RAG

Uncovering Gaps Between RFC Updates and TCP/IP Implementations: LLM-Facilitated Differential Checks on Intermediate Representations

Authors: Yifan Wu, Xuewei Feng, Yuxiang Yang, Ke Xu | Published: 2025-10-28
RAG
TCP Connection Characteristics
Vulnerability Analysis

LLMLogAnalyzer: A Clustering-Based Log Analysis Chatbot using Large Language Models

Authors: Peng Cai, Reza Ryan, Nickson M. Karie | Published: 2025-10-28
RAG
Prompt Injection
Anomaly Detection in Logs

RAGRank: Using PageRank to Counter Poisoning in CTI LLM Pipelines

Authors: Austin Jia, Avaneesh Ramesh, Zain Shamsi, Daniel Zhang, Alex Liu | Published: 2025-10-23
RAG
Poisoning attack on RAG
Cyber Threat Intelligence

The Attribution Story of WhisperGate: An Academic Perspective

Authors: Oleksandr Adamov, Anders Carlsson | Published: 2025-10-21
RAG
Network Threat Detection
Information Leakage Analysis

Benchmarking LLM-Assisted Blue Teaming via Standardized Threat Hunting

Authors: Yuqiao Meng, Luoxi Tang, Feiyang Yu, Xi Li, Guanhua Yan, Ping Yang, Zhaohan Xi | Published: 2025-09-28 | Updated: 2025-10-01
RAG
Security Strategy Generation
Efficient Resolution of Learning Tasks

RAG Security and Privacy: Formalizing the Threat Model and Attack Surface

Authors: Atousa Arzanipour, Rouzbeh Behnia, Reza Ebrahimi, Kaushik Dutta | Published: 2025-09-24
RAG
Poisoning attack on RAG
Privacy Protection Method

Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning

Authors: Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang | Published: 2025-08-27
RAG
Poisoning attack on RAG
Prompt Injection

SoK: Large Language Model Copyright Auditing via Fingerprinting

Authors: Shuo Shao, Yiming Li, Yu He, Hongwei Yao, Wenyuan Yang, Dacheng Tao, Zhan Qin | Published: 2025-08-27
LLMフィンガープリンティング
RAG
Prompt Engineering

AutoBnB-RAG: Enhancing Multi-Agent Incident Response with Retrieval-Augmented Generation

Authors: Zefang Liu, Arman Anwar | Published: 2025-08-18
RAG
Protocol Procedure
マルチエージェントシステム

SoK: Data Minimization in Machine Learning

Authors: Robin Staab, Nikola Jovanović, Kimberly Mai, Prakhar Ganesh, Martin Vechev, Ferdinando Fioretto, Matthew Jagielski | Published: 2025-08-14
RAG
Privacy Assessment
Differential Privacy