KEPo: Knowledge Evolution Poison on Graph-based Retrieval-Augmented Generation Authors: Qizhi Chen, Chao Qi, Yihong Huang, Muquan Li, Rongzheng Wang, Dongyang Zhang, Ke Qin, Shuang Liang | Published: 2026-03-12 Poisoning attack on RAGデータ毒性Content Specialized for Toxicity Attacks 2026.03.12 2026.03.14 Literature Database
When Safety Becomes a Vulnerability: Exploiting LLM Alignment Homogeneity for Transferable Blocking in RAG Authors: Junchen Li, Chao Qi, Rongzheng Wang, Qizhi Chen, Liang Xu, Di Liang, Bob Simons, Shuang Liang | Published: 2026-03-04 LLM Performance EvaluationRAGPoisoning attack on RAG 2026.03.04 2026.03.06 Literature Database
LLM-enabled Applications Require System-Level Threat Monitoring Authors: Yedi Zhang, Haoyu Wang, Xianglin Yang, Jin Song Dong, Jun Sun | Published: 2026-02-23 Poisoning attack on RAGModel Extraction Attack監視手法 2026.02.23 2026.02.25 Literature Database
Agentic AI as a Cybersecurity Attack Surface: Threats, Exploits, and Defenses in Runtime Supply Chains Authors: Xiaochong Jiang, Shiqi Yang, Wenting Yang, Yichen Liu, Cheng Ji | Published: 2026-02-23 Poisoning attack on RAGデータ毒性Vulnerability Analysis 2026.02.23 2026.02.25 Literature Database
Differentially Private Retrieval-Augmented Generation Authors: Tingting Tang, James Flemings, Yongqin Wang, Murali Annavaram | Published: 2026-02-16 RAGPoisoning attack on RAGDifferential Privacy 2026.02.16 2026.02.18 Literature Database
LLMAC: A Global and Explainable Access Control Framework with Large Language Model Authors: Sharif Noor Zisad, Ragib Hasan | Published: 2026-02-10 LLM Performance EvaluationPoisoning attack on RAGアクセス制御モデル 2026.02.10 2026.02.12 Literature Database
User-Centric Phishing Detection: A RAG and LLM-Based Approach Authors: Abrar Hamed Al Barwani, Abdelaziz Amara Korba, Raja Waseem Anwar | Published: 2026-01-29 LLM Performance EvaluationPoisoning attack on RAGユーザー中心のフィッシング検出 2026.01.29 2026.01.31 Literature Database
Connect the Dots: Knowledge Graph-Guided Crawler Attack on Retrieval-Augmented Generation Systems Authors: Mengyu Yao, Ziqi Zhang, Ning Luo, Shaofei Li, Yifeng Cai, Xiangqun Chen, Yao Guo, Ding Li | Published: 2026-01-22 Poisoning attack on RAGRobustness Evaluation知識グラフ設計 2026.01.22 2026.01.24 Literature Database
Lightweight LLMs for Network Attack Detection in IoT Networks Authors: Piyumi Bhagya Sudasinghe, Kushan Sudheera Kalupahana Liyanage, Harsha S. Gardiyawasam Pussewalage | Published: 2026-01-21 IoT Security RisksLLM活用Poisoning attack on RAG 2026.01.21 2026.01.23 Literature Database
LADFA: A Framework of Using Large Language Models and Retrieval-Augmented Generation for Personal Data Flow Analysis in Privacy Policies Authors: Haiyue Yuan, Nikolay Matyunin, Ali Raza, Shujun Li | Published: 2026-01-15 RAGPoisoning attack on RAGPrivacy Protection 2026.01.15 2026.01.17 Literature Database