{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T01:21:17Z","timestamp":1773451277241,"version":"3.50.1"},"reference-count":76,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Fusion"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.inffus.2025.103865","type":"journal-article","created":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T08:30:55Z","timestamp":1761121855000},"page":"103865","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"special_numbering":"PC","title":["LLM-Agent-UMF: LLM-based Agent Unified Modeling Framework for Seamless Design of Multi Active\/Passive Core-Agent Architectures"],"prefix":"10.1016","volume":"127","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-8915-7905","authenticated-orcid":false,"given":"Amine","family":"Ben Hassouna","sequence":"first","affiliation":[]},{"given":"Hana","family":"Chaari","sequence":"additional","affiliation":[]},{"given":"Ines","family":"Belhaj","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.inffus.2025.103865_bib0001","doi-asserted-by":"crossref","DOI":"10.1145\/3641289","article-title":"A survey on evaluation of large language models","volume":"15","author":"Chang","year":"2024","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"10.1016\/j.inffus.2025.103865_bib0002","series-title":"Proceedings of the 17th ACM Conference on Recommender Systems","first-page":"599-601","article-title":"Heterogeneous knowledge fusion: a novel approach for personalized recommendation via LLM","author":"Yin","year":"2023"},{"key":"10.1016\/j.inffus.2025.103865_bib0003","series-title":"Intelligent agents III agent theories, architectures, and languages","first-page":"21","article-title":"Is it an agent, or just a program?: a taxonomy for autonomous agents","author":"Franklin","year":"1997"},{"key":"10.1016\/j.inffus.2025.103865_bib0004","unstructured":"Z. Xi, W. Chen, X. Guo, W. He, Y. Ding, B. Hong, M. Zhang, J. Wang, S. Jin, E. Zhou, R. Zheng, X. Fan, X. Wang, L. Xiong, Y. Zhou, W. Wang, C. Jiang, Y. Zou, X. Liu, Z. Yin, S. Dou, R. Weng, W. Cheng, Q. Zhang, W. Qin, Y. Zheng, X. Qiu, X. Huang, T. Gui, The rise and potential of large language model based agents: a survey, 2023, (n.d.). 10.48550\/arXiv.2309.07864."},{"issue":"6","key":"10.1016\/j.inffus.2025.103865_bib0005","doi-asserted-by":"crossref","DOI":"10.1007\/s11704-024-40231-1","article-title":"A survey on large language model based autonomous agents","volume":"18","author":"Wang","year":"2024","journal-title":"Front. Comput. Sci."},{"key":"10.1016\/j.inffus.2025.103865_bib0006","unstructured":"A. Parisi, Y. Zhao, N. Fiedel, TALM: tool augmented language models, 2022, (n.d.). 10.48550\/arXiv.2205.12255."},{"key":"10.1016\/j.inffus.2025.103865_bib0007","unstructured":"Y. Cheng, C. Zhang, Z. Zhang, X. Meng, S. Hong, W. Li, Z. Wang, Z. Wang, F. Yin, J. Zhao, X. He, Exploring large language model based intelligent agents: definitions, methods, and prospects, 2024, (n.d.). 10.48550\/arXiv.2401.03428."},{"key":"10.1016\/j.inffus.2025.103865_sbref0005","series-title":"Advances in Neural Information Processing Systems","first-page":"43447","article-title":"Chameleon: plug-and-play compositional reasoning with large language models","volume":"36","author":"Lu","year":"2023"},{"key":"10.1016\/j.inffus.2025.103865_bib0009","unstructured":"X. Wang, Y. Chen, L. Yuan, Y. Zhang, Y. Li, H. Peng, H. Ji, Executable code actions elicit better LLM agents, 2024, (n.d.). 10.48550\/arXiv.2402.01030."},{"key":"10.1016\/j.inffus.2025.103865_bib0010","unstructured":"S. Hu, T. Huang, F. Ilhan, S. Tekin, G. Liu, R. Kompella, L. Liu, A survey on large language model-based game agents, 2024, (n.d.). 10.48550\/arXiv.2404.02039."},{"key":"10.1016\/j.inffus.2025.103865_bib0011","unstructured":"Z. Chu, Y. Wang, F. Zhu, L. Yu, L. Li, J. Gu, Professional agents \u2013 evolving large language models into autonomous experts with human-level competencies, 2024, (n.d.). 10.48550\/arXiv.2402.03628."},{"issue":"5","key":"10.1016\/j.inffus.2025.103865_bib0012","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1038\/s42256-024-00832-8","article-title":"Augmenting large language models with chemistry tools","volume":"6","author":"Bran","year":"2024","journal-title":"Nat. Mach. Intell."},{"key":"10.1016\/j.inffus.2025.103865_bib0013","unstructured":"Y. Dong, R. Mu, G. Jin, Y. Qi, J. Hu, X. Zhao, J. Meng, W. Ruan, X. Huang, Building guardrails for large language models, 2024, (n.d.). 10.48550\/arXiv.2402.01822."},{"key":"10.1016\/j.inffus.2025.103865_sbref0007","series-title":"Advances in Neural Information Processing Systems","first-page":"80079","article-title":"Jailbroken: how does LLM safety training fail?","volume":"36","author":"Wei","year":"2023"},{"key":"10.1016\/j.inffus.2025.103865_sbref0008","series-title":"Advances in Neural Information Processing Systems","first-page":"76852","article-title":"Flocks of stochastic parrots: differentially private prompt learning for large language models","volume":"36","author":"Duan","year":"2023"},{"key":"10.1016\/j.inffus.2025.103865_bib0016","unstructured":"A. Ben Hassouna, The architecture tradeoff and risk analysis framework (ATRAF): a unified approach for evaluating software architectures, reference architectures, and architectural frameworks, 2025a, (n.d.a). 10.48550\/arXiv.2505.00688."},{"key":"10.1016\/j.inffus.2025.103865_bib0017","unstructured":"A. Ben Hassouna, ATRAF-driven IMRaD methodology: tradeoff and risk analysis of software architectures across abstraction levels, 2025b, (n.d.b). 10.48550\/arXiv.2505.03624."},{"key":"10.1016\/j.inffus.2025.103865_bib0018","series-title":"Psychology of Learning and Motivation","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/S0079-7421(08)60422-3","article-title":"Human memory: a proposed system and its control processes","volume":"2","author":"Atkinson","year":"1968"},{"key":"10.1016\/j.inffus.2025.103865_bib0019","unstructured":"X. Huang, W. Liu, X. Chen, X. Wang, H. Wang, D. Lian, Y. Wang, R. Tang, E. Chen, Understanding the planning of LLM agents: a survey, 2024, (n.d.). 10.48550\/arXiv.2402.02716."},{"key":"10.1016\/j.inffus.2025.103865_bib0020","unstructured":"M. Ghallab, C. Knoblock, D. Wilkins, A. Barrett, D. Christianson, M. Friedman, C. Kwok, K. Golden, S. Penberthy, D. Smith, Y. Sun, D. Weld, PDDL - the planning domain definition language, 1998, (n.d.)."},{"key":"10.1016\/j.inffus.2025.103865_bib0021","series-title":"Proceedings of the 23rd International Conference on Evaluation and Assessment in Software Engineering","first-page":"347-352","article-title":"Applying the single responsibility principle in industry: modularity benefits and trade-offs","author":"Ampatzoglou","year":"2019"},{"key":"10.1016\/j.inffus.2025.103865_bib0022","unstructured":"Z. Zhang, X. Bo, C. Ma, R. Li, X. Chen, Q. Dai, J. Zhu, Z. Dong, J.-R. Wen, A survey on the memory mechanism of large language model based agents, 2024, (n.d.). 10.48550\/arXiv.2404.13501."},{"key":"10.1016\/j.inffus.2025.103865_bib0023","unstructured":"C. Hu, J. Fu, C. Du, S. Luo, J. Zhao, H. Zhao, ChatDB: augmenting LLMs with databases as their symbolic memory, 2023, (n.d.). 10.48550\/arXiv.2306.03901."},{"key":"10.1016\/j.inffus.2025.103865_bib0024","unstructured":"X. Zhu, Y. Chen, H. Tian, C. Tao, W. Su, C. Yang, G. Huang, B. Li, L. Lu, X. Wang, Y. Qiao, Z. Zhang, J. Dai, Ghost in the minecraft: generally capable agents for open-world environments via large language models with text-based knowledge and memory, 2023, (n.d.). 10.48550\/arXiv.2305.17144."},{"key":"10.1016\/j.inffus.2025.103865_bib0025","unstructured":"Proposal for a regulation laying down harmonised rules on artificial intelligence (artificial intelligence act), 2021, (EUR-Lex, COM(2021) 206 final). Article 15: Accuracy, Robustness and Cybersecurityhttps:\/\/artificialintelligenceact.eu\/article\/15\/."},{"key":"10.1016\/j.inffus.2025.103865_bib0026","unstructured":"Information technology\u2013artificial intelligence\u2013artificial intelligence concepts and terminology, ISO\/IEC2022, 22989. https:\/\/www.iso.org\/obp\/ui\/en\/#iso:std:iso-iec:22989:ed-1:v1:en."},{"key":"10.1016\/j.inffus.2025.103865_bib0027","series-title":"2023 IEEE International Conference on Electro Information Technology (eIT)","first-page":"1","article-title":"ChatGPT: a threat against the CIA triad of cyber security","author":"Chowdhury","year":"2023"},{"key":"10.1016\/j.inffus.2025.103865_bib0028","doi-asserted-by":"crossref","unstructured":"Y. Dong, R. Mu, Y. Zhang, S. Sun, T. Zhang, C. Wu, G. Jin, Y. Qi, J. Hu, J. Meng, S. Bensalem, X. Huang, Safeguarding large language models: a survey, 2024, (n.d.). 10.48550\/arXiv.2406.02622.","DOI":"10.1007\/s10462-025-11389-2"},{"key":"10.1016\/j.inffus.2025.103865_bib0029","series-title":"Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing: System Demonstrations","first-page":"431","article-title":"NeMo guardrails: a toolkit for controllable and safe LLM applications with programmable rails","author":"Rebedea","year":"2023"},{"issue":"6","key":"10.1016\/j.inffus.2025.103865_bib0030","first-page":"655","article-title":"The role of scientific terminology in research and teaching: is something important missing?","volume":"34","author":"Slisko","year":"1997","journal-title":"J. Res. Sci. Teach. Off. J. Natl. Assoc. Res. Sci. Teach."},{"key":"10.1016\/j.inffus.2025.103865_bib0031","series-title":"Advanced Information Systems Engineering","first-page":"409","article-title":"On the semantics of the extend relationship in use case models: open-closed principle or clairvoyance?","author":"Laguna","year":"2010"},{"key":"10.1016\/j.inffus.2025.103865_bib0032","series-title":"Security and Trust Requirements Engineering","first-page":"237","author":"Giorgini","year":"2005"},{"key":"10.1016\/j.inffus.2025.103865_sbref0016","article-title":"Shielding software systems: a comparison of security by design and privacy by design based on a systematic literature review","volume":"52","author":"Del-Real","year":"2024","journal-title":"Comput. Law Secur. Rev."},{"issue":"01","key":"10.1016\/j.inffus.2025.103865_bib0034","doi-asserted-by":"crossref","first-page":"1233","DOI":"10.30574\/wjarr.2025.26.1.0538","article-title":"Integrating privacy by design (PbD) in the system development life cycle for enhanced data protection","volume":"26","author":"Obiokafor","year":"2025","journal-title":"World J. Adv. Res. Rev."},{"key":"10.1016\/j.inffus.2025.103865_bib0035","doi-asserted-by":"crossref","unstructured":"Y. He, E. Wang, Y. Rong, Z. Cheng, H. Chen, Security of AI agents, 2024, (n.d.). 10.48550\/arXiv.2406.08689.","DOI":"10.1109\/RAIE66699.2025.00013"},{"key":"10.1016\/j.inffus.2025.103865_sbref0018","series-title":"NeurIPS\u201923 Workshop on Generative AI for Education (GAIED)","article-title":"Generative agent for teacher training: designing educational problem-solving simulations with large language model-based agents for pre-service teachers","author":"Lee","year":"2023"},{"key":"10.1016\/j.inffus.2025.103865_bib0037","series-title":"Proceedings of the 15th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management - KMIS","first-page":"85","article-title":"A taxonomy for autonomous LLM-powered multi-agent architectures","author":"H\u00e4ndler","year":"2023"},{"key":"10.1016\/j.inffus.2025.103865_sbref0020","series-title":"Advances in Neural Information Processing Systems","first-page":"68539","article-title":"Toolformer: language models can teach themselves to use tools","volume":"36","author":"Schick","year":"2023"},{"key":"10.1016\/j.inffus.2025.103865_bib0039","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"18030","article-title":"Confucius: iterative tool learning from introspection feedback by easy-to-difficult curriculum","volume":"38","author":"Gao","year":"2024"},{"key":"10.1016\/j.inffus.2025.103865_bib0040","unstructured":"Q. Tang, Z. Deng, H. Lin, X. Han, Q. Liang, B. Cao, L. Sun, ToolAlpaca: generalized tool learning for language models with 3000 simulated cases, 2023, (n.d.). 10.48550\/arXiv.2306.05301."},{"key":"10.1016\/j.inffus.2025.103865_bib0041","unstructured":"S.G. Patil, T. Zhang, X. Wang, J.E. Gonzalez, Gorilla: large language model connected with massive APIs, 2023, (n.d.). 10.48550\/arXiv.2305.15334."},{"key":"10.1016\/j.inffus.2025.103865_bib0042","unstructured":"Y. Qin, S. Liang, Y. Ye, K. Zhu, L. Yan, Y. Lu, Y. Lin, X. Cong, X. Tang, B. Qian, S. Zhao, L. Hong, R. Tian, R. Xie, J. Zhou, M. Gerstein, D. Li, Z. Liu, M. Sun, ToolLLM: facilitating large language models to master 16000+ real-world APIs, 2023, (n.d.). 10.48550\/arXiv.2307.16789."},{"key":"10.1016\/j.inffus.2025.103865_sbref0022","series-title":"Advances in Neural Information Processing Systems","first-page":"71995","article-title":"GPT4Tools: teaching large language model to use tools via self-instruction","volume":"36","author":"Yang","year":"2023"},{"key":"10.1016\/j.inffus.2025.103865_bib0044","unstructured":"B. Liu, Y. Jiang, X. Zhang, Q. Liu, S. Zhang, J. Biswas, P. Stone, LLM+P: empowering large language models with optimal planning proficiency, 2023, (n.d.). 10.48550\/arXiv.2304.11477."},{"key":"10.1016\/j.inffus.2025.103865_bib0045","unstructured":"X. Dong, D. Lin, S. Wang, A.E. Hassan, A framework for real-time safeguarding the text generation of large language model, 2024, (n.d.). 10.48550\/arXiv.2404.19048."},{"key":"10.1016\/j.inffus.2025.103865_sbref0023","series-title":"Findings of the Association for Computational Linguistics ACL 2024","first-page":"3406","article-title":"DARA: decomposition-alignment-reasoning autonomous language agent for question answering over knowledge graphs","author":"Fang","year":"2024"},{"key":"10.1016\/j.inffus.2025.103865_sbref0024","series-title":"Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)","first-page":"1173","article-title":"Navigate through enigmatic labyrinth a survey of chain of thought reasoning: advances, frontiers and future","author":"Chu","year":"2024"},{"key":"10.1016\/j.inffus.2025.103865_bib0048","doi-asserted-by":"crossref","unstructured":"M. Besta, F. Memedi, Z. Zhang, R. Gerstenberger, G. Piao, N. Blach, P. Nyczyk, M. Copik, G. Kwa\u015bniewski, J. M\u00c3\u00bcller, L. Gianinazzi, A. Kubicek, H. Niewiadomski, A. O\u2019Mahony, O. Mutlu, T. Hoefler, Demystifying chains, trees, and graphs of thoughts, 2024, (n.d.). 10.48550\/arXiv.2401.14295.","DOI":"10.1109\/TPAMI.2025.3598182"},{"issue":"17","key":"10.1016\/j.inffus.2025.103865_bib0049","doi-asserted-by":"crossref","first-page":"19724","DOI":"10.1609\/aaai.v38i17.29946","article-title":"MemoryBank: enhancing large language models with long-term memory","volume":"38","author":"Zhong","year":"2024","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"issue":"2","key":"10.1016\/j.inffus.2025.103865_bib0050","doi-asserted-by":"crossref","DOI":"10.3390\/info15020092","article-title":"Do large language models show human-like biases? Exploring confidence-competence gap in AI","volume":"15","author":"Singh","year":"2024","journal-title":"Information"},{"key":"10.1016\/j.inffus.2025.103865_sbref0027","doi-asserted-by":"crossref","first-page":"92","DOI":"10.3390\/info15020092","article-title":"Do large language models show human-like biases? Exploring confidence - competence gap in AI","volume":"15","author":"Singh","year":"2024","journal-title":"Information"},{"issue":"3","key":"10.1016\/j.inffus.2025.103865_bib0052","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1017\/pan.2023.2","article-title":"Out of one, many: using language models to simulate human samples","volume":"31","author":"Argyle","year":"2023","journal-title":"Polit. Anal."},{"key":"10.1016\/j.inffus.2025.103865_bib0053","unstructured":"L. Xu, H. Xie, S.-Z. J. Qin, X. Tao, F.L. Wang, Parameter-efficient fine-tuning methods for pretrained language models: a critical review and assessment, 2023, (n.d.). 10.48550\/arXiv.2312.12148."},{"key":"10.1016\/j.inffus.2025.103865_sbref0029","series-title":"Advances in Neural Information Processing Systems","first-page":"38154","article-title":"HuggingGPT: solving AI tasks with ChatGPT and its friends in hugging face","volume":"36","author":"Shen","year":"2023"},{"key":"10.1016\/j.inffus.2025.103865_bib0055","unstructured":"P. Lewis, E. Perez, A. Piktus, F. Petroni, V. Karpukhin, N. Goyal, H. K\u00c3\u00bcttler, M. Lewis, W.-t. Yih, T. Rockt\u00c3\u00a4schel, S. Riedel, D. Kiela, Retrieval-augmented generation for knowledge-intensive NLP tasks, 2021, (n.d.). 10.48550\/arXiv.2005.11401."},{"key":"10.1016\/j.inffus.2025.103865_sbref0030","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2024.102472","article-title":"Explainable AI-driven IoMT fusion: unravelling techniques, opportunities, and challenges with explainable AI in healthcare","volume":"110","author":"Wani","year":"2024","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.inffus.2025.103865_sbref0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2024.102412","article-title":"Designing interpretable ML system to enhance trust in healthcare: a systematic review to proposed responsible clinician-AI-collaboration framework","volume":"108","author":"Nasarian","year":"2024","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.inffus.2025.103865_bib0058","unstructured":"Y. Gao, Y. Xiong, X. Gao, K. Jia, J. Pan, Y. Bi, Y. Dai, J. Sun, M. Wang, H. Wang, Retrieval-augmented generation for large language models: a survey, 2024, (n.d.). 10.48550\/arXiv.2312.10997."},{"key":"10.1016\/j.inffus.2025.103865_bib0059","unstructured":"J. Liu, LlamaIndex, 2022, (n.d.). [Accessed: August 26, 2024], https:\/\/github.com\/jerryjliu\/llama_index."},{"key":"10.1016\/j.inffus.2025.103865_bib0060","unstructured":"S. Yao, J. Zhao, D. Yu, N. Du, I. Shafran, K. Narasimhan, Y. Cao, ReAct: synergizing reasoning and acting in language models, 2023, (n.d.). 10.48550\/arXiv.2210.03629."},{"key":"10.1016\/j.inffus.2025.103865_sbref0032","article-title":"Connecting the dots in trustworthy artificial intelligence: from AI principles, ethics, and key requirements to responsible AI systems and regulation","volume":"99","author":"D\u00c3\u00adaz-Rodr\u00c3\u00adguez","year":"2023","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.inffus.2025.103865_bib0062","series-title":"Findings of the Association for Computational Linguistics: EMNLP 2020","first-page":"3356","article-title":"RealToxicityPrompts: evaluating neural toxic degeneration in language models","author":"Gehman","year":"2020"},{"key":"10.1016\/j.inffus.2025.103865_bib0063","unstructured":"I.J. Goodfellow, J. Shlens, C. Szegedy, Explaining and harnessing adversarial examples, 2015, (n.d.). 10.48550\/arXiv.1412.6572."},{"key":"10.1016\/j.inffus.2025.103865_bib0064","unstructured":"Y. Liu, G. Deng, Y. Li, K. Wang, Z. Wang, X. Wang, T. Zhang, Y. Liu, H. Wang, Y. Zheng, Y. Liu, Prompt injection attack against LLM-integrated applications, 2024, (n.d.). 10.48550\/arXiv.2306.05499."},{"key":"10.1016\/j.inffus.2025.103865_bib0065","unstructured":"S. Zhu, R. Zhang, B. An, G. Wu, J. Barrow, Z. Wang, F. Huang, A. Nenkova, T. Sun, AutoDAN: interpretable gradient-based adversarial attacks on large language models, 2023, (n.d.). 10.48550\/arXiv.2310.15140."},{"key":"10.1016\/j.inffus.2025.103865_bib0066","unstructured":"H. Li, Y. Chen, J. Luo, Y. Kang, X. Zhang, Q. Hu, C. Chan, Y. Song, Privacy in large language models: attacks, defenses and future directions, 2023, (n.d.). 10.48550\/arXiv.2310.10383."},{"key":"10.1016\/j.inffus.2025.103865_bib0067","unstructured":"J. Kirchenbauer, J. Geiping, Y. Wen, J. Katz, I. Miers, T. Goldstein, A watermark for large language models, 2024, (n.d.). 10.48550\/arXiv.2301.10226."},{"key":"10.1016\/j.inffus.2025.103865_bib0068","unstructured":"M.-I. Nicolae, M. Sinn, M.N. Tran, B. Buesser, A. Rawat, M. Wistuba, V. Zantedeschi, N. Baracaldo, B. Chen, H. Ludwig, I.M. Molloy, B. Edwards, Adversarial robustness toolbox v1.0.0, 2019, (n.d.). 10.48550\/arXiv.1807.01069."},{"key":"10.1016\/j.inffus.2025.103865_bib0069","unstructured":"A. Dubey, A. Jauhri, A. Pandey, A. Kadian, A. Al-Dahle, A. Letman, et al., The Llama 3 herd of models, 2024, (n.d.). 10.48550\/arXiv.2407.21783."},{"issue":"1","key":"10.1016\/j.inffus.2025.103865_bib0070","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/TSMC.2019.2895471","article-title":"Performance analysis of the raft consensus algorithm for private blockchains","volume":"50","author":"Huang","year":"2020","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"10.1016\/j.inffus.2025.103865_sbref0035","series-title":"2014 USENIX Annual Technical Conference (USENIX ATC 14)","first-page":"305","article-title":"In search of an understandable consensus algorithm","author":"Ongaro","year":"2014"},{"key":"10.1016\/j.inffus.2025.103865_bib0072","unstructured":"T.B. Richards, AutoGPT, n.d., (n.d.). [Accessed: September 26, 2024], https:\/\/github.com\/Significant-Gravitas\/AutoGPT."},{"key":"10.1016\/j.inffus.2025.103865_bib0073","series-title":"Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology","article-title":"Generative agents: interactive simulacra of human behavior","author":"Park","year":"2023"},{"key":"10.1016\/j.inffus.2025.103865_bib0074","unstructured":"Y. Li, H. Wen, W. Wang, X. Li, Y. Yuan, G. Liu, J. Liu, W. Xu, X. Wang, Y. Sun, R. Kong, Y. Wang, H. Geng, J. Luan, X. Jin, Z. Ye, G. Xiong, F. Zhang, X. Li, M. Xu, Z. Li, P. Li, Y. Liu, Y.-Q. Zhang, Y. Liu, Personal LLM agents: insights and survey about the capability, efficiency and security, 2024, (n.d.). 10.48550\/arXiv.2401.05459."},{"key":"10.1016\/j.inffus.2025.103865_bib0075","series-title":"Proceedings of the 6th International Conference on Learning Representations - ICLR 2018 Conference","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2018"},{"key":"10.1016\/j.inffus.2025.103865_bib0076","unstructured":"I.B.M. Corporation, IBM privacy statement, n.d., (n.d.). [Accessed: September 26, 2024], https:\/\/www.ibm.com\/us-en\/privacy."}],"container-title":["Information Fusion"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1566253525009273?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1566253525009273?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T04:33:59Z","timestamp":1763872439000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1566253525009273"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":76,"alternative-id":["S1566253525009273"],"URL":"https:\/\/doi.org\/10.1016\/j.inffus.2025.103865","relation":{},"ISSN":["1566-2535"],"issn-type":[{"value":"1566-2535","type":"print"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"LLM-Agent-UMF: LLM-based Agent Unified Modeling Framework for Seamless Design of Multi Active\/Passive Core-Agent Architectures","name":"articletitle","label":"Article Title"},{"value":"Information Fusion","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.inffus.2025.103865","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"103865"}}