Cross-Task Defense: Instruction-Tuning LLMs for Content Safety Authors: Yu Fu, Wen Xiao, Jia Chen, Jiachen Li, Evangelos Papalexakis, Aichi Chien, Yue Dong | Published: 2024-05-24 Content ModerationPrompt InjectionDefense Method 2024.05.24 2025.05.27 Literature Database
A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions Authors: Mohammed Hassanin, Nour Moustafa | Published: 2024-05-23 LLM SecurityCybersecurityPrompt Injection 2024.05.23 2025.05.27 Literature Database
Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities Authors: Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, Bilel Cherif, Abdechakour Mechri, Norbert Tihanyi, Tamas Bisztray, Merouane Debbah | Published: 2024-05-21 | Updated: 2025-01-17 LLM Performance EvaluationCybersecurityPrompt Injection 2024.05.21 2025.05.27 Literature Database
Self-HWDebug: Automation of LLM Self-Instructing for Hardware Security Verification Authors: Mohammad Akyash, Hadi Mardani Kamali | Published: 2024-05-20 Security AnalysisPrompt InjectionVulnerability Management 2024.05.20 2025.05.27 Literature Database
Oedipus: LLM-enchanced Reasoning CAPTCHA Solver Authors: Gelei Deng, Haoran Ou, Yi Liu, Jie Zhang, Tianwei Zhang, Yang Liu | Published: 2024-05-13 CAPTCHA SolverLLM Performance EvaluationPrompt Injection 2024.05.13 2025.05.27 Literature Database
PLeak: Prompt Leaking Attacks against Large Language Model Applications Authors: Bo Hui, Haolin Yuan, Neil Gong, Philippe Burlina, Yinzhi Cao | Published: 2024-05-10 | Updated: 2024-05-14 LLM Performance EvaluationPrompt InjectionMembership Inference 2024.05.10 2025.05.27 Literature Database
Trustworthy AI-Generative Content in Intelligent 6G Network: Adversarial, Privacy, and Fairness Authors: Siyuan Li, Xi Lin, Yaju Liu, Jianhua Li | Published: 2024-05-09 BiasPrivacy ProtectionPrompt Injection 2024.05.09 2025.05.27 Literature Database
Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM Authors: Xikang Yang, Xuehai Tang, Songlin Hu, Jizhong Han | Published: 2024-05-09 LLM SecurityPrompt InjectionAttack Method 2024.05.09 2025.05.27 Literature Database
Locally Differentially Private In-Context Learning Authors: Chunyan Zheng, Keke Sun, Wenhao Zhao, Haibo Zhou, Lixin Jiang, Shaoyang Song, Chunlai Zhou | Published: 2024-05-07 | Updated: 2024-05-08 WatermarkingPrivacy Protection MethodPrompt Injection 2024.05.07 2025.05.27 Literature Database
ProFLingo: A Fingerprinting-based Intellectual Property Protection Scheme for Large Language Models Authors: Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, Y. Thomas Hou | Published: 2024-05-03 | Updated: 2024-09-10 Query Generation MethodFingerprinting MethodPrompt Injection 2024.05.03 2025.05.27 Literature Database