{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T13:24:03Z","timestamp":1768310643511,"version":"3.49.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T00:00:00Z","timestamp":1763942400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T00:00:00Z","timestamp":1763942400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72071038"],"award-info":[{"award-number":["72071038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["23ZR1445900"],"award-info":[{"award-number":["23ZR1445900"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,24]]},"DOI":"10.1109\/dsa66321.2025.00023","type":"proceedings-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:20:20Z","timestamp":1768242020000},"page":"103-110","source":"Crossref","is-referenced-by-count":0,"title":["Lights, Camera, Adversarial Action! a Study of Role-Playing Prompt Effects on LLM Attack Susceptibility"],"prefix":"10.1109","author":[{"given":"Tian","family":"Pan","sequence":"first","affiliation":[{"name":"School of Computer and Artificial Intelligence, Ludong University,Yantai,China"}]},{"given":"Mengzhen","family":"Tian","sequence":"additional","affiliation":[{"name":"School of Computer and Artificial Intelligence, Ludong University,Yantai,China"}]},{"given":"Xiao","family":"Zhao","sequence":"additional","affiliation":[{"name":"Business School, Ludong University,Yantai,China"}]},{"given":"Pan","family":"Liu","sequence":"additional","affiliation":[{"name":"Shanghai Business School,Faculty of Business Information,Shanghai,China"}]},{"given":"Yihao","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer and Artificial Intelligence, Ludong University,Yantai,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.metrad.2024.100078"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3637528.3671498"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3650983"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2023.03014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-023-06647-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3672459"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.csbj.2025.05.025"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3649921.3656991"},{"key":"ref9","article-title":"Visual-roleplay: Universal jailbreak attack on multimodal large language models via roleplaying image character[J]","author":"Ma","year":"2024","journal-title":"arxiv preprint"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3605764.3623985"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670388"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3690624.3709179"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14101907"},{"key":"ref14","article-title":"Jailbreaking chatgpt via prompt engineering: An empirical study[J]","author":"Liu","year":"2023","journal-title":"arxiv preprint"},{"key":"ref15","article-title":"Red teaming the mind of the machine: A systematic evaluation of prompt injection and jailbreak vulnerabilities in 11 ms [J]","author":"Pathade","year":"2025","journal-title":"arxiv preprint"},{"key":"ref16","article-title":"Masterkey: Automated jailbreak across multiple large language model chatbots[J]","author":"Deng","year":"2023","journal-title":"arxiv preprint"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.52202\/079017-1952"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3450388"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.143"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.emnlp-main.1200"},{"key":"ref21","first-page":"10","article-title":"RLHF: Reinforcement Learning using Human Feedback for Optimization of ChatGPT[J]","author":"Dalvi","year":"2024","journal-title":"Grenze International Journal of Engineering & Technology (GIJET)"},{"key":"ref22","article-title":"Safe rlhf: Safe reinforcement learning from human feedback[J]","author":"Dai","year":"2023","journal-title":"arxiv preprint"},{"key":"ref23","article-title":"Equilibrate rlhf: Towards balancing helpfulness-safety trade-off in large language models[J]","author":"Tan","year":"2025","journal-title":"arxiv preprint"},{"key":"ref24","article-title":"Mart: Improving llm safety with multi-round automatic red-teaming[J]","author":"Ge","year":"2023","journal-title":"arxiv preprint"},{"key":"ref25","article-title":"Mtsa: Multi-turn safety alignment for 11 ms through multi-round red-teaming[J]","author":"Guo","year":"2025","journal-title":"arxiv preprint"},{"key":"ref26","article-title":"PRM- Free Security Alignment of Large Models via Red Teaming and Adversarial Training[J]","author":"Du","year":"2025","journal-title":"arxiv preprint"},{"key":"ref27","article-title":"Harmbench: A standardized evaluation framework for automated red teaming and robust refusal[J]","author":"Mazeika","year":"2024","journal-title":"arxiv preprint"},{"key":"ref28","first-page":"24678","article-title":"Beavertails: Towards improved safety alignment of llm via a human-preference dataset[J]","volume":"36","author":"Ji","year":"2023","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref29","article-title":"From persona to personalization: A survey on role-playing language agents[J]","author":"Chen","year":"2024","journal-title":"arxiv preprint"},{"key":"ref30","article-title":"Two tales of persona in 11 ms: A survey of role-playing and personalization[J]","author":"Tseng","year":"2024","journal-title":"arxiv preprint"},{"key":"ref31","article-title":"Coser: Coordinating llmbased persona simulation of established roles[J]","author":"Wang","year":"2025","journal-title":"arxiv preprint"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2025.findings-acl.1344"},{"key":"ref33","first-page":"433","article-title":"Role-Playing Based on Large Language Models via Style Extraction[C]","volume-title":"International Conference on Neural Information Processing","author":"C"},{"key":"ref34","article-title":"Persona is a double-edged sword: Mitigating the negative impact of role-playing prompts in zero-shot reasoning tasks[J]","author":"Kim","year":"2024","journal-title":"arxiv preprint"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.88"},{"key":"ref36","article-title":"RoleBreak: Character Hallucination as a Jailbreak Attack in Role-Playing Systems[J]","author":"Tang","year":"2024","journal-title":"arxiv preprint"}],"event":{"name":"2025 12th International Conference on Dependable Systems and Their Applications (DSA)","location":"Sharjah, United Arab Emirates","start":{"date-parts":[[2025,11,24]]},"end":{"date-parts":[[2025,11,26]]}},"container-title":["2025 12th International Conference on Dependable Systems and Their Applications (DSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11320275\/11320347\/11320357.pdf?arnumber=11320357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:15:26Z","timestamp":1768292126000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11320357\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,24]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/dsa66321.2025.00023","relation":{},"subject":[],"published":{"date-parts":[[2025,11,24]]}}}