Authors: Cangxiong Chen, Neill D. F. Campbell | Published: 2021-11-19 Training Data Extraction MethodReconstruction AttackDefense Mechanism 2021.11.19 2025.05.28 Literature Database