{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:55:14Z","timestamp":1771959314187,"version":"3.50.1"},"reference-count":78,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T00:00:00Z","timestamp":1744675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T00:00:00Z","timestamp":1744675200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T00:00:00Z","timestamp":1744675200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202320"],"award-info":[{"award-number":["62202320"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62402331"],"award-info":[{"award-number":["62402331"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018542","name":"Natural Science Foundation of Sichuan Province","doi-asserted-by":"publisher","award":["2024NSFSC1449"],"award-info":[{"award-number":["2024NSFSC1449"]}],"id":[{"id":"10.13039\/501100018542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["SCU2024D012"],"award-info":[{"award-number":["SCU2024D012"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["YJ202429"],"award-info":[{"award-number":["YJ202429"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Engineering Connotation Development Project of Sichuan University","award":["2020SCUNG129"],"award-info":[{"award-number":["2020SCUNG129"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,4,15]]},"DOI":"10.1109\/jiot.2025.3525741","type":"journal-article","created":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T14:35:01Z","timestamp":1735914901000},"page":"9420-9434","source":"Crossref","is-referenced-by-count":4,"title":["Decomposition, Synthesis, and Attack: A Multi-Instruction Fusion Method for Jailbreaking LLMs"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4711-4112","authenticated-orcid":false,"given":"Shuyu","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8705-2617","authenticated-orcid":false,"given":"Xingshu","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8766-0936","authenticated-orcid":false,"given":"Kaiyu","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4777-0049","authenticated-orcid":false,"given":"Liangguo","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7909-3753","authenticated-orcid":false,"given":"Hao","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3112-4861","authenticated-orcid":false,"given":"Rui","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3661167.3661202"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599246"},{"key":"ref3","article-title":"LLM4Drive: A survey of large language models for autonomous driving","author":"Yang","year":"2023","journal-title":"arXiv:2311.01043"},{"key":"ref4","first-page":"27730","article-title":"Training language models to follow instructions with human feedback","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Ouyang"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-acl.443"},{"key":"ref6","first-page":"1","article-title":"Jailbroken: How does LLM safety training fail?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"36","author":"Wei"},{"key":"ref7","article-title":"Jailbreaking black box large language models in twenty queries","author":"Chao","year":"2023","journal-title":"arXiv:2310.08419"},{"key":"ref8","article-title":"Deepinception: Hypnotize large language model to be jailbreaker","author":"Li","year":"2023","journal-title":"arXiv:2311.03191"},{"key":"ref9","article-title":"Prompt packer: Deceiving LLMS through compositional instruction with hidden attacks","author":"Jiang","year":"2023","journal-title":"arXiv:2310.10077"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10448041"},{"key":"ref11","first-page":"4657","article-title":"LLM-Fuzzer: Scaling assessment of large language model jailbreaks","volume-title":"Proc. 33rd USENIX Security Symp. (USENIX Security)","author":"Yu"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SPW63631.2024.00018"},{"key":"ref13","article-title":"LoRa: Low-rank adaptation of large language models","author":"Hu","year":"2021","journal-title":"arXiv:2106.09685"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i7.28597"},{"key":"ref15","article-title":"Aerial visionand- language navigation via semantic-topo-metric representation guided LLM reasoning","author":"Gao","year":"2024","journal-title":"arXiv:2410.08500"},{"key":"ref16","article-title":"NavAgent: Multiscale urban street view fusion for UAV embodied vision-and-language navigation","author":"Liu","year":"2024","journal-title":"arXiv:2411.08579"},{"key":"ref17","article-title":"AeroVerse: UAV-agent benchmark suite for simulating, pretraining, finetuning, and evaluating aerospace embodied world models","author":"Yao","year":"2024","journal-title":"arXiv:2408.15511"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.36227\/techrxiv.172954477.70259514\/v1","article-title":"Multi-agent formation control using large language models","author":"Liu","year":"2024"},{"key":"ref19","first-page":"920","article-title":"A safer visionbased autonomous planning system for quadrotor UAVs with dynamic obstacle trajectory prediction and its application with LLMs","volume-title":"Proc. IEEE\/CVF Winter Conf. Appl. Comput. Vis. Workshops (WACVW)","author":"Zhong"},{"key":"ref20","article-title":"Agent as cerebrum, controller as cerebellum: Implementing an embodied LMM-based agent on drones","author":"Zhao","year":"2023","journal-title":"arXiv:2311.15033"},{"key":"ref21","first-page":"1","article-title":"Swarm-GPT: Combining large language models with safe motion planning for robot choreography design","volume-title":"Proc. Workshop Robot Learn. Pretraining, Fine-Tuning, Generalization Large Scale Models (NeurIPS)","author":"Jiao"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR-Adjunct64951.2024.00141"},{"key":"ref23","article-title":"Integrating large language models for UAV control in simulated environments: A modular interaction approach","author":"Phadke","year":"2024","journal-title":"arXiv:2410.17602"},{"key":"ref24","article-title":"Toward realistic UAV vision-language navigation: Platform, benchmark, and methodology","author":"Wang","year":"2024","journal-title":"arXiv:2410.07087"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN61024.2024.00033"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCA62789.2024.10591846"},{"key":"ref27","article-title":"Large language model based multi-objective optimization for integrated sensing and communications in UAV networks","author":"Li","year":"2024","journal-title":"arXiv:2410.05062"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.36227\/techrxiv.172833400.07230719\/v1","article-title":"Multi-UAV placement for integrated access and backhauling using LLM-driven optimization","author":"Wang","year":"2024"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3511662"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/drones7020114"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3583740.3626809"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.acl-long.812"},{"key":"ref33","article-title":"GPT-4V(ision) system card","year":"2022"},{"key":"ref34","article-title":"Llama 2: Open foundation and fine-tuned chat models","author":"Touvron","year":"2023","journal-title":"arXiv:2307.09288"},{"key":"ref35","article-title":"GPT-4o: Advancing cost-efficient intelligence","year":"2024"},{"key":"ref36","article-title":"Vicuna: An open-source chatbot impressing GPT-4 with 90%* ChatGPT quality","author":"Chiang","year":"2023"},{"key":"ref37","first-page":"1","article-title":"Real-time integration of fine-tuned large language model for improved decisionmaking in reinforcement learning","volume-title":"Proc. Int. Joint Conf. Neural Netw. (IJCNN)","author":"Xiang"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.26"},{"key":"ref39","article-title":"GPT-3.5 turbo","year":"2022"},{"key":"ref40","article-title":"GPT-4 technical report","volume-title":"arXiv:2303.08774","year":"2023"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-73247-8_13"},{"key":"ref42","first-page":"1","article-title":"MiniGPT-4: Enhancing vision-language understanding with advanced large language models","volume-title":"Proc. 12th Int. Conf. Learn. Represent.","author":"Zhu"},{"key":"ref43","article-title":"ChatGPT","year":"2024"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670388"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.naacl-long.375"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24188"},{"key":"ref47","article-title":"Tree of attacks: Jailbreaking black-box LLMs automatically","author":"Mehrotra","year":"2023","journal-title":"arXiv:2312.02119"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.naacl-long.107"},{"key":"ref49","first-page":"1","article-title":"GPT-4 is too smart to be safe: Stealthy chat with LLMs via cipher","volume-title":"Proc. 12th Int. Conf. Learn. Represent.","author":"Yuan"},{"key":"ref50","article-title":"CodeChameleon: Personalized encryption framework for jailbreaking large language models","author":"Lv","year":"2024","journal-title":"arXiv:2402.16717"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.naacl-long.118"},{"key":"ref52","article-title":"Jailbreak and guard aligned language models with only few in-context demonstrations","author":"Wei","year":"2023","journal-title":"arXiv:2310.06387"},{"key":"ref53","first-page":"1","article-title":"Multilingual jailbreak challenges in large language models","volume-title":"Proc. 12th Int. Conf. Learn. Represent.","author":"Deng"},{"key":"ref54","article-title":"Latent jailbreak: A benchmark for evaluating text safety and output robustness of large language models","author":"Qiu","year":"2023","journal-title":"arXiv:2307.08487"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.272"},{"key":"ref56","article-title":"Red-teaming large language models using chain of utterances for safety-alignment","author":"Bhardwaj","year":"2023","journal-title":"arXiv:2308.09662"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/BigData59044.2023.10386814"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.302"},{"key":"ref59","article-title":"Ignore previous prompt: Attack techniques for language models","author":"Perez","year":"2022","journal-title":"arXiv:2211.09527"},{"key":"ref60","article-title":"Universal and transferable adversarial attacks on aligned language models","author":"Zou","year":"2023","journal-title":"arXiv:2307.15043"},{"key":"ref61","first-page":"1","article-title":"AutoDAN: Interpretable gradient-based adversarial attacks on large language models","volume-title":"Proc. 1st Conf. Lang. Model.","author":"Zhu"},{"key":"ref62","article-title":"DeceptPrompt: Exploiting LLM-driven code generation via adversarial natural language instructions","author":"Wu","year":"2023","journal-title":"arXiv:2312.04730"},{"key":"ref63","first-page":"1","article-title":"AutoDAN: Generating stealthy jailbreak prompts on aligned large language models","volume-title":"Proc. 12th Int. Conf. Learn. Represent.","author":"Liu"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-acl.304"},{"key":"ref65","article-title":"The Llama 3 herd of models","author":"Dubey","year":"2024","journal-title":"arXiv:2407.21783"},{"key":"ref66","first-page":"1","article-title":"JailbreakBench: An open robustness benchmark for jailbreaking large language models","volume-title":"Proc. NeurIPS Datasets Benchmarks Track","author":"Chao"},{"key":"ref67","first-page":"1","article-title":"TDC 2023 (LLM edition): The trojan detection challenge","volume-title":"Proc. NeurIPS Competition Track","author":"Mazeika"},{"key":"ref68","article-title":"HarmBench: A Standardized evaluation framework for automated red teaming and robust refusal","author":"Mazeika","year":"2024","journal-title":"arXiv:2402.04249"},{"key":"ref69","article-title":"Qwen2 technical report","volume-title":"arXiv:2407.10671","author":"Yang","year":"2024"},{"key":"ref70","article-title":"JailbreakEval: An integrated toolkit for evaluating jailbreak attempts against large language models","author":"Ran","year":"2024","journal-title":"arXiv:2406.09321"},{"key":"ref71","article-title":"Open sesame! Universal black box jailbreaking of large language models","author":"Lapid","year":"2023","journal-title":"arXiv:2309.01446"},{"key":"ref72","article-title":"The instruction hierarchy: Training LLMs to prioritize privileged instructions","author":"Wallace","year":"2024","journal-title":"arXiv:2404.13208"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.2307\/2279372"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/117773194"},{"key":"ref75","volume-title":"Distribution-Free Multiple Comparisons","author":"Nemenyi","year":"1963"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2023.3309709"},{"key":"ref77","article-title":"ChatGPT for robotics: Design principles and model abilities","author":"Vemprala","year":"2023"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67361-5_40"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10957755\/10824840.pdf?arnumber=10824840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T18:41:38Z","timestamp":1762368098000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10824840\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,15]]},"references-count":78,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3525741","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,15]]}}}