Tricking Retrievers with Influential Tokens: An Efficient Black-Box Corpus Poisoning Attack Authors: Cheng Wang, Yiwei Wang, Yujun Cai, Bryan Hooi | Published: 2025-03-27 RAGPoisoning attack on RAGVulnerability of Adversarial Examples 2025.03.27 2025.05.27 Literature Database
Language Models May Verbatim Complete Text They Were Not Explicitly Trained On Authors: Ken Ziyu Liu, Christopher A. Choquette-Choo, Matthew Jagielski, Peter Kairouz, Sanmi Koyejo, Percy Liang, Nicolas Papernot | Published: 2025-03-21 | Updated: 2025-03-25 RAGMembership Disclosure RiskAdversarial attack 2025.03.21 2025.05.27 Literature Database
SOSecure: Safer Code Generation with RAG and StackOverflow Discussions Authors: Manisha Mukherjee, Vincent J. Hellendoorn | Published: 2025-03-17 RAGPoisoning attack on RAGVulnerability detection 2025.03.17 2025.05.27 Literature Database
Privacy-Aware RAG: Secure and Isolated Knowledge Retrieval Authors: Pengcheng Zhou, Yinglun Feng, Zhongliang Yang | Published: 2025-03-17 RAGPoisoning attack on RAGCryptography 2025.03.17 2025.05.27 Literature Database
TFHE-Coder: Evaluating LLM-agentic Fully Homomorphic Encryption Code Generation Authors: Mayank Kumar, Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2025-03-15 Few-Shot LearningRAGDeep Learning 2025.03.15 2025.05.27 Literature Database
SoK: Knowledge is All You Need: Accelerating Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs Authors: Wenrui Cheng, Tiantian Zhu, Chunlin Xiong, Haofei Sun, Zijun Wang, Shunan Jing, Mingqi Lv, Yan Chen | Published: 2025-03-05 | Updated: 2025-04-28 RAGCalculation of Output HarmfulnessAttack Detection 2025.03.05 2025.05.27 Literature Database
RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language Models Authors: Peizhuo Lv, Mengjie Sun, Hao Wang, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Kai Chen, Limin Sun | Published: 2025-01-09 RAGWatermarkingWatermark Evaluation 2025.01.09 2025.05.27 Literature Database
On the Vulnerability of Applying Retrieval-Augmented Generation within Knowledge-Intensive Application Domains Authors: Xun Xian, Ganghua Wang, Xuan Bi, Jayanth Srinivasa, Ashish Kundu, Charles Fleming, Mingyi Hong, Jie Ding | Published: 2024-09-12 RAGPoisoning 2024.09.12 2025.05.27 Literature Database
A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution Authors: Sampath Rajapaksha, Ruby Rani, Erisa Karafili | Published: 2024-08-12 LLM Performance EvaluationRAGCybersecurity 2024.08.12 2025.05.27 Literature Database
Beyond Words: On Large Language Models Actionability in Mission-Critical Risk Analysis Authors: Matteo Esposito, Francesco Palagiano, Valentina Lenarduzzi, Davide Taibi | Published: 2024-06-11 | Updated: 2024-09-06 LLM Performance EvaluationRAGRisk Management 2024.06.11 2025.05.27 Literature Database