{"id":"https://openalex.org/W7119116855","doi":"https://doi.org/10.48550/arxiv.2601.00936","title":"Emoji-Based Jailbreaking of Large Language Models","display_name":"Emoji-Based Jailbreaking of Large Language Models","publication_year":2026,"publication_date":"2026-01-02","ids":{"openalex":"https://openalex.org/W7119116855","doi":"https://doi.org/10.48550/arxiv.2601.00936"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.00936","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00936","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.00936","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122000475","display_name":"M P V S Gopinadh","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gopinadh, M P V S","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5121982161","display_name":"S Mahaboob Hussain","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hussain, S Mahaboob","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5122000475"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9269000291824341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9269000291824341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.019500000402331352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.01140000019222498,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/emoji","display_name":"Emoji","score":0.9000999927520752},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7049000263214111},{"id":"https://openalex.org/keywords/test","display_name":"Test (biology)","score":0.48829999566078186},{"id":"https://openalex.org/keywords/language-model","display_name":"Language model","score":0.33959999680519104},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.31279999017715454}],"concepts":[{"id":"https://openalex.org/C2779247141","wikidata":"https://www.wikidata.org/wiki/Q1049294","display_name":"Emoji","level":3,"score":0.9000999927520752},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7049000263214111},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6504999995231628},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.4950999915599823},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.48829999566078186},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4471000134944916},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.33959999680519104},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3131999969482422},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.31279999017715454},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.2822999954223633},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27959999442100525},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.27489998936653137},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2572000026702881}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.00936","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00936","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.00936","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00936","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6229701042175293}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Large":[0],"Language":[1],"Models":[2],"(LLMs)":[3],"are":[4,30],"integral":[5],"to":[6,35],"modern":[7],"AI":[8],"applications,":[9],"but":[10],"their":[11],"safety":[12,69,127,145,159],"alignment":[13,70,103,161],"mechanisms":[14,146],"can":[15],"be":[16],"bypassed":[17],"through":[18],"adversarial":[19],"prompt":[20],"engineering.":[21],"This":[22],"study":[23],"investigates":[24],"emoji-based":[25,46,155],"jailbreaking,":[26],"where":[27],"emoji":[28,124],"sequences":[29],"embedded":[31],"in":[32,138,144,157],"textual":[33],"prompts":[34,47],"trigger":[36],"harmful":[37],"and":[38,60,72,80,89,147,160],"unethical":[39],"outputs":[40],"from":[41],"LLMs.":[42,139],"We":[43],"evaluated":[44],"50":[45],"on":[48,123],"four":[49],"open-source":[50],"LLMs:":[51],"Mistral":[52,90],"7B,":[53,56],"Qwen":[54,98],"2":[55,58,87,99],"Gemma":[57,86],"9B,":[59],"Llama":[61],"3":[62],"8B.":[63],"Metrics":[64],"included":[65],"jailbreak":[66],"success":[67,95],"rate,":[68],"adherence,":[71],"latency,":[73],"with":[74],"responses":[75],"categorized":[76],"as":[77],"successful,":[78],"partial":[79],"failed.":[81],"Results":[82],"revealed":[83],"model-specific":[84],"vulnerabilities:":[85],"9B":[88],"7B":[91,100],"exhibited":[92],"10":[93],"%":[94],"rates,":[96],"while":[97],"achieved":[101],"full":[102],"(0%":[104],"success).":[105],"A":[106],"chi-square":[107],"test":[108],"(chi^2":[109],"=":[110],"32.94,":[111],"p":[112],"&lt;":[113],"0.001)":[114],"confirmed":[115],"significant":[116],"inter-model":[117],"differences.":[118],"While":[119],"prior":[120],"works":[121],"focused":[122],"attacks":[125],"targeting":[126],"judges":[128],"or":[129],"classifiers,":[130],"our":[131],"empirical":[132],"analysis":[133],"examines":[134],"direct":[135],"prompt-level":[136,158],"vulnerabilities":[137],"The":[140],"results":[141],"reveal":[142],"limitations":[143],"highlight":[148],"the":[149],"necessity":[150],"for":[151],"systematic":[152],"handling":[153],"of":[154],"representations":[156],"pipelines.":[162]},"counts_by_year":[],"updated_date":"2026-01-08T20:10:11.968330","created_date":"2026-01-08T00:00:00"}
