{"id":"https://openalex.org/W4415233184","doi":"https://doi.org/10.48550/arxiv.2507.18215","title":"Information Security Based on LLM Approaches: A Review","display_name":"Information Security Based on LLM Approaches: A Review","publication_year":2025,"publication_date":"2025-07-24","ids":{"openalex":"https://openalex.org/W4415233184","doi":"https://doi.org/10.48550/arxiv.2507.18215"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2507.18215","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2507.18215","pdf_url":"https://arxiv.org/pdf/2507.18215","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"review","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2507.18215","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018650272","display_name":"\u660c\u4eba \u5c0f\u5bae","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gong, Chang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100767417","display_name":"Zhongwen Li","orcid":"https://orcid.org/0000-0002-9196-1311"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Zhongwen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100634702","display_name":"Xiaoqi Li","orcid":"https://orcid.org/0000-0002-6012-9178"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Xiaoqi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018650272"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9146999716758728,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9146999716758728,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.555899977684021},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5108000040054321},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4318000078201294},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.42989999055862427},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.41029998660087585},{"id":"https://openalex.org/keywords/natural-language","display_name":"Natural language","score":0.4043999910354614},{"id":"https://openalex.org/keywords/natural-language-understanding","display_name":"Natural language understanding","score":0.3901999890804291},{"id":"https://openalex.org/keywords/language-model","display_name":"Language model","score":0.38089999556541443},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.3788999915122986},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.37700000405311584}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7324000000953674},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6636999845504761},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.555899977684021},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5108000040054321},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4318000078201294},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.42989999055862427},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.41029998660087585},{"id":"https://openalex.org/C195324797","wikidata":"https://www.wikidata.org/wiki/Q33742","display_name":"Natural language","level":2,"score":0.4043999910354614},{"id":"https://openalex.org/C2779439875","wikidata":"https://www.wikidata.org/wiki/Q1078276","display_name":"Natural language understanding","level":3,"score":0.3901999890804291},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.38089999556541443},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.3788999915122986},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.37700000405311584},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.36309999227523804},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3610999882221222},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.32760000228881836},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.32510000467300415},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.3098999857902527},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.2992999851703644},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2976999878883362},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.2953000068664551},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.2903999984264374},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.28610000014305115},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.2847000062465668},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.28060001134872437},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.2791000008583069},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.2705000042915344},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2694000005722046},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C21338462","wikidata":"https://www.wikidata.org/wiki/Q1662581","display_name":"Information model","level":2,"score":0.2606000006198883},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25929999351501465},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.2558000087738037},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2554999887943268},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.2549999952316284},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.25440001487731934},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2526000142097473}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:arXiv.org:2507.18215","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2507.18215","pdf_url":"https://arxiv.org/pdf/2507.18215","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:doi:10.48550/arxiv.2507.18215","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2507.18215","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2507.18215","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2507.18215","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2507.18215","pdf_url":"https://arxiv.org/pdf/2507.18215","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Information":[0],"security":[1,86,137,192],"is":[2,115,166],"facing":[3],"increasingly":[4],"severe":[5],"challenges,":[6],"and":[7,17,76,80,93,106,130,147,159,177,189],"traditional":[8],"protection":[9,87,193],"means":[10],"are":[11],"difficult":[12],"to":[13,125,168,184],"cope":[14],"with":[15],"complex":[16],"changing":[18],"threats.":[19],"In":[20,44],"recent":[21],"years,":[22],"as":[23],"an":[24],"emerging":[25],"intelligent":[26,188],"technology,":[27],"large":[28,103,121],"language":[29,104,111,122],"models":[30,105],"(LLMs)":[31],"have":[32],"shown":[33,116],"a":[34,186],"broad":[35],"application":[36,61,145],"prospect":[37],"in":[38,55,63,84,109,155],"the":[39,50,99,118,127,132,143,171,174,178,181],"field":[40],"of":[41,53,102,120,136,173,180],"information":[42,56,191],"security.":[43],"this":[45,96,140],"paper,":[46],"we":[47],"focus":[48],"on":[49,90],"key":[51],"role":[52],"LLM":[54],"security,":[57],"systematically":[58],"review":[59],"its":[60,82],"progress":[62],"malicious":[64,73],"behavior":[65],"prediction,":[66],"network":[67],"threat":[68],"analysis,":[69],"system":[70],"vulnerability":[71],"detection,":[72],"code":[74],"identification,":[75],"cryptographic":[77],"algorithm":[78],"optimization,":[79],"explore":[81,169],"potential":[83],"enhancing":[85],"performance.":[88],"Based":[89],"neural":[91],"networks":[92],"Transformer":[94],"architecture,":[95],"paper":[97,141],"analyzes":[98],"technical":[100],"basis":[101],"their":[107],"advantages":[108],"natural":[110],"processing":[112],"tasks.":[113],"It":[114,165],"that":[117,150],"introduction":[119],"modeling":[123],"helps":[124],"improve":[126],"detection":[128],"accuracy":[129],"reduce":[131],"false":[133],"alarm":[134],"rate":[135],"systems.":[138],"Finally,":[139],"summarizes":[142],"current":[144],"results":[146],"points":[148],"out":[149],"it":[151],"still":[152],"faces":[153],"challenges":[154],"model":[156,175],"transparency,":[157],"interpretability,":[158],"scene":[160],"adaptability,":[161],"among":[162],"other":[163],"issues.":[164],"necessary":[167],"further":[170],"optimization":[172],"structure":[176],"improvement":[179],"generalization":[182],"ability":[183],"realize":[185],"more":[187],"accurate":[190],"system.":[194]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-16T00:00:00"}
