Who Taught the Lie? Responsibility Attribution for Poisoned Knowledge in Retrieval-Augmented Generation Authors: Baolei Zhang, Haoran Xin, Yuxi Chen, Zhuqing Liu, Biao Yi, Tong Li, Lihai Nie, Zheli Liu, Minghong Fang | Published: 2025-09-17 Poisoning attack on RAGEvaluation Method責任帰属システム設計 2025.09.17 2025.09.19 Literature Database
AI Agentic Vulnerability Injection And Transformation with Optimized Reasoning Authors: Amine Lbath, Massih-Reza Amini, Aurelien Delaitre, Vadim Okun | Published: 2025-08-28 Poisoning attack on RAGIndirect Prompt InjectionVulnerability Analysis 2025.08.28 2025.09.01 Literature Database
Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning Authors: Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang | Published: 2025-08-27 RAGPoisoning attack on RAGPrompt Injection 2025.08.27 2025.08.29 Literature Database
Incident Response Planning Using a Lightweight Large Language Model with Reduced Hallucination Authors: Kim Hammar, Tansu Alpcan, Emil C. Lupu | Published: 2025-08-07 Poisoning attack on RAGReinforcement LearningPerformance Evaluation Method 2025.08.07 2025.08.09 Literature Database
Fine-Grained Privacy Extraction from Retrieval-Augmented Generation Systems via Knowledge Asymmetry Exploitation Authors: Yufei Chen, Yao Wang, Haibin Zhang, Tao Gu | Published: 2025-07-31 Poisoning attack on RAGPrivacy AssessmentRobustness of Watermarking Techniques 2025.07.31 2025.08.02 Literature Database
PhishIntentionLLM: Uncovering Phishing Website Intentions through Multi-Agent Retrieval-Augmented Generation Authors: Wenhao Li, Selvakumar Manickam, Yung-wey Chong, Shankar Karuppayah | Published: 2025-07-21 Poisoning attack on RAGフィッシング攻撃の意図Prompt leaking 2025.07.21 2025.07.23 Literature Database
The Dark Side of LLMs Agent-based Attacks for Complete Computer Takeover Authors: Matteo Lupinacci, Francesco Aurelio Pironti, Francesco Blefari, Francesco Romeo, Luigi Arena, Angelo Furfaro | Published: 2025-07-09 Poisoning attack on RAGIndirect Prompt InjectionBackdoor Detection 2025.07.09 2025.07.11 Literature Database
The Hidden Threat in Plain Text: Attacking RAG Data Loaders Authors: Alberto Castagnaro, Umberto Salviati, Mauro Conti, Luca Pajola, Simeone Pizzi | Published: 2025-07-07 Poisoning attack on RAGLarge Language ModelAdversarial attack 2025.07.07 2025.07.09 Literature Database
CyberRAG: An agentic RAG cyber attack classification and reporting tool Authors: Francesco Blefari, Cristian Cosentino, Francesco Aurelio Pironti, Angelo Furfaro, Fabrizio Marozzo | Published: 2025-07-03 Poisoning attack on RAGVulnerability AnalysisInterpretability 2025.07.03 2025.07.05 Literature Database
A Practical and Secure Byzantine Robust Aggregator Authors: De Zhang Lee, Aashish Kolluri, Prateek Saxena, Ee-Chien Chang | Published: 2025-06-29 | Updated: 2025-07-02 Poisoning attack on RAGPoisoning AttackRobust Classification 2025.06.29 2025.07.04 Literature Database