Mitigating the OWASP Top 10 For Large Language Models Applications using Intelligent Agents Authors: Mohammad Fasha, Faisal Abul Rub, Nasim Matar, Bilal Sowan, Mohammad Al Khaldy | Published: 2026-01-26 LLM活用RAGSecurity Assurance 2026.01.26 2026.01.28 Literature Database
PAL*M: Property Attestation for Large Generative Models Authors: Prach Chantasantitam, Adam Ilyas Caulfield, Vasisht Duddu, Lachlan J. Gunn, N. Asokan | Published: 2026-01-22 RAGSecurity AssuranceFramework 2026.01.22 2026.01.24 Literature Database
LADFA: A Framework of Using Large Language Models and Retrieval-Augmented Generation for Personal Data Flow Analysis in Privacy Policies Authors: Haiyue Yuan, Nikolay Matyunin, Ali Raza, Shujun Li | Published: 2026-01-15 RAGPoisoning attack on RAGPrivacy Protection 2026.01.15 2026.01.17 Literature Database
KryptoPilot: An Open-World Knowledge-Augmented LLM Agent for Automated Cryptographic Exploitation Authors: Xiaonan Liu, Zhihao Li, Xiao Lan, Hao Ren, Haizhou Wang, Xingshu Chen | Published: 2026-01-14 LLM活用RAGPoisoning attack on RAG 2026.01.14 2026.01.16 Literature Database
SoK: Privacy Risks and Mitigations in Retrieval-Augmented Generation Systems Authors: Andreea-Elena Bodea, Stephen Meisenbacher, Alexandra Klymenko, Florian Matthes | Published: 2026-01-07 RAGPoisoning attack on RAGPrivacy Enhancing Technology 2026.01.07 2026.01.09 Literature Database
Multi-Agent Framework for Threat Mitigation and Resilience in AI-Based Systems Authors: Armstrong Foundjem, Lionel Nganyewou Tidjon, Leuson Da Silva, Foutse Khomh | Published: 2025-12-29 RAGModel DoS脆弱性優先順位付け 2025.12.29 2025.12.31 Literature Database
From Retrieval to Reasoning: A Framework for Cyber Threat Intelligence NER with Explicit and Adaptive Instructions Authors: Jiaren Peng, Hongda Sun, Xuan Tian, Cheng Huang, Zeqing Li, Rui Yan | Published: 2025-12-22 RAGData Selection StrategyPrompt leaking 2025.12.22 2025.12.24 Literature Database
Uncovering Gaps Between RFC Updates and TCP/IP Implementations: LLM-Facilitated Differential Checks on Intermediate Representations Authors: Yifan Wu, Xuewei Feng, Yuxiang Yang, Ke Xu | Published: 2025-10-28 RAGTCP Connection CharacteristicsVulnerability Analysis 2025.10.28 2025.10.30 Literature Database
LLMLogAnalyzer: A Clustering-Based Log Analysis Chatbot using Large Language Models Authors: Peng Cai, Reza Ryan, Nickson M. Karie | Published: 2025-10-28 RAGPrompt InjectionAnomaly Detection in Logs 2025.10.28 2025.10.30 Literature Database
RAGRank: Using PageRank to Counter Poisoning in CTI LLM Pipelines Authors: Austin Jia, Avaneesh Ramesh, Zain Shamsi, Daniel Zhang, Alex Liu | Published: 2025-10-23 RAGPoisoning attack on RAGCyber Threat Intelligence 2025.10.23 2025.10.25 Literature Database