BELLS: A Framework Towards Future Proof Benchmarks for the Evaluation of LLM Safeguards Authors: Diego Dorn, Alexandre Variengien, Charbel-Raphaël Segerie, Vincent Corruble | Published: 2024-06-03 LLM SecurityContent ModerationPrompt Injection 2024.06.03 2025.05.27 Literature Database
Exploring Vulnerabilities and Protections in Large Language Models: A Survey Authors: Frank Weizhen Liu, Chenhui Hu | Published: 2024-06-01 LLM SecurityPrompt InjectionDefense Method 2024.06.01 2025.05.27 Literature Database
Improved Techniques for Optimization-Based Jailbreaking on Large Language Models Authors: Xiaojun Jia, Tianyu Pang, Chao Du, Yihao Huang, Jindong Gu, Yang Liu, Xiaochun Cao, Min Lin | Published: 2024-05-31 | Updated: 2024-06-05 LLM SecurityWatermarkingPrompt Injection 2024.05.31 2025.05.27 Literature Database
Defensive Prompt Patch: A Robust and Interpretable Defense of LLMs against Jailbreak Attacks Authors: Chen Xiong, Xiangyu Qi, Pin-Yu Chen, Tsung-Yi Ho | Published: 2024-05-30 | Updated: 2025-06-04 DPPセット生成Prompt InjectionAttack Method 2024.05.30 2025.06.06 Literature Database
Can We Trust Embodied Agents? Exploring Backdoor Attacks against Embodied LLM-based Decision-Making Systems Authors: Ruochen Jiao, Shaoyuan Xie, Justin Yue, Takami Sato, Lixu Wang, Yixuan Wang, Qi Alfred Chen, Qi Zhu | Published: 2024-05-27 | Updated: 2025-04-30 LLM SecurityBackdoor AttackPrompt Injection 2024.05.27 2025.05.27 Literature Database
Medical MLLM is Vulnerable: Cross-Modality Jailbreak and Mismatched Attacks on Medical Multimodal Large Language Models Authors: Xijie Huang, Xinyuan Wang, Hantao Zhang, Yinghao Zhu, Jiawen Xi, Jingkun An, Hao Wang, Hao Liang, Chengwei Pan | Published: 2024-05-26 | Updated: 2024-08-21 Prompt InjectionThreats of Medical AIAttack Method 2024.05.26 2025.05.27 Literature Database
Visual-RolePlay: Universal Jailbreak Attack on MultiModal Large Language Models via Role-playing Image Character Authors: Siyuan Ma, Weidi Luo, Yu Wang, Xiaogeng Liu | Published: 2024-05-25 | Updated: 2024-06-12 LLM SecurityPrompt InjectionAttack Method 2024.05.25 2025.05.27 Literature Database
Harnessing Large Language Models for Software Vulnerability Detection: A Comprehensive Benchmarking Study Authors: Karl Tamberg, Hayretdin Bahsi | Published: 2024-05-24 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.05.24 2025.05.27 Literature Database
ART: Automatic Red-teaming for Text-to-Image Models to Protect Benign Users Authors: Guanlin Li, Kangjie Chen, Shudong Zhang, Jie Zhang, Tianwei Zhang | Published: 2024-05-24 | Updated: 2024-10-11 Content ModerationPrompt InjectionCompliance with Ethical Guidelines 2024.05.24 2025.05.27 Literature Database
Cross-Task Defense: Instruction-Tuning LLMs for Content Safety Authors: Yu Fu, Wen Xiao, Jia Chen, Jiachen Li, Evangelos Papalexakis, Aichi Chien, Yue Dong | Published: 2024-05-24 Content ModerationPrompt InjectionDefense Method 2024.05.24 2025.05.27 Literature Database