{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:06:51Z","timestamp":1737176811948,"version":"3.33.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825143","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"1678-1685","source":"Crossref","is-referenced-by-count":0,"title":["StyleRec: A Benchmark Dataset for Prompt Recovery in Writing Style Transformation"],"prefix":"10.1109","author":[{"given":"Shenyang","family":"Liu","sequence":"first","affiliation":[{"name":"University of Central Florida,Department of Computer Science"}]},{"given":"Yang","family":"Gao","sequence":"additional","affiliation":[{"name":"University of Central Florida,Department of Computer Science"}]},{"given":"Shaoyan","family":"Zhai","sequence":"additional","affiliation":[{"name":"University of Central Florida,Department of Computer Science"}]},{"given":"Liqiang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Central Florida,Department of Computer Science"}]}],"member":"263","reference":[{"journal-title":"Language model inversion","year":"2023","author":"Morris","key":"ref1"},{"journal-title":"Prompt stealing attacks against large language models","year":"2024","author":"Sha","key":"ref2"},{"journal-title":"Jailbreaking gpt-4v via self-adversarial attacks with system prompts","year":"2023","author":"Wu","key":"ref3"},{"journal-title":"Jailbreaking black box large language models in twenty queries","year":"2023","author":"Chao","key":"ref4"},{"journal-title":"Was it slander? towards exact inversion of generative language models","year":"2024","author":"Skapars","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.458"},{"journal-title":"Uncovering hidden intentions: Exploring prompt recovery for deeper insights into generated texts","year":"2024","author":"Give","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-acl.631"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICPICS62053.2024.10796809"},{"journal-title":"Jailbreaking chatgpt via prompt engineering: An empirical study","year":"2023","author":"Liu","key":"ref10"},{"key":"ref11","article-title":"Jailbroken: How does llm safety training fail?","volume":"36","author":"Wei","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"journal-title":"Jailbreaker: Automated jailbreak across multiple large language model chatbots","year":"2023","author":"Deng","key":"ref12"},{"journal-title":"Harmbench: A standardized evaluation framework for automated red teaming and robust refusal","year":"2024","author":"Mazeika","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-acl.443"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241142"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.446"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbx044"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1098\/rsif.2017.0387"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3411501.3419418"},{"journal-title":"The false promise of imitating proprietary llms","year":"2023","author":"Gudibande","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00044"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4018\/IJSPPC.325475"},{"key":"ref26","first-page":"36 571","article-title":"Are you stealing my model? sample correlation for fingerprinting deep neural networks","volume":"35","author":"Guan","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3386670"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00065"},{"journal-title":"Uncertainty estimation in autoregressive structured prediction","year":"2020","author":"Malinin","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093610"},{"key":"ref33","first-page":"24 824","article-title":"Chain-of-thought prompting elicits reasoning in large language models","volume":"35","author":"Wei","year":"2022","journal-title":"Advances in neural information processing systems"},{"journal-title":"Lora: Low-rank adaptation of large language models","year":"2021","author":"Hu","key":"ref34"},{"journal-title":"The llama 3 herd of models","year":"2024","author":"Dubey","key":"ref35"},{"journal-title":"Mistral 7b","year":"2023","author":"Jiang","key":"ref36"},{"journal-title":"Improving text embeddings with large language models","year":"2023","author":"Wang","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3115\/1073083.1073135"},{"key":"ref39","first-page":"74","article-title":"Rouge: A package for automatic evaluation of summaries","author":"Lin","year":"2004","journal-title":"Text summarization branches out"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2024,12,15]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825143.pdf?arnumber=10825143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T07:45:20Z","timestamp":1737099920000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825143\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825143","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}