{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:01:05Z","timestamp":1775322065406,"version":"3.50.1"},"reference-count":30,"publisher":"Tech Science Press","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063826","type":"journal-article","created":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T04:28:45Z","timestamp":1744950525000},"page":"4855-4877","source":"Crossref","is-referenced-by-count":5,"title":["Adversarial Prompt Detection in Large Language Models: A Classification-Driven Approach"],"prefix":"10.32604","volume":"83","author":[{"given":"Ahmet Emre","family":"Erg\u00fcn","sequence":"first","affiliation":[]},{"given":"Aytu\u011f","family":"Onan","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","unstructured":"Minaee S, Mikolov T, Nikzad N, Chenaghlu M, Socher R, Amatriain X, et al. Large language models: a survey. arXiv:2402.06196. 2024."},{"key":"ref2","doi-asserted-by":"crossref","unstructured":"Rababah B, Wu S, Kwiatkowski M, Leung C, Akcora CG. SoK: prompt hacking of large language models. arXiv:2410.13901. 2024.","DOI":"10.1109\/BigData62323.2024.10825103"},{"key":"ref3","unstructured":"Prompting Guide AI. Risks of adversarial prompts [Internet]. [cited 2025 Jan 23]. Available from: https:\/\/www.promptingguide.ai\/risks\/adversarial."},{"key":"ref4","doi-asserted-by":"crossref","unstructured":"Fan L, Li L, Ma Z, Lee S, Yu H, Hemphill L. A bibliometric review of large language models research from 2017 to 2023. arXiv:2304.02020. 2024.","DOI":"10.1145\/3664930"},{"key":"ref5","unstructured":"Weng L. Adversarial attacks on LLMs [Internet]. [cited 2025 Jan 23]. Available from: https:\/\/lilianweng.github.io\/posts\/2023-10-25-adv-attack-llm\/."},{"key":"ref6","unstructured":"Struppek L, Le MH, Hintersdorf D, Kersting K. Exploring the adversarial capabilities of large language models. arXiv:2402.09132. 2024."},{"key":"ref7","unstructured":"Das N, Raff E, Gaur M. Human-readable adversarial prompts: an investigation into LLM vulnerabilities using situational context. arXiv:2412.16359. 2024. doi:10.48550\/arXiv.2412.16359."},{"key":"ref8","unstructured":"Paulus A, Zharmagambetov A, Guo C, Amos B, Tian Y. AdvPrompter: fast adaptive adversarial prompting for LLMs. arXiv.2404.16873. 2024. doi:10.48550\/arXiv.2404.16873."},{"key":"ref9","series-title":"Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis","first-page":"57","article-title":"PromptRobust: towards evaluating the robustness of large language models on adversarial prompts","author":"Zhu","year":"2023"},{"key":"ref10","unstructured":"Ayub M, Majumdar S. Embedding-based classifiers can detect prompt injection attacks. arXiv:2410.22284. 2024. doi:10.48550\/arXiv.2410.22284."},{"key":"ref11","unstructured":"Hu Z, Wu G, Mitra S, Zhang R, Sun T, Huang H, et al. Token-level adversarial prompt detection based on perplexity measures and contextual information. arXiv:2311.11509. 2023. doi:10.48550\/arXiv.2311.11509."},{"key":"ref12","unstructured":"Kumar A, Agarwal C, Srinivas S, Li AJ, Feizi S, Lakkaraju H. Certifying LLM safety against adversarial prompting. arXiv:2309.02705. 2023. doi:10.48550\/arXiv.2309.02705."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"5929","DOI":"10.1007\/s10462-020-09838-1","article-title":"A review on the long short-term memory model","volume":"53","author":"Van Houdt","year":"2020","journal-title":"Artif Intell Rev"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","author":"Hochreiter","year":"1997","journal-title":"Neural Comput"},{"key":"ref15","series-title":"Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP)","first-page":"1746","article-title":"Convolutional neural networks for sentence classification","author":"Kim","year":"2014"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1162\/neco.1989.1.4.541","article-title":"Backpropagation applied to handwritten zip code recognition","volume":"1","author":"LeCun","year":"1989","journal-title":"Neural Comput"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"14125","DOI":"10.1038\/s41598-021-93656-0","article-title":"A hybrid CNN-LSTM model for pre-miRNA classification","volume":"11","author":"Tasdelen","year":"2021","journal-title":"Sci Rep"},{"key":"ref18","doi-asserted-by":"crossref","unstructured":"Donahue J, Anne Hendricks L, Guadarrama S, Rohrbach M, Venugopalan S, Saenko K, et al. Long-term recurrent convolutional networks for visual recognition and description. arXiv.1411.4389. 2015. doi:10.1109\/CVPR.2015.7298878.","DOI":"10.21236\/ADA623249"},{"key":"ref19","doi-asserted-by":"crossref","unstructured":"Cho K, Van Merri\u00ebnboer B, Bahdanau D, Bengio Y. On the properties of neural machine translation: encoder-decoder approaches. arXiv:1409.1259. 2014.","DOI":"10.3115\/v1\/W14-4012"},{"key":"ref20","series-title":"Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP)","first-page":"1724","article-title":"Learning phrase representations using RNN encoder-decoder for statistical machine translation","author":"Cho","year":"2014"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1006\/jcss.1997.1504","article-title":"A decision-theoretic generalization of on-line learning and an application to boosting","volume":"55","author":"Freund","year":"1997","journal-title":"J Comput Syst Sci"},{"key":"ref22","series-title":"ICML\u201996: Proceedings of the Thirteenth International Conference on International Conference on Machine Learning","first-page":"148","article-title":"Experiments with a new boosting algorithm","author":"Freund","year":"1996"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach Learn"},{"key":"ref24","series-title":"KDD \u201916: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"785","article-title":"XGBoost: a scalable tree boosting system","author":"Chen","year":"2016"},{"key":"ref25","first-page":"235","article-title":"C4.5: programs for machine learning by J. Ross Quinlan. Morgan Kaufmann Publishers, Inc., 1993","volume":"16","author":"Salzberg","year":"1994","journal-title":"Mach Learn"},{"key":"ref26","author":"Breiman","year":"1984","journal-title":"Classification and regression trees"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4175.001.0001","author":"Sch\u00f6lkopf","year":"2001","journal-title":"Learning with kernels: support vector machines, regularization, optimization, and beyond"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1023\/A:1022627411411","article-title":"Support-vector networks","volume":"20","author":"Cortes","year":"1995","journal-title":"Mach Learn"},{"key":"ref29","first-page":"41","author":"Rish","year":"2001","journal-title":"IJCAI-2001 Workshop on Empirical Methods in AI"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","article-title":"Nearest neighbor pattern classification","volume":"13","author":"Cover","year":"1967","journal-title":"IEEE Trans Inf Theory"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_63826\/TSP_CMC_63826.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:31:16Z","timestamp":1763343076000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61060"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":30,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063826","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}