RAGRank: Using PageRank to Counter Poisoning in CTI LLM Pipelines Authors: Austin Jia, Avaneesh Ramesh, Zain Shamsi, Daniel Zhang, Alex Liu | Published: 2025-10-23 RAGPoisoning attack on RAGCyber Threat Intelligence 2025.10.23 2025.10.25 Literature Database
The Attribution Story of WhisperGate: An Academic Perspective Authors: Oleksandr Adamov, Anders Carlsson | Published: 2025-10-21 RAGNetwork Threat DetectionInformation Leakage Analysis 2025.10.21 2025.10.23 Literature Database
Benchmarking LLM-Assisted Blue Teaming via Standardized Threat Hunting Authors: Yuqiao Meng, Luoxi Tang, Feiyang Yu, Xi Li, Guanhua Yan, Ping Yang, Zhaohan Xi | Published: 2025-09-28 | Updated: 2025-10-01 RAGSecurity Strategy GenerationEfficient Resolution of Learning Tasks 2025.09.28 2025.10.03 Literature Database
RAG Security and Privacy: Formalizing the Threat Model and Attack Surface Authors: Atousa Arzanipour, Rouzbeh Behnia, Reza Ebrahimi, Kaushik Dutta | Published: 2025-09-24 RAGPoisoning attack on RAGPrivacy Protection Method 2025.09.24 2025.09.26 Literature Database
Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning Authors: Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang | Published: 2025-08-27 RAGPoisoning attack on RAGPrompt Injection 2025.08.27 2025.08.29 Literature Database
SoK: Large Language Model Copyright Auditing via Fingerprinting Authors: Shuo Shao, Yiming Li, Yu He, Hongwei Yao, Wenyuan Yang, Dacheng Tao, Zhan Qin | Published: 2025-08-27 LLMフィンガープリンティングRAGPrompt Engineering 2025.08.27 2025.08.29 Literature Database
AutoBnB-RAG: Enhancing Multi-Agent Incident Response with Retrieval-Augmented Generation Authors: Zefang Liu, Arman Anwar | Published: 2025-08-18 RAGProtocol Procedureマルチエージェントシステム 2025.08.18 2025.08.20 Literature Database
SoK: Data Minimization in Machine Learning Authors: Robin Staab, Nikola Jovanović, Kimberly Mai, Prakhar Ganesh, Martin Vechev, Ferdinando Fioretto, Matthew Jagielski | Published: 2025-08-14 RAGPrivacy AssessmentDifferential Privacy 2025.08.14 2025.08.16 Literature Database
Advancing Autonomous Incident Response: Leveraging LLMs and Cyber Threat Intelligence Authors: Amine Tellache, Abdelaziz Amara Korba, Amdjed Mokhtari, Horea Moldovan, Yacine Ghamri-Doudane | Published: 2025-08-14 LLM活用RAGFramework 2025.08.14 2025.08.16 Literature Database
PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction Authors: Leon Garza, Anantaa Kotal, Aritran Piplai, Lavanya Elluri, Prajit Das, Aman Chadha | Published: 2025-08-07 RAGPerformance Evaluation MethodDeep Learning 2025.08.07 2025.08.09 Literature Database