{"id":"https://openalex.org/W4413679709","doi":"https://doi.org/10.1109/csr64739.2025.11130138","title":"A Novel GNN-based Approach for Detection of Prompt Injection Attacks","display_name":"A Novel GNN-based Approach for Detection of Prompt Injection Attacks","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413679709","doi":"https://doi.org/10.1109/csr64739.2025.11130138"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130138","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130138","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Gaurav Jadhav","orcid":null},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Gaurav Jadhav","raw_affiliation_strings":["University of Essex,Computer Science and Electronic Engineering,Colchester,United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Essex,Computer Science and Electronic Engineering,Colchester,United Kingdom","institution_ids":["https://openalex.org/I110002522"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100634925","display_name":"Amit Kumar Singh","orcid":"https://orcid.org/0000-0001-7359-2068"},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Amit Kumar Singh","raw_affiliation_strings":["University of Essex,Computer Science and Electronic Engineering,Colchester,United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Essex,Computer Science and Electronic Engineering,Colchester,United Kingdom","institution_ids":["https://openalex.org/I110002522"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101758699","display_name":"Zeba Khanam","orcid":"https://orcid.org/0000-0002-2886-683X"},"institutions":[{"id":"https://openalex.org/I14689143","display_name":"BT Research","ror":"https://ror.org/03308db07","country_code":"GB","type":"facility","lineage":["https://openalex.org/I1332878012","https://openalex.org/I14689143"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zeba Khanam","raw_affiliation_strings":["Centre of Excellence for Cyber Threat Detection BT Security Research,Ipswich,United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre of Excellence for Cyber Threat Detection BT Security Research,Ipswich,United Kingdom","institution_ids":["https://openalex.org/I14689143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009191675","display_name":"Robert Hercock","orcid":null},"institutions":[{"id":"https://openalex.org/I14689143","display_name":"BT Research","ror":"https://ror.org/03308db07","country_code":"GB","type":"facility","lineage":["https://openalex.org/I1332878012","https://openalex.org/I14689143"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Robert Hercock","raw_affiliation_strings":["Centre of Excellence for Cyber Threat Detection BT Security Research,Ipswich,United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre of Excellence for Cyber Threat Detection BT Security Research,Ipswich,United Kingdom","institution_ids":["https://openalex.org/I14689143"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I110002522"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24254012,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"77","last_page":"82"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9700999855995178,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6447554230690002},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4198249578475952}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6447554230690002},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4198249578475952}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr64739.2025.11130138","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130138","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Prompt":[0],"injection":[1],"attacks":[2],"manipulate":[3],"language":[4],"model":[5,136],"inputs":[6],"to":[7,50],"bypass":[8],"intended":[9],"constraints,":[10],"extract":[11],"sensitive":[12],"information,":[13],"or":[14],"generate":[15],"misleading":[16],"responses,":[17],"posing":[18],"a":[19,32,104,139],"significant":[20],"security":[21,143],"risk":[22],"in":[23],"real-world":[24],"applications.":[25],"To":[26],"address":[27],"this":[28],"challenge,":[29],"we":[30,121],"propose":[31],"Graph":[33],"Neural":[34],"Network":[35],"(GNN)based":[36],"approach":[37,65,80,102],"that":[38,72,100],"integrates":[39],"sentiment":[40],"features":[41],"and":[42,69,91,111,135,144],"Bidirectional":[43],"Encoder":[44],"Representations":[45],"from":[46],"Transformers":[47],"(BERT)":[48],"embeddings":[49],"effectively":[51],"detect":[52],"malicious":[53],"prompt":[54],"injections.":[55],"By":[56],"transforming":[57],"textual":[58],"data":[59],"into":[60],"structured":[61],"graph":[62],"representations,":[63],"our":[64,79,101],"captures":[66],"both":[67],"semantic":[68],"contextual":[70],"relationships":[71],"conventional":[73,118],"models":[74],"often":[75],"overlook.":[76],"We":[77],"evaluated":[78],"against":[81],"traditional":[82],"machine":[83],"learning":[84],"techniques,":[85],"including":[86],"Random":[87],"Forest,":[88],"Logistic":[89],"Regression,":[90],"XGBoost,":[92],"demonstrating":[93],"its":[94],"superior":[95],"performance.":[96,145],"Experimental":[97],"results":[98],"show":[99],"achieves":[103],"high":[105],"detection":[106,133],"accuracy":[107],"of":[108,114,126],"$98.70":[109],"\\%$":[110],"an":[112,123],"F1-score":[113],"0.9799,":[115],"significantly":[116],"outperforming":[117],"methods.":[119],"Additionally,":[120],"provide":[122],"in-depth":[124],"analysis":[125],"computational":[127],"efficiency,":[128],"highlighting":[129],"the":[130],"trade-offs":[131],"between":[132,142],"effectiveness":[134],"complexity,":[137],"ensuring":[138],"practical":[140],"balance":[141]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
