PhishIntentionLLM: Uncovering Phishing Website Intentions through Multi-Agent Retrieval-Augmented Generation Authors: Wenhao Li, Selvakumar Manickam, Yung-wey Chong, Shankar Karuppayah | Published: 2025-07-21 Poisoning attack on RAGフィッシング攻撃の意図Prompt leaking 2025.07.21 2025.07.23 Literature Database
The Dark Side of LLMs Agent-based Attacks for Complete Computer Takeover Authors: Matteo Lupinacci, Francesco Aurelio Pironti, Francesco Blefari, Francesco Romeo, Luigi Arena, Angelo Furfaro | Published: 2025-07-09 Poisoning attack on RAGIndirect Prompt InjectionBackdoor Detection 2025.07.09 2025.07.11 Literature Database
The Hidden Threat in Plain Text: Attacking RAG Data Loaders Authors: Alberto Castagnaro, Umberto Salviati, Mauro Conti, Luca Pajola, Simeone Pizzi | Published: 2025-07-07 Poisoning attack on RAGLarge Language ModelAdversarial attack 2025.07.07 2025.07.09 Literature Database
CyberRAG: An agentic RAG cyber attack classification and reporting tool Authors: Francesco Blefari, Cristian Cosentino, Francesco Aurelio Pironti, Angelo Furfaro, Fabrizio Marozzo | Published: 2025-07-03 Poisoning attack on RAGVulnerability AnalysisInterpretability 2025.07.03 2025.07.05 Literature Database
A Practical and Secure Byzantine Robust Aggregator Authors: De Zhang Lee, Aashish Kolluri, Prateek Saxena, Ee-Chien Chang | Published: 2025-06-29 | Updated: 2025-07-02 Poisoning attack on RAGPoisoning AttackRobust Classification 2025.06.29 2025.07.04 Literature Database
A Survey of LLM-Driven AI Agent Communication: Protocols, Security Risks, and Defense Countermeasures Authors: Dezhang Kong, Shi Lin, Zhenhua Xu, Zhebo Wang, Minghao Li, Yufeng Li, Yilun Zhang, Zeyang Sha, Yuyuan Li, Changting Lin, Xun Wang, Xuan Liu, Muhammad Khurram Khan, Ningyu Zhang, Chaochao Chen, Meng Han | Published: 2025-06-24 AIエージェント通信Poisoning attack on RAGPrompt validation 2025.06.24 2025.06.26 Literature Database
Your Agent Can Defend Itself against Backdoor Attacks Authors: Li Changjiang, Liang Jiacheng, Cao Bochuan, Chen Jinghui, Wang Ting | Published: 2025-06-10 | Updated: 2025-06-11 Poisoning attack on RAGBackdoor Attack MitigationDefense Method 2025.06.10 2025.06.13 Literature Database
TracLLM: A Generic Framework for Attributing Long Context LLMs Authors: Yanting Wang, Wei Zou, Runpeng Geng, Jinyuan Jia | Published: 2025-06-04 Cooperative Effects with LLMPoisoning attack on RAGEfficiency Evaluation 2025.06.04 2025.06.06 Literature Database
MCP Safety Training: Learning to Refuse Falsely Benign MCP Exploits using Improved Preference Alignment Authors: John Halloran | Published: 2025-05-29 Poisoning attack on RAGAlignment料理材料 2025.05.29 2025.05.31 Literature Database
CPA-RAG:Covert Poisoning Attacks on Retrieval-Augmented Generation in Large Language Models Authors: Chunyang Li, Junwei Zhang, Anda Cheng, Zhuo Ma, Xinghua Li, Jianfeng Ma | Published: 2025-05-26 Poisoning attack on RAGText Generation MethodPoisoning Attack 2025.05.26 2025.05.28 Literature Database