When Machine Unlearning Meets Retrieval-Augmented Generation (RAG): Keep Secret or Forget Knowledge? Authors: Shang Wang, Tianqing Zhu, Dayong Ye, Wanlei Zhou | Published: 2024-10-20 | Updated: 2025-10-13 RAGPoisoning attack on RAGPrivacy Enhancing Technology 2024.10.20 2025.10.15 Literature Database
Phantom: General Backdoor Attacks on Retrieval Augmented Language Generation Authors: Harsh Chaudhari, Giorgio Severi, John Abascal, Anshuman Suri, Matthew Jagielski, Christopher A. Choquette-Choo, Milad Nasr, Cristina Nita-Rotaru, Alina Oprea | Published: 2024-05-30 | Updated: 2025-10-01 Poisoning attack on RAGOptimization StrategyStructural Attack 2024.05.30 2025.10.03 Literature Database
Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications Authors: Quan Zhang, Binqi Zeng, Chijin Zhou, Gwihwan Go, Heyuan Shi, Yu Jiang | Published: 2024-04-26 Poisoning attack on RAGPrompt leakingPoisoning 2024.04.26 2025.05.27 Literature Database
Poisoning Retrieval Corpora by Injecting Adversarial Passages Authors: Zexuan Zhong, Ziqing Huang, Alexander Wettig, Danqi Chen | Published: 2023-10-29 Poisoning attack on RAGPoisoningAdversarial Example 2023.10.29 2025.05.28 Literature Database
Poisoning Attacks to Graph-Based Recommender Systems Authors: Minghong Fang, Guolei Yang, Neil Zhenqiang Gong, Jia Liu | Published: 2018-09-11 Poisoning attack on RAGPoisoningAdversarial attack 2018.09.11 2025.05.28 Literature Database