{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T03:24:39Z","timestamp":1725765879998},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,15]]},"DOI":"10.1109\/bigdata59044.2023.10386814","type":"proceedings-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T18:28:47Z","timestamp":1705948127000},"page":"2508-2517","source":"Crossref","is-referenced-by-count":1,"title":["Exploiting Large Language Models (LLMs) through Deception Techniques and Persuasion Principles"],"prefix":"10.1109","author":[{"given":"Sonali","family":"Singh","sequence":"first","affiliation":[{"name":"Texas Tech University,Department of Computing Science,USA"}]},{"given":"Faranak","family":"Abri","sequence":"additional","affiliation":[{"name":"San Jose State University,Department of Computer Science,USA"}]},{"given":"Akbar Siami","family":"Namin","sequence":"additional","affiliation":[{"name":"Texas Tech University,Department of Computer Science,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Jailbreaking chatgpt via prompt engineering: An empirical study","author":"Liu","year":"2023","journal-title":"arXiv preprint arXiv:2305.13860"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199577415.001.0001"},{"volume-title":"Influence: The Psychology of Persuasion","year":"2006","author":"Cialdini","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-07-2020-0113"},{"volume-title":"Specialized ai assistant for ethical hackers","year":"2023","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/app9050909"},{"key":"ref8","first-page":"12","article-title":"Red teaming chatgpt via jailbreaking: Bias, robustness, reliability and toxicity","author":"Zhuo","year":"2023","journal-title":"arXiv preprint arXiv:2301.12867"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.emnlp-main.225"},{"key":"ref10","article-title":"Badgpt: Exploring security vulnerabilities of chatgpt via backdoor attacks to instructgpt","author":"Shi","year":"2023","journal-title":"arXiv preprint arXiv:2304.12298"},{"key":"ref11","article-title":"Red teaming language model detectors with language models","author":"Shi","year":"2023","journal-title":"arXiv preprint arXiv:2305.19713"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.272"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4103\/crst.crst_95_23"},{"key":"ref14","article-title":"Explore, establish, exploit: Red teaming language models from scratch","author":"Casper","year":"2023","journal-title":"arXiv preprint arXiv:2306.09442"},{"key":"ref15","article-title":"Red teaming language models to reduce harms: Methods, scaling behaviors, and lessons learned","author":"Ganguli","year":"2022","journal-title":"arXiv preprint arXiv:2209.07858"},{"key":"ref16","article-title":"Smoothllm: Defending large language models against jailbreaking attacks","author":"Robey","year":"2023","journal-title":"arXiv preprint arXiv:2310.03684"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1093\/oed\/8648403980"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BigData55660.2022.10020452"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1177\/00187208211012818"},{"volume-title":"The art of deception: Controlling the human element of security","year":"2003","author":"Mitnick","key":"ref20"}],"event":{"name":"2023 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2023,12,15]]},"location":"Sorrento, Italy","end":{"date-parts":[[2023,12,18]]}},"container-title":["2023 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10385234\/10386078\/10386814.pdf?arnumber=10386814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T01:54:01Z","timestamp":1706752441000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10386814\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,15]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/bigdata59044.2023.10386814","relation":{},"subject":[],"published":{"date-parts":[[2023,12,15]]}}}