CyberRAG: An agentic RAG cyber attack classification and reporting tool Authors: Francesco Blefari, Cristian Cosentino, Francesco Aurelio Pironti, Angelo Furfaro, Fabrizio Marozzo | Published: 2025-07-03 Poisoning attack on RAGVulnerability AnalysisInterpretability 2025.07.03 2025.07.05 Literature Database
A Practical and Secure Byzantine Robust Aggregator Authors: De Zhang Lee, Aashish Kolluri, Prateek Saxena, Ee-Chien Chang | Published: 2025-06-29 | Updated: 2025-07-02 Poisoning attack on RAGPoisoning AttackRobust Classification 2025.06.29 2025.07.04 Literature Database
A Survey of LLM-Driven AI Agent Communication: Protocols, Security Risks, and Defense Countermeasures Authors: Dezhang Kong, Shi Lin, Zhenhua Xu, Zhebo Wang, Minghao Li, Yufeng Li, Yilun Zhang, Zeyang Sha, Yuyuan Li, Changting Lin, Xun Wang, Xuan Liu, Muhammad Khurram Khan, Ningyu Zhang, Chaochao Chen, Meng Han | Published: 2025-06-24 AIエージェント通信Poisoning attack on RAGPrompt validation 2025.06.24 2025.06.26 Literature Database
Your Agent Can Defend Itself against Backdoor Attacks Authors: Li Changjiang, Liang Jiacheng, Cao Bochuan, Chen Jinghui, Wang Ting | Published: 2025-06-10 | Updated: 2025-06-11 Poisoning attack on RAGBackdoor Attack MitigationDefense Method 2025.06.10 2025.06.13 Literature Database
TracLLM: A Generic Framework for Attributing Long Context LLMs Authors: Yanting Wang, Wei Zou, Runpeng Geng, Jinyuan Jia | Published: 2025-06-04 Cooperative Effects with LLMPoisoning attack on RAGEfficiency Evaluation 2025.06.04 2025.06.06 Literature Database
A Large Language Model-Supported Threat Modeling Framework for Transportation Cyber-Physical Systems Authors: M Sabbir Salek, Mashrur Chowdhury, Muhaimin Bin Munir, Yuchen Cai, Mohammad Imtiaz Hasan, Jean-Michel Tine, Latifur Khan, Mizanur Rahman | Published: 2025-06-01 | Updated: 2025-07-28 Bias Detection in AI OutputPoisoning attack on RAGVulnerability Assessment Method 2025.06.01 2025.07.30 Literature Database
MCP Safety Training: Learning to Refuse Falsely Benign MCP Exploits using Improved Preference Alignment Authors: John Halloran | Published: 2025-05-29 Poisoning attack on RAGAlignment料理材料 2025.05.29 2025.05.31 Literature Database
CPA-RAG:Covert Poisoning Attacks on Retrieval-Augmented Generation in Large Language Models Authors: Chunyang Li, Junwei Zhang, Anda Cheng, Zhuo Ma, Xinghua Li, Jianfeng Ma | Published: 2025-05-26 Poisoning attack on RAGText Generation MethodPoisoning Attack 2025.05.26 2025.05.28 Literature Database
Silent Leaks: Implicit Knowledge Extraction Attack on RAG Systems through Benign Queries Authors: Yuhao Wang, Wenjie Qu, Yanze Jiang, Zichen Liu, Yue Liu, Shengfang Zhai, Yinpeng Dong, Jiaheng Zhang | Published: 2025-05-21 RAGPoisoning attack on RAGPrivacy Loss Analysis 2025.05.21 2025.05.28 Literature Database
MARVEL: Multi-Agent RTL Vulnerability Extraction using Large Language Models Authors: Luca Collini, Baleegh Ahmad, Joey Ah-kiow, Ramesh Karri | Published: 2025-05-17 | Updated: 2025-06-09 Poisoning attack on RAGCyber ThreatPrompt Injection 2025.05.17 2025.06.11 Literature Database