{"id":"https://openalex.org/W7133359620","doi":"https://doi.org/10.1145/3742413.3789108","title":"Vulnerability of LLM Outputs to Heuristics-Inducing Prompt Structures","display_name":"Vulnerability of LLM Outputs to Heuristics-Inducing Prompt Structures","publication_year":2026,"publication_date":"2026-03-03","ids":{"openalex":"https://openalex.org/W7133359620","doi":"https://doi.org/10.1145/3742413.3789108"},"language":null,"primary_location":{"id":"doi:10.1145/3742413.3789108","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3742413.3789108","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st International Conference on Intelligent User Interfaces","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3742413.3789108","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014870302","display_name":"Toshiki Kuramoto","orcid":null},"institutions":[{"id":"https://openalex.org/I91443412","display_name":"Bridgestone (Japan)","ror":"https://ror.org/04trbvb35","country_code":"JP","type":"company","lineage":["https://openalex.org/I91443412"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Toshiki Kuramoto","raw_affiliation_strings":["Bridgestone Corporation, Tokyo, Japan and Tohoku University, Sendai, Japan"],"raw_orcid":"https://orcid.org/0009-0007-0866-9277","affiliations":[{"raw_affiliation_string":"Bridgestone Corporation, Tokyo, Japan and Tohoku University, Sendai, Japan","institution_ids":["https://openalex.org/I91443412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128003926","display_name":"Ryohei Kamei","orcid":null},"institutions":[{"id":"https://openalex.org/I201537933","display_name":"Tohoku University","ror":"https://ror.org/01dq60k83","country_code":"JP","type":"education","lineage":["https://openalex.org/I201537933"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ryohei Kamei","raw_affiliation_strings":["Tohoku University, Sendai, Japan"],"raw_orcid":"https://orcid.org/0009-0009-1336-6961","affiliations":[{"raw_affiliation_string":"Tohoku University, Sendai, Japan","institution_ids":["https://openalex.org/I201537933"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002182453","display_name":"Jun Suzuki","orcid":"https://orcid.org/0000-0003-2108-1340"},"institutions":[{"id":"https://openalex.org/I201537933","display_name":"Tohoku University","ror":"https://ror.org/01dq60k83","country_code":"JP","type":"education","lineage":["https://openalex.org/I201537933"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Jun Suzuki","raw_affiliation_strings":["Tohoku University, Sendai, Japan; RIKEN, Tokyo, Japan and NII LLMC, Tokyo, Japan"],"raw_orcid":"https://orcid.org/0000-0003-2108-1340","affiliations":[{"raw_affiliation_string":"Tohoku University, Sendai, Japan; RIKEN, Tokyo, Japan and NII LLMC, Tokyo, Japan","institution_ids":["https://openalex.org/I201537933"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014870302"],"corresponding_institution_ids":["https://openalex.org/I91443412"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.49132313,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1968","last_page":"1983"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.3621000051498413,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.3621000051498413,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.20499999821186066,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11010","display_name":"Logic, Reasoning, and Knowledge","score":0.1737000048160553,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/debiasing","display_name":"Debiasing","score":0.9174000024795532},{"id":"https://openalex.org/keywords/representativeness-heuristic","display_name":"Representativeness heuristic","score":0.9027000069618225},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.8873000144958496},{"id":"https://openalex.org/keywords/anchoring","display_name":"Anchoring","score":0.6759999990463257},{"id":"https://openalex.org/keywords/framing","display_name":"Framing (construction)","score":0.5699999928474426},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5077000260353088},{"id":"https://openalex.org/keywords/downgrade","display_name":"Downgrade","score":0.39149999618530273},{"id":"https://openalex.org/keywords/psychological-intervention","display_name":"Psychological intervention","score":0.37700000405311584}],"concepts":[{"id":"https://openalex.org/C2779458634","wikidata":"https://www.wikidata.org/wiki/Q24963715","display_name":"Debiasing","level":2,"score":0.9174000024795532},{"id":"https://openalex.org/C37381756","wikidata":"https://www.wikidata.org/wiki/Q20203288","display_name":"Representativeness heuristic","level":2,"score":0.9027000069618225},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.8873000144958496},{"id":"https://openalex.org/C18483071","wikidata":"https://www.wikidata.org/wiki/Q168432","display_name":"Anchoring","level":2,"score":0.6759999990463257},{"id":"https://openalex.org/C169087156","wikidata":"https://www.wikidata.org/wiki/Q2131593","display_name":"Framing (construction)","level":2,"score":0.5699999928474426},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5098999738693237},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5077000260353088},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4366999864578247},{"id":"https://openalex.org/C2779628075","wikidata":"https://www.wikidata.org/wiki/Q1253258","display_name":"Downgrade","level":2,"score":0.39149999618530273},{"id":"https://openalex.org/C27415008","wikidata":"https://www.wikidata.org/wiki/Q7256382","display_name":"Psychological intervention","level":2,"score":0.37700000405311584},{"id":"https://openalex.org/C136714292","wikidata":"https://www.wikidata.org/wiki/Q1440683","display_name":"Framing effect","level":3,"score":0.3472000062465668},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.33799999952316284},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3375000059604645},{"id":"https://openalex.org/C3017944768","wikidata":"https://www.wikidata.org/wiki/Q1450463","display_name":"Poison control","level":2,"score":0.3246000111103058},{"id":"https://openalex.org/C166735990","wikidata":"https://www.wikidata.org/wiki/Q1750812","display_name":"Human factors and ergonomics","level":3,"score":0.3138999938964844},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3061999976634979},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.305400013923645},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.2793000042438507},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.275299996137619},{"id":"https://openalex.org/C139475501","wikidata":"https://www.wikidata.org/wiki/Q17081866","display_name":"Social heuristics","level":4,"score":0.27149999141693115},{"id":"https://openalex.org/C9354725","wikidata":"https://www.wikidata.org/wiki/Q286017","display_name":"Operationalization","level":2,"score":0.26820001006126404},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.26809999346733093},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.2556999921798706},{"id":"https://openalex.org/C100521375","wikidata":"https://www.wikidata.org/wiki/Q2015382","display_name":"Competence (human resources)","level":2,"score":0.251800000667572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3742413.3789108","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3742413.3789108","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st International Conference on Intelligent User Interfaces","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3742413.3789108","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3742413.3789108","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st International Conference on Intelligent User Interfaces","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1484310128","https://openalex.org/W1980054641","https://openalex.org/W2096452841","https://openalex.org/W2162829624","https://openalex.org/W3034383590","https://openalex.org/W3103178756","https://openalex.org/W3172669006","https://openalex.org/W3184537908","https://openalex.org/W4200059551","https://openalex.org/W4292157289","https://openalex.org/W4309674289","https://openalex.org/W4319083882","https://openalex.org/W4320084569","https://openalex.org/W4380995299","https://openalex.org/W4385570703","https://openalex.org/W4385571220","https://openalex.org/W4385572775","https://openalex.org/W4385852384","https://openalex.org/W4389518833","https://openalex.org/W4391655051","https://openalex.org/W4394006561","https://openalex.org/W4394827903","https://openalex.org/W4399254260","https://openalex.org/W4399528455","https://openalex.org/W4401484139","https://openalex.org/W4401587065","https://openalex.org/W4401857176","https://openalex.org/W4401955911","https://openalex.org/W4403630342","https://openalex.org/W4404780679","https://openalex.org/W4405659834","https://openalex.org/W4408589781","https://openalex.org/W4409871149","https://openalex.org/W4411119351","https://openalex.org/W4413495295","https://openalex.org/W4416035211","https://openalex.org/W6884633647","https://openalex.org/W7133231369","https://openalex.org/W7133236450"],"related_works":[],"abstract_inverted_index":{"Large":[0],"Language":[1],"Models":[2],"(LLMs)":[3],"have":[4,14],"become":[5],"indispensable":[6],"tools":[7],"in":[8,80,183,215],"daily":[9],"life.":[10],"Although":[11],"LLM":[12,184],"applications":[13],"rapidly":[15],"expanded":[16],"across":[17],"various":[18],"domains,":[19],"distorted":[20],"outputs":[21,108,130,185],"(specifically,":[22],"bias":[23],"and":[24,43,87,105,120,147,154,170,210,218],"hallucination)":[25],"are":[26],"unresolved":[27],"problems":[28],"that":[29,98,192],"threaten":[30],"the":[31,51,102,107,115,145,152,161,176,208],"reliability":[32],"of":[33,53,101,109,117,181,213],"LLM-based":[34],"artificial":[35],"intelligence":[36],"(AI)":[37],"agents.":[38],"Focusing":[39],"on":[40,151,168],"internal":[41],"mechanisms":[42],"social":[44],"biases,":[45],"prior":[46],"research":[47],"has":[48],"rarely":[49],"considered":[50],"possibility":[52],"distortion-induction":[54],"even":[55],"from":[56],"non-malicious,":[57],"ordinary":[58],"prompts":[59],"with":[60],"specific":[61],"input":[62],"patterns.":[63],"This":[64,173],"study":[65,174],"empirically":[66],"investigates":[67],"whether":[68],"LLMs":[69,124,214],"exposed":[70],"to":[71,126,207],"certain":[72,132],"prompt":[73,118,133,155,201],"structures":[74],"can":[75],"induce":[76],"biases":[77],"commonly":[78],"elicited":[79],"humans,":[81],"namely,":[82],"representativeness":[83,146,162],"heuristics,":[84,86],"anchoring":[85,169],"framing":[88,148,171],"heuristics.":[89,172],"To":[90],"this":[91],"end,":[92],"we":[93],"constructed":[94],"a":[95],"test":[96],"set":[97],"triggers":[99],"one":[100],"three":[103],"heuristics":[104,136,149,163],"evaluated":[106],"state-of-the-art":[110],"LLMs.":[111],"We":[112],"further":[113],"examined":[114],"effectiveness":[116],"engineering":[119],"debiasing":[121],"interventions.":[122],"The":[123],"continued":[125],"produce":[127],"heuristic-derived":[128],"biased":[129],"under":[131],"conditions.":[134],"Anchoring":[135],"were":[137],"observed":[138],"at":[139],"rates":[140],"significantly":[141],"above":[142],"chance,":[143],"whereas":[144],"depended":[150],"model":[153],"structure.":[156],"Debiasing":[157],"interventions":[158],"notably":[159],"reduced":[160],"but":[164],"exerted":[165],"limited":[166],"impact":[167],"highlights":[175],"need":[177],"for":[178],"enhanced":[179],"awareness":[180],"vulnerabilities":[182],"against":[186,199],"particular":[187],"prompts.":[188],"It":[189],"also":[190],"reveals":[191],"typical":[193],"prompt-engineering":[194],"strategies":[195],"offer":[196],"insufficient":[197],"protection":[198],"such":[200],"structures.":[202],"These":[203],"results":[204],"will":[205],"contribute":[206],"safe":[209],"effective":[211],"use":[212],"human\u2013computer":[216],"interactions":[217],"AI":[219],"deployment.":[220]},"counts_by_year":[],"updated_date":"2026-03-05T07:30:30.508283","created_date":"2026-03-04T00:00:00"}
