Poisoning attack on RAG

CyberRAG: An agentic RAG cyber attack classification and reporting tool

Authors: Francesco Blefari, Cristian Cosentino, Francesco Aurelio Pironti, Angelo Furfaro, Fabrizio Marozzo | Published: 2025-07-03
Poisoning attack on RAG
Vulnerability Analysis
Interpretability

A Practical and Secure Byzantine Robust Aggregator

Authors: De Zhang Lee, Aashish Kolluri, Prateek Saxena, Ee-Chien Chang | Published: 2025-06-29 | Updated: 2025-07-02
Poisoning attack on RAG
Poisoning Attack
Robust Classification

A Survey of LLM-Driven AI Agent Communication: Protocols, Security Risks, and Defense Countermeasures

Authors: Dezhang Kong, Shi Lin, Zhenhua Xu, Zhebo Wang, Minghao Li, Yufeng Li, Yilun Zhang, Zeyang Sha, Yuyuan Li, Changting Lin, Xun Wang, Xuan Liu, Muhammad Khurram Khan, Ningyu Zhang, Chaochao Chen, Meng Han | Published: 2025-06-24
AIエージェント通信
Poisoning attack on RAG
Prompt validation

Your Agent Can Defend Itself against Backdoor Attacks

Authors: Li Changjiang, Liang Jiacheng, Cao Bochuan, Chen Jinghui, Wang Ting | Published: 2025-06-10 | Updated: 2025-06-11
Poisoning attack on RAG
Backdoor Attack Mitigation
Defense Method

TracLLM: A Generic Framework for Attributing Long Context LLMs

Authors: Yanting Wang, Wei Zou, Runpeng Geng, Jinyuan Jia | Published: 2025-06-04
Cooperative Effects with LLM
Poisoning attack on RAG
Efficiency Evaluation

A Large Language Model-Supported Threat Modeling Framework for Transportation Cyber-Physical Systems

Authors: M Sabbir Salek, Mashrur Chowdhury, Muhaimin Bin Munir, Yuchen Cai, Mohammad Imtiaz Hasan, Jean-Michel Tine, Latifur Khan, Mizanur Rahman | Published: 2025-06-01 | Updated: 2025-07-28
Bias Detection in AI Output
Poisoning attack on RAG
Vulnerability Assessment Method

MCP Safety Training: Learning to Refuse Falsely Benign MCP Exploits using Improved Preference Alignment

Authors: John Halloran | Published: 2025-05-29
Poisoning attack on RAG
Alignment
料理材料

CPA-RAG:Covert Poisoning Attacks on Retrieval-Augmented Generation in Large Language Models

Authors: Chunyang Li, Junwei Zhang, Anda Cheng, Zhuo Ma, Xinghua Li, Jianfeng Ma | Published: 2025-05-26
Poisoning attack on RAG
Text Generation Method
Poisoning Attack

Silent Leaks: Implicit Knowledge Extraction Attack on RAG Systems through Benign Queries

Authors: Yuhao Wang, Wenjie Qu, Yanze Jiang, Zichen Liu, Yue Liu, Shengfang Zhai, Yinpeng Dong, Jiaheng Zhang | Published: 2025-05-21
RAG
Poisoning attack on RAG
Privacy Loss Analysis

MARVEL: Multi-Agent RTL Vulnerability Extraction using Large Language Models

Authors: Luca Collini, Baleegh Ahmad, Joey Ah-kiow, Ramesh Karri | Published: 2025-05-17 | Updated: 2025-06-09
Poisoning attack on RAG
Cyber Threat
Prompt Injection