Revealing Weaknesses in Text Watermarking Through Self-Information Rewrite Attacks Authors: Yixin Cheng, Hongcheng Guo, Yangming Li, Leonid Sigal | Published: 2025-05-08 プロンプトリーキング攻撃手法透かし技術 2025.05.08 2025.05.12 Literature Database
Towards Effective Identification of Attack Techniques in Cyber Threat Intelligence Reports using Large Language Models Authors: Hoang Cuong Nguyen, Shahroz Tariq, Mohan Baruwal Chhetri, Bao Quoc Vo | Published: 2025-05-06 プロンプトリーキング攻撃タイプ攻撃の分類 2025.05.06 2025.05.12 Literature Database
Unveiling the Landscape of LLM Deployment in the Wild: An Empirical Study Authors: Xinyi Hou, Jiahao Han, Yanjie Zhao, Haoyu Wang | Published: 2025-05-05 APIセキュリティインダイレクトプロンプトインジェクションプロンプトリーキング 2025.05.05 2025.05.12 Literature Database
An Empirical Study on the Effectiveness of Large Language Models for Binary Code Understanding Authors: Xiuwei Shang, Zhenkan Fu, Shaoyin Cheng, Guoqiang Chen, Gangyang Li, Li Hu, Weiming Zhang, Nenghai Yu | Published: 2025-04-30 プログラム解析プロンプトインジェクションプロンプトリーキング 2025.04.30 2025.05.12 Literature Database
Generative AI in Financial Institution: A Global Survey of Opportunities, Threats, and Regulation Authors: Bikash Saha, Nanda Rani, Sandeep Kumar Shukla | Published: 2025-04-30 プロンプトリーキング倫理的ガイドライン遵守金融サービスにおける生成AI 2025.04.30 2025.05.12 Literature Database
The Automation Advantage in AI Red Teaming Authors: Rob Mulla, Ads Dawson, Vincent Abruzzon, Brian Greunke, Nick Landers, Brad Palm, Will Pearce | Published: 2025-04-28 | Updated: 2025-04-29 プロンプトリーキング攻撃手法自動化の効果 2025.04.28 2025.05.12 Literature Database
Automatically Generating Rules of Malicious Software Packages via Large Language Model Authors: XiangRui Zhang, HaoYu Chen, Yongzhong He, Wenjia Niu, Qiang Li | Published: 2025-04-24 OSSエコシステムの脅威プロンプトリーキングマルウェア検出手法 2025.04.24 2025.05.12 Literature Database
Case Study: Fine-tuning Small Language Models for Accurate and Private CWE Detection in Python Code Authors: Md. Azizul Hakim Bappy, Hossen A Mustafa, Prottoy Saha, Rajinus Salehat | Published: 2025-04-23 LLM性能評価トレーニング手法プロンプトリーキング 2025.04.23 2025.05.12 Literature Database
Select Me! When You Need a Tool: A Black-box Text Attack on Tool Selection Authors: Liuji Chen, Hao Gao, Jinghao Zhang, Qiang Liu, Shu Wu, Liang Wang | Published: 2025-04-07 プロンプトリーキング情報セキュリティ敵対的サンプル 2025.04.07 2025.05.12 Literature Database
Generative Large Language Model usage in Smart Contract Vulnerability Detection Authors: Peter Ince, Jiangshan Yu, Joseph K. Liu, Xiaoning Du | Published: 2025-04-07 プロンプトインジェクションプロンプトリーキング脆弱性分析 2025.04.07 2025.05.12 Literature Database