Merge Hijacking: Backdoor Attacks to Model Merging of Large Language Models Authors: Zenghui Yuan, Yangming Xu, Jiawen Shi, Pan Zhou, Lichao Sun | Published: 2025-05-29 LLM SecurityPoisoning AttackModel Protection Methods 2025.05.29 2025.05.31 Literature Database
CPA-RAG:Covert Poisoning Attacks on Retrieval-Augmented Generation in Large Language Models Authors: Chunyang Li, Junwei Zhang, Anda Cheng, Zhuo Ma, Xinghua Li, Jianfeng Ma | Published: 2025-05-26 Poisoning attack on RAGText Generation MethodPoisoning Attack 2025.05.26 2025.05.28 Literature Database
Does Low Rank Adaptation Lead to Lower Robustness against Training-Time Attacks? Authors: Zi Liang, Haibo Hu, Qingqing Ye, Yaxin Xiao, Ronghua Li | Published: 2025-05-19 LLM SecurityPoisoning Attackrobustness requirements 2025.05.19 2025.05.28 Literature Database
One Shot Dominance: Knowledge Poisoning Attack on Retrieval-Augmented Generation Systems Authors: Zhiyuan Chang, Mingyang Li, Xiaojun Jia, Junjie Wang, Yuekai Huang, Ziyou Jiang, Yang Liu, Qing Wang | Published: 2025-05-15 | Updated: 2025-05-20 Poisoning attack on RAGPoisoningPoisoning Attack 2025.05.15 2025.05.28 Literature Database
Poison-RAG: Adversarial Data Poisoning Attacks on Retrieval-Augmented Generation in Recommender Systems Authors: Fatemeh Nazary, Yashar Deldjoo, Tommaso di Noia | Published: 2025-01-20 Poisoning attack on RAGTag Selection StrategyPoisoning Attack 2025.01.20 2025.05.27 Literature Database
Learning to Poison Large Language Models for Downstream Manipulation Authors: Xiangyu Zhou, Yao Qiang, Saleh Zare Zade, Mohammad Amin Roshani, Prashant Khanduri, Douglas Zytko, Dongxiao Zhu | Published: 2024-02-21 | Updated: 2025-05-29 LLM SecurityBackdoor AttackPoisoning Attack 2024.02.21 2025.05.31 Literature Database
PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models Authors: Wei Zou, Runpeng Geng, Binghui Wang, Jinyuan Jia | Published: 2024-02-12 | Updated: 2024-08-13 Prompt InjectionPoisoningPoisoning Attack 2024.02.12 2025.05.27 Literature Database
Data Poisoning for In-context Learning Authors: Pengfei He, Han Xu, Yue Xing, Hui Liu, Makoto Yamada, Jiliang Tang | Published: 2024-02-03 | Updated: 2025-06-02 PoisoningPoisoning AttackDetection of Misinformation 2024.02.03 2025.06.04 Literature Database
Towards Efficient and Certified Recovery from Poisoning Attacks in Federated Learning Authors: Yu Jiang, Jiyuan Shen, Ziyao Liu, Chee Wei Tan, Kwok-Yan Lam | Published: 2024-01-16 | Updated: 2024-01-19 PoisoningPoisoning AttackFederated Learning 2024.01.16 2025.05.27 Literature Database
Forcing Generative Models to Degenerate Ones: The Power of Data Poisoning Attacks Authors: Shuli Jiang, Swanand Ravindra Kadhe, Yi Zhou, Ling Cai, Nathalie Baracaldo | Published: 2023-12-07 LLM SecurityPoisoning AttackModel Performance Evaluation 2023.12.07 2025.05.28 Literature Database