Qi Li

Papers in Database (3)

defense arXiv Mar 24, 2026 · 13d ago

Chain-of-Authorization: Internalizing Authorization into Large Language Models via Reasoning Trajectories

Yang Li, Yule Liu, Xinlei He et al. · Tsinghua University · The Hong Kong University of Science and Technology +1 more

Fine-tunes LLMs to generate explicit authorization reasoning chains before responses, defending against unauthorized access and prompt injection

Prompt Injection Sensitive Information Disclosure nlp
PDF
attack arXiv Jan 7, 2026 · 12w ago

SearchAttack: Red-Teaming LLMs against Knowledge-to-Action Threats under Online Web Search

Yu Yan, Sheng Sun, Mingfeng Li et al. · Institute of Computing Technology · University of Chinese Academy of Sciences +4 more

Red-teams search-augmented LLMs via indirect prompt injection through web search to elicit harmful knowledge-to-action outputs

Prompt Injection nlp
PDF
survey arXiv Mar 12, 2026 · 25d ago

Taming OpenClaw: Security Analysis and Mitigation of Autonomous LLM Agent Threats

Xinhao Deng, Yixiang Zhang, Jiaqing Wu et al. · Ant Group · Tsinghua University

Proposes five-layer lifecycle security framework for autonomous LLM agents, analyzing prompt injection, supply chain, memory poisoning, and intent drift threats

Prompt Injection Insecure Plugin Design Excessive Agency nlp
PDF