{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:54:34Z","timestamp":1766159674944,"version":"3.44.0"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Hong Kong Research Grants Council","award":["AoE\/E-603\/18"],"award-info":[{"award-number":["AoE\/E-603\/18"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Visual. Comput. Graphics"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/tvcg.2025.3557568","type":"journal-article","created":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T13:58:55Z","timestamp":1744379935000},"page":"7923-7937","source":"Crossref","is-referenced-by-count":2,"title":["JailbreakHunter: A Visual Analytics Approach for Jailbreak Prompts Discovery From Large-Scale Human-LLM Conversational Datasets"],"prefix":"10.1109","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7047-7988","authenticated-orcid":false,"given":"Zhihua","family":"Jin","sequence":"first","affiliation":[{"name":"Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0174-0952","authenticated-orcid":false,"given":"Shiyi","family":"Liu","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9547-3449","authenticated-orcid":false,"given":"Haotian","family":"Li","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong"}]},{"given":"Xun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Shanghai AI Laboratory, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3344-9694","authenticated-orcid":false,"given":"Huamin","family":"Qu","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong"}]}],"member":"263","reference":[{"key":"ref1","first-page":"27730","article-title":"Training language models to follow instructions with human feedback","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Ouyang"},{"article-title":"GPT-4 technical report","year":"2023","author":"Achiam","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-acl.772"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-024-03423-7"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.966"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.metrad.2023.100022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26752"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-023-00289-2"},{"article-title":"Training a helpful and harmless assistant with reinforcement learning from human feedback","year":"2022","author":"Bai","key":"ref9"},{"article-title":"Improving alignment of dialogue agents via targeted human judgements","year":"2022","author":"Glaese","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.234"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.woah-1.15"},{"year":"2024","key":"ref14","article-title":"Moderation - OpenAI API"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.272"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179300"},{"article-title":"Jailbreaking ChatGPT via prompt engineering: An empirical study","year":"2023","author":"Liu","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670388"},{"article-title":"Red teaming language models to reduce harms: Methods, scaling behaviors, and lessons learned","year":"2022","author":"Ganguli","key":"ref19"},{"article-title":"LMSYS-chat-1 M: A large-scale real-world LLM conversation dataset","year":"2023","author":"Zheng","key":"ref20"},{"key":"ref21","first-page":"1","article-title":"Catastrophic jailbreak of open-source LLMs via exploiting generation","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Huang"},{"key":"ref22","first-page":"80079","article-title":"Jailbroken: How does LLM safety training fail?","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Wei"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/spw63631.2024.00018"},{"key":"ref24","first-page":"1","article-title":"Ignore previous prompt: Attack techniques for language models","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst. Workshop, ML Saf. Workshop","author":"Perez"},{"key":"ref25","first-page":"1","article-title":"GPT-4 is too smart to be safe: Stealthy chat with LLMs via cipher","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Yuan"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.143"},{"article-title":"Universal and transferable adversarial attacks on aligned language models","year":"2023","author":"Zou","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/satml64287.2025.00010"},{"article-title":"Tricking LLMs into disobedience: Understanding, analyzing, and preventing jailbreaks","year":"2023","author":"Rao","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.302"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-demo.50"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2744158"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2017.8585721"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2865044"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-3007"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-demos.22"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/VISUAL.2019.8933677"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.3028976"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.14541"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2023.3327163"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376451"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2022.3184186"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2023.3236380"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2022.3209479"},{"article-title":"PromptAid: Prompt exploration, perturbation, testing and iteration using visual analytics for large language models","year":"2023","author":"Mishra","key":"ref45"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3650755"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174074"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.12919"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2678025.2701370"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2016.2598444"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2856767.2856782"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.12378"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3162075"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.13425"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.visinf.2018.04.005"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/VIS49827.2021.9623269"},{"article-title":"Latent jailbreak: A benchmark for evaluating text safety and output robustness of large language models","year":"2023","author":"Qiu","key":"ref57"},{"key":"ref58","first-page":"46595","article-title":"Judging LLM-as-a-judge with MT-bench and chatbot arena","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Zheng"},{"key":"ref59","first-page":"1","article-title":"(InThe)WildChat: 570K ChatGPT interaction logs in the wild","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Zhao"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1410"},{"article-title":"UMAP: Uniform manifold approximation and projection for dimension reduction","year":"2018","author":"McInnes","key":"ref61"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177728190"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-022-1410-8"},{"key":"ref64","first-page":"34892","article-title":"Visual Instruction Tuning","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Liu"},{"article-title":"Qwen2-VL: Enhancing vision-language model\u2019s perception of the world at any resolution","year":"2024","author":"Wang","key":"ref65"},{"article-title":"Jailbreaking attack against multimodal large language model","year":"2024","author":"Niu","key":"ref66"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498287"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.acl-long.385"}],"container-title":["IEEE Transactions on Visualization and Computer Graphics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/2945\/11151252\/10963705.pdf?arnumber=10963705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T06:58:46Z","timestamp":1757055526000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10963705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":68,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tvcg.2025.3557568","relation":{},"ISSN":["1077-2626","1941-0506","2160-9306"],"issn-type":[{"type":"print","value":"1077-2626"},{"type":"electronic","value":"1941-0506"},{"type":"electronic","value":"2160-9306"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}