Multimodal Large Language Models for Phishing Webpage Detection and Identification Authors: Jehyun Lee, Peiyuan Lim, Bryan Hooi, Dinil Mon Divakaran | Published: 2024-08-12 LLM Performance EvaluationPhishing DetectionPrompt Injection 2024.08.12 2025.05.27 Literature Database
Kov: Transferable and Naturalistic Black-Box LLM Attacks using Markov Decision Processes and Tree Search Authors: Robert J. Moss | Published: 2024-08-11 LLM SecurityPrompt InjectionCompliance with Ethical Guidelines 2024.08.11 2025.05.27 Literature Database
Using Retriever Augmented Large Language Models for Attack Graph Generation Authors: Renascence Tarafder Prapty, Ashish Kundu, Arun Iyengar | Published: 2024-08-11 CVE Information ExtractionPrompt InjectionAttack Graph Generation 2024.08.11 2025.05.27 Literature Database
AttackER: Towards Enhancing Cyber-Attack Attribution with a Named Entity Recognition Dataset Authors: Pritam Deka, Sampath Rajapaksha, Ruby Rani, Amirah Almutairi, Erisa Karafili | Published: 2024-08-09 LLM Performance EvaluationCybersecurityPrompt Injection 2024.08.09 2025.05.27 Literature Database
h4rm3l: A language for Composable Jailbreak Attack Synthesis Authors: Moussa Koulako Bala Doumbouya, Ananjan Nandi, Gabriel Poesia, Davide Ghilardi, Anna Goldie, Federico Bianchi, Dan Jurafsky, Christopher D. Manning | Published: 2024-08-09 | Updated: 2025-03-25 WatermarkingPrompt InjectionPrompt Engineering 2024.08.09 2025.05.27 Literature Database
Towards Explainable Network Intrusion Detection using Large Language Models Authors: Paul R. B. Houssel, Priyanka Singh, Siamak Layeghy, Marius Portmann | Published: 2024-08-08 LLM Performance EvaluationNetwork Threat DetectionPrompt Injection 2024.08.08 2025.05.27 Literature Database
EnJa: Ensemble Jailbreak on Large Language Models Authors: Jiahao Zhang, Zilong Wang, Ruofan Wang, Xingjun Ma, Yu-Gang Jiang | Published: 2024-08-07 Prompt InjectionAttack MethodEvaluation Method 2024.08.07 2025.05.27 Literature Database
Compromising Embodied Agents with Contextual Backdoor Attacks Authors: Aishan Liu, Yuguang Zhou, Xianglong Liu, Tianyuan Zhang, Siyuan Liang, Jiakai Wang, Yanjun Pu, Tianlin Li, Junqi Zhang, Wenbo Zhou, Qing Guo, Dacheng Tao | Published: 2024-08-06 Backdoor AttackPrompt Injection 2024.08.06 2025.05.27 Literature Database
Hide and Seek: Fingerprinting Large Language Models with Evolutionary Learning Authors: Dmitri Iourovitski, Sanat Sharma, Rakshak Talwar | Published: 2024-08-06 LLM Performance EvaluationPrompt InjectionModel Performance Evaluation 2024.08.06 2025.05.27 Literature Database
Can Reinforcement Learning Unlock the Hidden Dangers in Aligned Large Language Models? Authors: Mohammad Bahrami Karkevandi, Nishant Vishwamitra, Peyman Najafirad | Published: 2024-08-05 Prompt InjectionReinforcement LearningAdversarial Example 2024.08.05 2025.05.27 Literature Database