{"id":"https://openalex.org/W6929453022","doi":"https://doi.org/10.48550/arxiv.2508.09426","title":"Security Analysis of ChatGPT: Threats and Privacy Risks","display_name":"Security Analysis of ChatGPT: Threats and Privacy Risks","publication_year":2025,"publication_date":"2025-08-13","ids":{"openalex":"https://openalex.org/W6929453022","doi":"https://doi.org/10.48550/arxiv.2508.09426"},"language":"en","primary_location":{"id":"pmh:doi:10.48550/arxiv.2508.09426","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Xiang, Yushan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xiang, Yushan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Li, Zhongwen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Zhongwen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Li, Xiaoqi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Xiaoqi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11636","display_name":"Artificial Intelligence in Healthcare and Education","score":0.6632999777793884,"subfield":{"id":"https://openalex.org/subfields/2718","display_name":"Health Informatics"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},"topics":[{"id":"https://openalex.org/T11636","display_name":"Artificial Intelligence in Healthcare and Education","score":0.6632999777793884,"subfield":{"id":"https://openalex.org/subfields/2718","display_name":"Health Informatics"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.07850000262260437,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12128","display_name":"AI in Service Interactions","score":0.027899999171495438,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5651000142097473},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.5641999840736389},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.536300003528595},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.4763000011444092},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.43160000443458557},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.39899998903274536},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3783999979496002},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3675999939441681}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.696399986743927},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5651000142097473},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.5641999840736389},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5623000264167786},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.536300003528595},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.4763000011444092},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.43160000443458557},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4278999865055084},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.39899998903274536},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3783999979496002},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3675999939441681},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.3637000024318695},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.3612000048160553},{"id":"https://openalex.org/C2776608160","wikidata":"https://www.wikidata.org/wiki/Q4785462","display_name":"Natural (archaeology)","level":2,"score":0.3255999982357025},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.3221000134944916},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.32190001010894775},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.31029999256134033},{"id":"https://openalex.org/C2986663376","wikidata":"https://www.wikidata.org/wiki/Q9465","display_name":"Ethical issues","level":2,"score":0.27250000834465027},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.27090001106262207},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.27059999108314514},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2529999911785126},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.2500999867916107},{"id":"https://openalex.org/C17520342","wikidata":"https://www.wikidata.org/wiki/Q7797190","display_name":"Threat","level":5,"score":0.2500999867916107}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2508.09426","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2508.09426","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2508.09426","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2508.09426","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"score":0.658044695854187,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"As":[0],"artificial":[1],"intelligence":[2],"technology":[3],"continues":[4],"to":[5,24,39,71,88],"advance,":[6],"chatbots":[7],"are":[8,85],"becoming":[9],"increasingly":[10,74],"powerful.":[11],"Among":[12],"them,":[13],"ChatGPT,":[14],"launched":[15],"by":[16,83,155],"OpenAI,":[17],"has":[18],"garnered":[19],"widespread":[20],"attention":[21],"globally":[22],"due":[23],"its":[25,60],"powerful":[26],"natural":[27,42],"language":[28],"processing":[29],"capabilities":[30],"based":[31],"on":[32],"the":[33,76,89,94,119,131,138,157,165,179],"GPT":[34],"model,":[35],"which":[36],"enables":[37],"it":[38,72,163],"engage":[40],"in":[41,118],"conversations":[43],"with":[44],"users,":[45],"understand":[46],"various":[47,113],"forms":[48],"of":[49,96,115,123,167],"linguistic":[50],"expressions,":[51],"and":[52,56,67,79,106,125,140,151,160,174],"generate":[53],"useful":[54],"information":[55],"suggestions.":[57],"However,":[58],"as":[59],"application":[61],"scope":[62],"expands,":[63],"user":[64],"demand":[65],"grows,":[66],"malicious":[68],"attacks":[69],"related":[70],"become":[73],"frequent,":[75],"security":[77,95,104,171,175],"threats":[78,105],"privacy":[80,107],"risks":[81],"faced":[82],"ChatGPT":[84,97,134,169],"gradually":[86],"coming":[87],"forefront.":[90],"In":[91,143],"this":[92,145],"paper,":[93],"is":[98],"mainly":[99],"studied":[100],"from":[101,178],"two":[102,121],"aspects,":[103],"risks.":[108],"The":[109],"article":[110],"systematically":[111],"analyzes":[112],"types":[114,122],"vulnerabilities":[116],"involved":[117],"above":[120],"problems":[124],"their":[126],"causes.":[127],"Briefly,":[128],"we":[129],"discuss":[130],"controversies":[132],"that":[133],"may":[135],"cause":[136],"at":[137],"ethical":[139],"moral":[141],"levels.":[142],"addition,":[144],"paper":[146],"reproduces":[147],"several":[148],"network":[149],"attack":[150],"defense":[152],"test":[153],"scenarios":[154],"simulating":[156],"attacker's":[158],"perspective":[159],"methodology.":[161],"Simultaneously,":[162],"explores":[164],"feasibility":[166],"using":[168],"for":[170],"vulnerability":[172],"detection":[173],"tool":[176],"generation":[177],"defender's":[180],"perspective.":[181]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
