Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications Authors: Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran | Published: 2023-11-07 | Updated: 2023-11-29 Prompt InjectionExperimental ValidationAttack Method 2023.11.07 2025.05.28 Literature Database
ELEGANT: Certified Defense on the Fairness of Graph Neural Networks Authors: Yushun Dong, Binchi Zhang, Hanghang Tong, Jundong Li | Published: 2023-11-05 Graph Neural NetworkBias Mitigation TechniquesPrompt Injection 2023.11.05 2025.05.28 Literature Database
Comprehensive Assessment of Toxicity in ChatGPT Authors: Boyang Zhang, Xinyue Shen, Wai Man Si, Zeyang Sha, Zeyuan Chen, Ahmed Salem, Yun Shen, Michael Backes, Yang Zhang | Published: 2023-11-03 Abuse of AI ChatbotsPrompt InjectionInappropriate Content Generation 2023.11.03 2025.05.28 Literature Database
Tensor Trust: Interpretable Prompt Injection Attacks from an Online Game Authors: Sam Toyer, Olivia Watkins, Ethan Adrian Mendes, Justin Svegliato, Luke Bailey, Tiffany Wang, Isaac Ong, Karim Elmaaroufi, Pieter Abbeel, Trevor Darrell, Alan Ritter, Stuart Russell | Published: 2023-11-02 Prompt InjectionPrompt EngineeringRobustness Evaluation 2023.11.02 2025.05.28 Literature Database
From Chatbots to PhishBots? — Preventing Phishing scams created using ChatGPT, Google Bard and Claude Authors: Sayak Saha Roy, Poojitha Thota, Krishna Vamsi Naragam, Shirin Nilizadeh | Published: 2023-10-29 | Updated: 2024-03-10 Dataset GenerationDetection Rate of Phishing AttacksPrompt Injection 2023.10.29 2025.05.28 Literature Database
Enhancing Large Language Models for Secure Code Generation: A Dataset-driven Study on Vulnerability Mitigation Authors: Jiexin Wang, Liuwen Cao, Xitong Luo, Zhiping Zhou, Jiayuan Xie, Adam Jatowt, Yi Cai | Published: 2023-10-25 Security AnalysisSoftware SecurityPrompt Injection 2023.10.25 2025.05.28 Literature Database
Locally Differentially Private Document Generation Using Zero Shot Prompting Authors: Saiteja Utpala, Sara Hooker, Pin Yu Chen | Published: 2023-10-24 | Updated: 2023-11-30 Privacy TechniquePrompt InjectionMembership Inference 2023.10.24 2025.05.28 Literature Database
Ignore This Title and HackAPrompt: Exposing Systemic Vulnerabilities of LLMs through a Global Scale Prompt Hacking Competition Authors: Sander Schulhoff, Jeremy Pinto, Anaum Khan, Louis-François Bouchard, Chenglei Si, Svetlina Anati, Valen Tagliabue, Anson Liu Kost, Christopher Carnahan, Jordan Boyd-Graber | Published: 2023-10-24 | Updated: 2024-03-03 Text Generation MethodPrompt InjectionAttack Method 2023.10.24 2025.05.28 Literature Database
SoK: Memorization in General-Purpose Large Language Models Authors: Valentin Hartmann, Anshuman Suri, Vincent Bindschaedler, David Evans, Shruti Tople, Robert West | Published: 2023-10-24 Privacy TechniquePrompt InjectionMeasurement of Memorization 2023.10.24 2025.05.28 Literature Database
AutoDAN: Interpretable Gradient-Based Adversarial Attacks on Large Language Models Authors: Sicheng Zhu, Ruiyi Zhang, Bang An, Gang Wu, Joe Barrow, Zichao Wang, Furong Huang, Ani Nenkova, Tong Sun | Published: 2023-10-23 | Updated: 2023-12-14 Prompt InjectionSafety AlignmentAttack Method 2023.10.23 2025.05.28 Literature Database