Poisoning attack on RAG

An LLM-based Self-Evolving Security Framework for 6G Space-Air-Ground Integrated Networks

Authors: Qi Qin, Xinye Cao, Guoshun Nan, Sihan Chen, Rushan Li, Li Su, Haitao Du, Qimei Cui, Pengxuan Mao, Xiaofeng Tao, Tony Q. S. Quek | Published: 2025-05-06 | Updated: 2025-05-07
Poisoning attack on RAG
Security Strategy Generation
Self-Evolving Framework

Hoist with His Own Petard: Inducing Guardrails to Facilitate Denial-of-Service Attacks on Retrieval-Augmented Generation of LLMs

Authors: Pan Suo, Yu-Ming Shang, San-Chuan Guo, Xi Zhang | Published: 2025-04-30
LLM Performance Evaluation
Poisoning attack on RAG
Attack Type

Traceback of Poisoning Attacks to Retrieval-Augmented Generation

Authors: Baolei Zhang, Haoran Xin, Minghong Fang, Zhuqing Liu, Biao Yi, Tong Li, Zheli Liu | Published: 2025-04-30
Poisoning attack on RAG
Attack Type
Detection of Poisonous Data

BadMoE: Backdooring Mixture-of-Experts LLMs via Optimizing Routing Triggers and Infecting Dormant Experts

Authors: Qingyue Wang, Qi Pang, Xixun Lin, Shuai Wang, Daoyuan Wu | Published: 2025-04-24 | Updated: 2025-04-29
Poisoning attack on RAG
Backdoor Attack Techniques
Attack Method

Give LLMs a Security Course: Securing Retrieval-Augmented Code Generation via Knowledge Injection

Authors: Bo Lin, Shangwen Wang, Yihao Qin, Liqian Chen, Xiaoguang Mao | Published: 2025-04-23
Poisoning attack on RAG
Indirect Prompt Injection
Security of Code Generation

The Digital Cybersecurity Expert: How Far Have We Come?

Authors: Dawei Wang, Geng Zhou, Xianglong Li, Yu Bai, Li Chen, Ting Qin, Jian Sun, Dan Li | Published: 2025-04-16
LLM Performance Evaluation
Poisoning attack on RAG
Prompt Injection

Exploring Backdoor Attack and Defense for LLM-empowered Recommendations

Authors: Liangbo Ning, Wenqi Fan, Qing Li | Published: 2025-04-15
LLM Performance Evaluation
Poisoning attack on RAG
Adversarial Attack Analysis

ControlNET: A Firewall for RAG-based LLM System

Authors: Hongwei Yao, Haoran Shi, Yidou Chen, Yixin Jiang, Cong Wang, Zhan Qin | Published: 2025-04-13 | Updated: 2025-04-17
Poisoning attack on RAG
Indirect Prompt Injection
Data Breach Risk

PR-Attack: Coordinated Prompt-RAG Attacks on Retrieval-Augmented Generation in Large Language Models via Bilevel Optimization

Authors: Yang Jiao, Xiaodong Wang, Kai Yang | Published: 2025-04-10 | Updated: 2025-04-17
LLM Performance Evaluation
Poisoning attack on RAG
Adversarial Attack Assessment

Tricking Retrievers with Influential Tokens: An Efficient Black-Box Corpus Poisoning Attack

Authors: Cheng Wang, Yiwei Wang, Yujun Cai, Bryan Hooi | Published: 2025-03-27
RAG
Poisoning attack on RAG
Vulnerability of Adversarial Examples