Prompt leaking

Enterprise AI Must Enforce Participant-Aware Access Control

Authors: Shashank Shreedhar Bhatt, Tanmay Rajore, Khushboo Aggarwal, Ganesh Ananthanarayanan, Ranveer Chandra, Nishanth Chandran, Suyash Choudhury, Divya Gupta, Emre Kiciman, Sumit Kumar Pandey, Srinath Setty, Rahul Sharma, Teijia Zhao | Published: 2025-09-18
Security Analysis
Privacy Management
Prompt leaking

Yet Another Watermark for Large Language Models

Authors: Siyuan Bao, Ying Shi, Zhiguang Yang, Hanzhou Wu, Xinpeng Zhang | Published: 2025-09-16
Prompt leaking
Large Language Model
Watermarking Technology

PromptCOS: Towards System Prompt Copyright Auditing for LLMs via Content-level Output Similarity

Authors: Yuchen Yang, Yiming Li, Hongwei Yao, Enhao Huang, Shuo Shao, Bingrun Yang, Zhibo Wang, Dacheng Tao, Zhan Qin | Published: 2025-09-03
Prompt validation
Prompt leaking
Model Extraction Attack

The Double-edged Sword of LLM-based Data Reconstruction: Understanding and Mitigating Contextual Vulnerability in Word-level Differential Privacy Text Sanitization

Authors: Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes | Published: 2025-08-26
Prompt leaking
Differential Privacy
文書プライバシー

Membership Inference Attacks on LLM-based Recommender Systems

Authors: Jiajie He, Yuechun Gu, Min-Chun Chen, Keke Chen | Published: 2025-08-26
Privacy Design Principles
Prompt leaking
Membership Inference

VFLAIR-LLM: A Comprehensive Framework and Benchmark for Split Learning of LLMs

Authors: Zixuan Gu, Qiufeng Fan, Long Sun, Yang Liu, Xiaojun Ye | Published: 2025-08-05
Prompt Injection
Prompt leaking
Watermark

A Survey on Data Security in Large Language Models

Authors: Kang Chen, Xiuze Zhou, Yuanguo Lin, Jinhe Su, Yuanhui Yu, Li Shen, Fan Lin | Published: 2025-08-04
Indirect Prompt Injection
Prompt leaking
Watermark

SAEL: Leveraging Large Language Models with Adaptive Mixture-of-Experts for Smart Contract Vulnerability Detection

Authors: Lei Yu, Shiqi Cheng, Zhirong Huang, Jingyuan Zhang, Chenjie Shen, Junyi Lu, Li Yang, Fengjun Zhang, Jiajia Ma | Published: 2025-07-30
Prompt leaking
Vulnerability detection
Robustness of Watermarking Techniques

Can We End the Cat-and-Mouse Game? Simulating Self-Evolving Phishing Attacks with LLMs and Genetic Algorithms

Authors: Seiji Sato, Tetsushi Ohki, Masakatsu Nishigaki | Published: 2025-07-29
Prompt Injection
Prompt leaking
心理学理論

Information Security Based on LLM Approaches: A Review

Authors: Chang Gong, Zhongwen Li, Xiaoqi Li | Published: 2025-07-24
Network Traffic Analysis
Prompt Injection
Prompt leaking