{"id":"https://openalex.org/W7125788058","doi":"https://doi.org/10.1109/tifs.2026.3657898","title":"Dialogue Injection Attack: Jailbreaking LLMs Through Context Manipulation","display_name":"Dialogue Injection Attack: Jailbreaking LLMs Through Context Manipulation","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7125788058","doi":"https://doi.org/10.1109/tifs.2026.3657898"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3657898","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3657898","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123942295","display_name":"Wenlong Meng","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenlong Meng","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124013349","display_name":"Fan Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123909040","display_name":"Wendao Yao","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wendao Yao","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123921742","display_name":"Zhenyuan Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenyuan Guo","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124014775","display_name":"Yuwei Li","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuwei Li","raw_affiliation_strings":["College of Electronic Engineering, National University of Defense Technology, Hefei, China"],"affiliations":[{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Hefei, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123934369","display_name":"Chengkun Wei","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengkun Wei","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123906545","display_name":"Wenzhi Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenzhi Chen","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5123942295"],"corresponding_institution_ids":["https://openalex.org/I168879160"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19595584,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"1577","last_page":"1592"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.5514000058174133,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.5514000058174133,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.2320999950170517,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10181","display_name":"Natural Language Processing Techniques","score":0.032999999821186066,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9212999939918518},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7671999931335449},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6754000186920166},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6471999883651733},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4291999936103821},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.3370000123977661}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9212999939918518},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8090000152587891},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7671999931335449},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6754000186920166},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6471999883651733},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6370999813079834},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.44449999928474426},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4374000132083893},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4291999936103821},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3370000123977661},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.32899999618530273},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.3208000063896179},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.3197000026702881},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.298799991607666},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2964000105857849},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.27869999408721924},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.2703000009059906}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3657898","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3657898","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7285023927688599,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4929171329","display_name":null,"funder_award_id":"62302441","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2970641574","https://openalex.org/W4311081005","https://openalex.org/W4387321091","https://openalex.org/W4389209096","https://openalex.org/W4389518968","https://openalex.org/W4389736946","https://openalex.org/W4391724817","https://openalex.org/W4392309420","https://openalex.org/W4394947904","https://openalex.org/W4400531852","https://openalex.org/W4401042382","https://openalex.org/W4401042853","https://openalex.org/W4402670895","https://openalex.org/W4402671190","https://openalex.org/W4402683786","https://openalex.org/W4404037745","https://openalex.org/W4404781802","https://openalex.org/W4404782689","https://openalex.org/W4409347932","https://openalex.org/W4410609100"],"related_works":[],"abstract_inverted_index":{"Large":[0],"language":[1],"models":[2],"(LLMs)":[3],"have":[4,68],"demonstrated":[5],"significant":[6],"utility":[7],"in":[8,119],"a":[9,105,120],"wide":[10],"range":[11],"of":[12,41,59,132],"applications;":[13],"however,":[14],"their":[15],"deployment":[16],"is":[17],"plagued":[18],"by":[19,35],"security":[20],"vulnerabilities,":[21],"notably":[22],"jailbreak":[23,46,71,115],"attacks.":[24],"These":[25],"attacks":[26,47],"manipulate":[27,81],"LLMs":[28],"to":[29,113,126],"generate":[30],"harmful":[31],"or":[32,130],"unethical":[33],"content":[34],"crafting":[36],"adversarial":[37,143],"prompts.":[38],"While":[39],"much":[40],"the":[42,57,77,82,95,127,133,152],"current":[43],"research":[44],"on":[45,50,62,167],"has":[48,54],"focused":[49],"single-turn":[51],"interactions,":[52],"it":[53],"largely":[55],"overlooked":[56],"impact":[58],"historical":[60,144],"dialogues":[61],"model":[63],"behavior.":[64],"Although":[65],"recent":[66,168],"studies":[67],"explored":[69],"multi-turn":[70],"attacks,":[72,150],"they":[73],"generally":[74],"assume":[75],"that":[76,89,108,160,177],"attacker":[78,91],"can":[79,92,179],"only":[80,124],"user":[83],"prompt.":[84],"In":[85],"contrast,":[86],"we":[87,102,175],"highlight":[88],"an":[90],"also":[93],"control":[94],"model\u2019s":[96],"previous":[97],"outputs.":[98],"To":[99],"this":[100],"end,":[101],"introduce":[103],"DIA,":[104],"new":[106],"paradigm":[107],"leverages":[109],"fabricated":[110],"dialogue":[111],"history":[112],"enhance":[114],"effectiveness.":[116],"DIA":[117,161,178],"operates":[118],"black-box":[121],"setting,":[122],"requiring":[123],"access":[125],"chat":[128,135],"API":[129],"knowledge":[131],"LLM\u2019s":[134],"template.":[136],"We":[137],"propose":[138],"two":[139],"methods":[140],"for":[141],"constructing":[142],"dialogues:":[145],"one":[146],"adapts":[147],"gray-box":[148],"prefilling":[149],"and":[151,172],"other":[153],"exploits":[154],"deferred":[155],"responses.":[156],"Our":[157],"experiments":[158],"demonstrate":[159],"achieves":[162],"state-of-the-art":[163],"attack":[164],"success":[165],"rates":[166],"LLMs,":[169],"including":[170],"Llama-3.1":[171],"GPT-4o.":[173],"Additionally,":[174],"show":[176],"bypass":[180],"6":[181],"different":[182],"defense":[183],"mechanisms,":[184],"highlighting":[185],"its":[186],"robustness.":[187]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-28T00:00:00"}
