DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti | Published: 2025-03-20 Poisoning attack on RAGPerformance Evaluation MethodFeature Extraction Method 2025.03.20 2025.05.27 Literature Database
SOSecure: Safer Code Generation with RAG and StackOverflow Discussions Authors: Manisha Mukherjee, Vincent J. Hellendoorn | Published: 2025-03-17 RAGPoisoning attack on RAGVulnerability detection 2025.03.17 2025.05.27 Literature Database
Privacy-Aware RAG: Secure and Isolated Knowledge Retrieval Authors: Pengcheng Zhou, Yinglun Feng, Zhongliang Yang | Published: 2025-03-17 RAGPoisoning attack on RAGCryptography 2025.03.17 2025.05.27 Literature Database
Poison-RAG: Adversarial Data Poisoning Attacks on Retrieval-Augmented Generation in Recommender Systems Authors: Fatemeh Nazary, Yashar Deldjoo, Tommaso di Noia | Published: 2025-01-20 Poisoning attack on RAGTag Selection StrategyPoisoning Attack 2025.01.20 2025.05.27 Literature Database
Evaluating and Improving the Robustness of Security Attack Detectors Generated by LLMs Authors: Samuele Pasini, Jinhan Kim, Tommaso Aiello, Rocio Cabrera Lozoya, Antonino Sabetta, Paolo Tonella | Published: 2024-11-27 | Updated: 2025-09-17 RAGPoisoning attack on RAGEvaluation Method 2024.11.27 2025.09.19 Literature Database
When Machine Unlearning Meets Retrieval-Augmented Generation (RAG): Keep Secret or Forget Knowledge? Authors: Shang Wang, Tianqing Zhu, Dayong Ye, Wanlei Zhou | Published: 2024-10-20 | Updated: 2025-10-13 RAGPoisoning attack on RAGPrivacy Enhancing Technology 2024.10.20 2025.10.15 Literature Database
Phantom: General Backdoor Attacks on Retrieval Augmented Language Generation Authors: Harsh Chaudhari, Giorgio Severi, John Abascal, Anshuman Suri, Matthew Jagielski, Christopher A. Choquette-Choo, Milad Nasr, Cristina Nita-Rotaru, Alina Oprea | Published: 2024-05-30 | Updated: 2025-10-01 Poisoning attack on RAGOptimization StrategyStructural Attack 2024.05.30 2025.10.03 Literature Database
Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications Authors: Quan Zhang, Binqi Zeng, Chijin Zhou, Gwihwan Go, Heyuan Shi, Yu Jiang | Published: 2024-04-26 Poisoning attack on RAGPrompt leakingPoisoning 2024.04.26 2025.05.27 Literature Database
Poisoning Retrieval Corpora by Injecting Adversarial Passages Authors: Zexuan Zhong, Ziqing Huang, Alexander Wettig, Danqi Chen | Published: 2023-10-29 Poisoning attack on RAGPoisoningAdversarial Example 2023.10.29 2025.05.28 Literature Database
Poisoning Attacks to Graph-Based Recommender Systems Authors: Minghong Fang, Guolei Yang, Neil Zhenqiang Gong, Jia Liu | Published: 2018-09-11 Poisoning attack on RAGPoisoningAdversarial attack 2018.09.11 2025.05.28 Literature Database