Agentic AI as a Cybersecurity Attack Surface: Threats, Exploits, and Defenses in Runtime Supply Chains Authors: Xiaochong Jiang, Shiqi Yang, Wenting Yang, Yichen Liu, Cheng Ji | Published: 2026-02-23 Poisoning attack on RAGデータ毒性Vulnerability Analysis 2026.02.23 2026.02.25 Literature Database
BadTemplate: A Training-Free Backdoor Attack via Chat Template Against Large Language Models Authors: Zihan Wang, Hongwei Li, Rui Zhang, Wenbo Jiang, Guowen Xu | Published: 2026-02-05 LLM Performance Evaluationデータ毒性Large Language Model 2026.02.05 2026.02.07 Literature Database
Fake or Real: The Impostor Hunt in Texts for Space Operations Authors: Agata Kaczmarek, Dawid Płudowski, Piotr Wilczyński, Przemysław Biecek, Krzysztof Kotowski, Ramez Shendy, Jakub Nalepa, Artur Janicki, Evridiki Ntagiou | Published: 2025-07-17 | Updated: 2025-07-21 データ毒性Detection of MisinformationCalculation of Output Harmfulness 2025.07.17 2025.07.23 Literature Database
Instance-Level Data-Use Auditing of Visual ML Models Authors: Zonghao Huang, Neil Zhenqiang Gong, Michael K. Reiter | Published: 2025-03-28 | Updated: 2025-09-16 データ毒性Detection of Model Extraction AttacksWatermarking Technology 2025.03.28 2025.09.18 Literature Database