{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:54Z","timestamp":1750309374014,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T00:00:00Z","timestamp":1718928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,21]]},"DOI":"10.1145\/3690407.3690517","type":"proceedings-article","created":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T18:55:28Z","timestamp":1729796128000},"page":"647-653","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Caesar Cipher Attack Methods based on GPT-4o"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-6265-554X","authenticated-orcid":false,"given":"Jianxin","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2569-2184","authenticated-orcid":false,"given":"Haodong","family":"Deng","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6885-9063","authenticated-orcid":false,"given":"Chaoen","family":"Xiao","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8698-8959","authenticated-orcid":false,"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1718-8903","authenticated-orcid":false,"given":"Ding","family":"Ding","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5851-5209","authenticated-orcid":false,"given":"Xiangze","family":"Chang","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,24]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00212-8"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2455974"},{"key":"e_1_3_3_1_3_2","unstructured":"Minaee S Mikolov T Nikzad N et al. 2023. Large language models: A survey. arXiv preprint arXiv:2402.06196 2024."},{"key":"e_1_3_3_1_4_2","unstructured":"Jean Kaddour \u00a0Joshua Harris \u00a0Maximilian Mozes \u00a0Herbie Bradley \u00a0Roberta Raileanu \u00a0Robert McHardy. 2023. Challenges and Applications of Large Language Models. arXiv:2307.10169"},{"volume-title":"Agent SCA: Advanced Physical Side Channel Analysis Agent with LLMs","author":"Yaman F.","key":"e_1_3_3_1_5_2","unstructured":"Yaman F. 2023. Agent SCA: Advanced Physical Side Channel Analysis Agent with LLMs. North Carolina State University."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Yifan Yao Jinhao Duan Kaidi Xu Yuanfang Cai Zhibo Sun and Yue Zhang. 2024. A survey on large language model (llm) security and privacy: The good the bad and the ugly. High-Confidence Computing 100211.","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"e_1_3_3_1_7_2","unstructured":"Vaswani A Shazeer N Parmar N et al. 2017. Attention is all you need. Advances in neural information processing systems 30."},{"volume-title":"CCF International Conference on Natural Language Processing and Chinese Computing. Cham: Springer Nature Switzerland: 375-386","author":"Huang H","key":"e_1_3_3_1_8_2","unstructured":"Huang H, Wu S, Liang X, et al. 2023. Towards making the most of llm for translation quality estimation. CCF International Conference on Natural Language Processing and Chinese Computing. Cham: Springer Nature Switzerland: 375-386."},{"key":"e_1_3_3_1_9_2","volume-title":"Application of llm agents in recruitment: A novel framework for resume screening. arXiv preprint arXiv:2401.08315","author":"Gan C","year":"2024","unstructured":"Gan C, Zhang Q, Mori T. 2024. Application of llm agents in recruitment: A novel framework for resume screening. arXiv preprint arXiv:2401.08315, 2024."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-024-02075-x"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11528-024-00967-w"},{"key":"e_1_3_3_1_12_2","unstructured":"Fraiwan M Khasawneh N. 2023. A review of GPT applications in education marketing software engineering and healthcare: Benefits drawbacks and research directions. arXiv preprint arXiv:2305.00237."},{"key":"e_1_3_3_1_13_2","unstructured":"Nori H King N McKinney S M et al. 2023. Capabilities of gpt-4 on medical challenge problems. arXiv preprint arXiv:2303.13375."},{"key":"e_1_3_3_1_14_2","first-page":"69","article-title":"GPT and Web3 Applications. Beyond AI: GPT, Web3, and the Business Landscape of Tomorrow. Cham","author":"Huang K","year":"2023","unstructured":"Huang K, Wang Y, Goertzel B, et al. 2023. GPT and Web3 Applications. Beyond AI: GPT, Web3, and the Business Landscape of Tomorrow. Cham: Springer Nature Switzerland: 69-95.","journal-title":"Springer Nature Switzerland"},{"volume-title":"Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering: 1-13","author":"Nam D","key":"e_1_3_3_1_15_2","unstructured":"Nam D, Macvean A, Hellendoorn V, et al. 2024. Using an llm to help with code understanding. Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering: 1-13."},{"key":"e_1_3_3_1_16_2","first-page":"131","article-title":"Threats, Opportunities, and Misconceptions. Understanding Large Language Models: Learning Their Underlying Concepts and Technologies. Berkeley","author":"Amaratunga T.","year":"2023","unstructured":"Amaratunga T. 2023. Threats, Opportunities, and Misconceptions. Understanding Large Language Models: Learning Their Underlying Concepts and Technologies. Berkeley, CA: Apress: 131-148.","journal-title":"CA: Apress"},{"volume-title":"potential applications, emerging challenges, and future directions","author":"Yenduri G","key":"e_1_3_3_1_17_2","unstructured":"Yenduri G, Ramalingam M, Selvi G C, et al. 2024. Gpt (generative pre-trained transformer)\u2013a comprehensive review on enabling technologies, potential applications, emerging challenges, and future directions. IEEE Access."},{"key":"e_1_3_3_1_18_2","unstructured":"Chen B Zhang Z Langren\u00e9 N et al. 2023. Unleashing the potential of prompt engineering in Large Language Models: a comprehensive review. arXiv preprint arXiv:2310.14735."},{"key":"e_1_3_3_1_19_2","unstructured":"White J Fu Q Hays S et al. 2023. A prompt pattern catalog to enhance prompt engineering with GPT[J]. arXiv preprint arXiv:2302.11382."},{"key":"e_1_3_3_1_20_2","unstructured":"Wei J Wang X Schuurmans D et al. 2022. Chain-of-thought prompting elicits reasoning in large language models. Advances in neural information processing systems 35: 24824-24837."},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Jin M Yu Q Zhao H et al. 2024. The impact of reasoning step length on large language models. arXiv preprint arXiv:2401.04925 2024.","DOI":"10.18653\/v1\/2024.findings-acl.108"},{"key":"e_1_3_3_1_22_2","unstructured":"Wang X Wei J Schuurmans D et al. 2022. Self-consistency improves chain of thought reasoning in language models[J]. arXiv preprint arXiv:2203.11171."}],"event":{"name":"CAIBDA 2024: 2024 4th International Conference on Artificial Intelligence, Big Data and Algorithms","acronym":"CAIBDA 2024","location":"Zhengzhou China"},"container-title":["Proceedings of the 2024 4th International Conference on Artificial Intelligence, Big Data and Algorithms"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690407.3690517","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690407.3690517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:20Z","timestamp":1750291580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690407.3690517"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,21]]},"references-count":22,"alternative-id":["10.1145\/3690407.3690517","10.1145\/3690407"],"URL":"https:\/\/doi.org\/10.1145\/3690407.3690517","relation":{},"subject":[],"published":{"date-parts":[[2024,6,21]]},"assertion":[{"value":"2024-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}