if you need more than one keyword, modify and separate by underscore _
the list of search keywords can be up to 50 characters long
if you modify the keywords, press enter within the field to confirm the new search key
Tag: backdoor
Bibliography items where occurs: 32
- A Survey of Safety and Trustworthiness of Large Language Models through the Lens of Verification and Validation / 2305.11391 / ISBN:https://doi.org/10.48550/arXiv.2305.11391 / Published by ArXiv / Version released on 2023-08-27 / on (web) Publishing site
- Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities / 2310.08565 / ISBN:https://doi.org/10.48550/arXiv.2310.08565 / Published by ArXiv / Version released on 2024-01-26 / on (web) Publishing site
- How Trustworthy are Open-Source LLMs? An Assessment under Malicious Demonstrations Shows their Vulnerabilities / 2311.09447 / ISBN:https://doi.org/10.48550/arXiv.2311.09447 / Published by ArXiv / Version released on 2024-04-02 / on (web) Publishing site
- Survey on AI Ethics: A Socio-technical Perspective / 2311.17228 / ISBN:https://doi.org/10.48550/arXiv.2311.17228 / Published by ArXiv / Version released on 2025-11-04 / on (web) Publishing site
- Trust and ethical considerations in a multi-modal, explainable AI-driven chatbot tutoring system: The case of collaboratively solving Rubik's CubeĆ / 2402.01760 / ISBN:https://doi.org/10.48550/arXiv.2402.01760 / Published by ArXiv / Version released on 2024-08-27 / on (web) Publishing site
- Mapping the Ethics of Generative AI: A Comprehensive Scoping Review / 2402.08323 / ISBN:https://doi.org/10.48550/arXiv.2402.08323 / Published by ArXiv / Version released on 2024-02-13 / on (web) Publishing site
- Review of Generative AI Methods in Cybersecurity / 2403.08701 / ISBN:https://doi.org/10.48550/arXiv.2403.08701 / Published by ArXiv / Version released on 2024-03-19 / on (web) Publishing site
- AI Alignment: A Comprehensive Survey / 2310.19852 / ISBN:https://doi.org/10.48550/arXiv.2310.19852 / Published by ArXiv / Version released on 2025-04-04 / on (web) Publishing site
- Debunking Robot Rights Metaphysically, Ethically, and Legally / 2404.10072 / ISBN:https://doi.org/10.48550/arXiv.2404.10072 / Published by ArXiv / Version released on 2024-04-15 / on (web) Publishing site
- Large Language Model Supply Chain: A Research Agenda / 2404.12736 / ISBN:https://doi.org/10.48550/arXiv.2404.12736 / Published by ArXiv / Version released on 2024-04-19 / on (web) Publishing site
- Thorns and Algorithms: Navigating Generative AI Challenges Inspired by Giraffes and Acacias / 2407.11360 / ISBN:https://doi.org/10.48550/arXiv.2407.11360 / Published by ArXiv / Version released on 2024-07.16 / on (web) Publishing site
- Honest Computing: Achieving demonstrable data lineage and provenance for driving data and process-sensitive policies / 2407.14390 / ISBN:https://doi.org/10.48550/arXiv.2407.14390 / Published by ArXiv / Version released on 2024-07-19 / on (web) Publishing site
- Do LLMs Have Political Correctness? Analyzing Ethical Biases and Jailbreak Vulnerabilities in AI Systems / 2410.13334 / ISBN:https://doi.org/10.48550/arXiv.2410.13334 / Published by ArXiv / Version released on 2024-10-23 / on (web) Publishing site
- Jailbreaking and Mitigation of Vulnerabilities in Large Language Models / 2410.15236 / ISBN:https://doi.org/10.48550/arXiv.2410.15236 / Published by ArXiv / Version released on 2025-05-08 / on (web) Publishing site
- Towards Automated Penetration Testing: Introducing LLM Benchmark, Analysis, and Improvements / 2410.17141 / ISBN:https://doi.org/10.48550/arXiv.2410.17141 / Published by ArXiv / Version released on 2025-01-30 / on (web) Publishing site
- The Cat and Mouse Game: The Ongoing Arms Race Between Diffusion Models and Detection Methods / 2410.18866 / ISBN:https://doi.org/10.48550/arXiv.2410.18866 / Published by ArXiv / Version released on 2024-10-24 / on (web) Publishing site
- AI-Augmented Ethical Hacking: A Practical Examination of Manual Exploitation and Privilege Escalation in Linux Environments / 2411.17539 / ISBN:https://doi.org/10.48550/arXiv.2411.17539 / Published by ArXiv / Version released on 2024-11-26 / on (web) Publishing site
- Autonomous Vehicle Security: A Deep Dive into Threat Modeling / 2412.15348 / ISBN:https://doi.org/10.48550/arXiv.2412.15348 / Published by ArXiv / Version released on 2024-12-19 / on (web) Publishing site
- Safety at Scale: A Comprehensive Survey of Large Model and Agent Safety / 2502.05206 / ISBN:https://doi.org/10.48550/arXiv.2502.05206 / Published by ArXiv / Version released on 2025-08-02 / on (web) Publishing site
- Multi-Agent Risks from Advanced AI / 2502.14143 / ISBN:https://doi.org/10.48550/arXiv.2502.14143 / Published by ArXiv / Version released on 2025-02-19 / on (web) Publishing site
- On the Trustworthiness of Generative Foundation Models: Guideline, Assessment, and Perspective / 2502.14296 / ISBN:https://doi.org/10.48550/arXiv.2502.14296 / Published by ArXiv / Version released on 2025-09-30 / on (web) Publishing site
- Transforming Cyber Defense: Harnessing Agentic and Frontier AI for Proactive, Ethical Threat Intelligence / 2503.00164 / ISBN:https://doi.org/10.48550/arXiv.2503.00164 / Published by ArXiv / Version released on 2025-02-28 / on (web) Publishing site
- Generative AI in Transportation Planning: A Survey / 2503.07158 / ISBN:https://doi.org/10.48550/arXiv.2503.07158 / Published by ArXiv / Version released on 2025-05-07 / on (web) Publishing site
- A Peek Behind the Curtain: Using Step-Around Prompt Engineering to Identify Bias and Misinformation in GenAI Models / 2503.15205 / ISBN:https://doi.org/10.48550/arXiv.2503.15205 / Published by ArXiv / Version released on 2025-03-19 / on (web) Publishing site
- Who Owns the Output? Bridging Law and Technology in LLMs Attribution / 2504.01032 / ISBN:https://doi.org/10.48550/arXiv.2504.01032 / Published by ArXiv / Version released on 2025-03-29 / on (web) Publishing site
- On the Surprising Efficacy of LLMs for Penetration-Testing
/ 2507.00829 / ISBN:https://doi.org/10.48550/arXiv.2507.00829 / Published by ArXiv / Version released on 2025-07-01 / on (web) Publishing site
- Model Cards Revisited: Bridging the Gap Between Theory and Practice for Ethical AI Requirements / 2507.06014 / ISBN:https://doi.org/10.48550/arXiv.2507.06014 / Published by ArXiv / Version released on 2025-07-08 / on (web) Publishing site
- Exploiting Jailbreaking Vulnerabilities in Generative AI to Bypass Ethical Safeguards for Facilitating Phishing Attacks / 2507.12185 / ISBN:https://doi.org/10.48550/arXiv.2507.12185 / Published by ArXiv / Version released on 2025-07-16 / on (web) Publishing site
- Never Compromise to Vulnerabilities: A Comprehensive Survey on AI Governance / 2508.08789 / ISBN:https://doi.org/10.48550/arXiv.2508.08789 / Published by ArXiv / Version released on 2025-08-18 / on (web) Publishing site
- Between a Rock and a Hard Place: Exploiting Ethical Reasoning to Jailbreak LLMs / 2509.05367 / ISBN:https://doi.org/10.48550/arXiv.2509.05367 / Published by ArXiv / Version released on 2025-09-12 / on (web) Publishing site
- Sovereign AI for 6G: Towards the Future of AI-Native Networks / 2509.06700 / ISBN:https://doi.org/10.48550/arXiv.2509.06700 / Published by ArXiv / Version released on 2025-09-08 / on (web) Publishing site
- The Scales of Justitia: A Comprehensive Survey on Safety Evaluation of LLMs
/ 2506.11094 / ISBN:https://doi.org/10.48550/arXiv.2506.11094 / Published by ArXiv / Version released on 2025-10-30 / on (web) Publishing site
_