VFLAIR-LLM: A Comprehensive Framework and Benchmark for Split Learning of LLMs Authors: Zixuan Gu, Qiufeng Fan, Long Sun, Yang Liu, Xiaojun Ye | Published: 2025-08-05 Prompt InjectionPrompt leakingWatermark 2025.08.05 2025.08.07 Literature Database
A Survey on Data Security in Large Language Models Authors: Kang Chen, Xiuze Zhou, Yuanguo Lin, Jinhe Su, Yuanhui Yu, Li Shen, Fan Lin | Published: 2025-08-04 Indirect Prompt InjectionPrompt leakingWatermark 2025.08.04 2025.08.06 Literature Database
SAEL: Leveraging Large Language Models with Adaptive Mixture-of-Experts for Smart Contract Vulnerability Detection Authors: Lei Yu, Shiqi Cheng, Zhirong Huang, Jingyuan Zhang, Chenjie Shen, Junyi Lu, Li Yang, Fengjun Zhang, Jiajia Ma | Published: 2025-07-30 Prompt leakingVulnerability detectionRobustness of Watermarking Techniques 2025.07.30 2025.08.01 Literature Database
Can We End the Cat-and-Mouse Game? Simulating Self-Evolving Phishing Attacks with LLMs and Genetic Algorithms Authors: Seiji Sato, Tetsushi Ohki, Masakatsu Nishigaki | Published: 2025-07-29 Prompt InjectionPrompt leaking心理学理論 2025.07.29 2025.07.31 Literature Database
Information Security Based on LLM Approaches: A Review Authors: Chang Gong, Zhongwen Li, Xiaoqi Li | Published: 2025-07-24 Network Traffic AnalysisPrompt InjectionPrompt leaking 2025.07.24 2025.07.26 Literature Database
When LLMs Copy to Think: Uncovering Copy-Guided Attacks in Reasoning LLMs Authors: Yue Li, Xiao Li, Hao Wu, Yue Zhang, Fengyuan Xu, Xiuzhen Cheng, Sheng Zhong | Published: 2025-07-22 Prompt leakingModel DoSAttack Method 2025.07.22 2025.07.24 Literature Database
LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language Models Authors: Ahmed Lekssays, Hamza Mouhcine, Khang Tran, Ting Yu, Issa Khalil | Published: 2025-07-22 Dataset AnalysisPrompt leaking脆弱性検出手法 2025.07.22 2025.07.24 Literature Database
Depth Gives a False Sense of Privacy: LLM Internal States Inversion Authors: Tian Dong, Yan Meng, Shaofeng Li, Guoxing Chen, Zhen Liu, Haojin Zhu | Published: 2025-07-22 Prompt InjectionPrompt leakingAttack Method 2025.07.22 2025.07.24 Literature Database
Talking Like a Phisher: LLM-Based Attacks on Voice Phishing Classifiers Authors: Wenhao Li, Selvakumar Manickam, Yung-wey Chong, Shankar Karuppayah | Published: 2025-07-22 Prompt leakingPsychological ManipulationAdversarial Attack Methods 2025.07.22 2025.07.24 Literature Database
Distilled Large Language Model in Confidential Computing Environment for System-on-Chip Design Authors: Dong Ben, Hui Feng, Qian Wang | Published: 2025-07-22 Prompt leakingModel Extraction AttackFactors of Performance Degradation 2025.07.22 2025.07.24 Literature Database