EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations Authors: Xinyun Zhou, Xinfeng Li, Yinan Peng, Ming Xu, Xuanwang Zhang, Miao Yu, Yidong Wang, Xiaojun Jia, Kun Wang, Qingsong Wen, XiaoFeng Wang, Wei Dong | Published: 2025-12-01 Poisoning attack on RAGCybersecurityData Contamination Detection 2025.12.01 2025.12.03 Literature Database
GRAPHTEXTACK: A Realistic Black-Box Node Injection Attack on LLM-Enhanced GNNs Authors: Jiaji Ma, Puja Trivedi, Danai Koutra | Published: 2025-11-16 Poisoning attack on RAGClassification of Malicious ActorsInformation Security 2025.11.16 2025.11.18 Literature Database
Large Language Models for Cyber Security Authors: Raunak Somani, Aswani Kumar Cherukuri | Published: 2025-11-06 Poisoning attack on RAGIndirect Prompt InjectionInformation Security 2025.11.06 2025.11.08 Literature Database
RAGRank: Using PageRank to Counter Poisoning in CTI LLM Pipelines Authors: Austin Jia, Avaneesh Ramesh, Zain Shamsi, Daniel Zhang, Alex Liu | Published: 2025-10-23 RAGPoisoning attack on RAGCyber Threat Intelligence 2025.10.23 2025.10.25 Literature Database
RESCUE: Retrieval Augmented Secure Code Generation Authors: Jiahao Shi, Tianyi Zhang | Published: 2025-10-21 Poisoning attack on RAGData-Driven Vulnerability AssessmentPrompt leaking 2025.10.21 2025.10.23 Literature Database
PLAGUE: Plug-and-play framework for Lifelong Adaptive Generation of Multi-turn Exploits Authors: Neeladri Bhuiya, Madhav Aggarwal, Diptanshu Purwar | Published: 2025-10-20 | Updated: 2025-10-22 Poisoning attack on RAG攻撃者ターゲット更新脱獄手法 2025.10.20 2025.10.24 Literature Database
RAG Security and Privacy: Formalizing the Threat Model and Attack Surface Authors: Atousa Arzanipour, Rouzbeh Behnia, Reza Ebrahimi, Kaushik Dutta | Published: 2025-09-24 RAGPoisoning attack on RAGPrivacy Protection Method 2025.09.24 2025.09.26 Literature Database
Adversarial Distilled Retrieval-Augmented Guarding Model for Online Malicious Intent Detection Authors: Yihao Guo, Haocheng Bian, Liutong Zhou, Ze Wang, Zhaoyi Zhang, Francois Kawala, Milan Dean, Ian Fischer, Yuantao Peng, Noyan Tokgozoglu, Ivan Barrientos, Riyaaz Shaik, Rachel Li, Chandru Venkataraman, Reza Shifteh Far, Moses Pawar, Venkat Sundaranatha, Michael Xu, Frank Chu | Published: 2025-09-18 Poisoning attack on RAGOnline LearningRobustness 2025.09.18 2025.09.20 Literature Database
Who Taught the Lie? Responsibility Attribution for Poisoned Knowledge in Retrieval-Augmented Generation Authors: Baolei Zhang, Haoran Xin, Yuxi Chen, Zhuqing Liu, Biao Yi, Tong Li, Lihai Nie, Zheli Liu, Minghong Fang | Published: 2025-09-17 Poisoning attack on RAGEvaluation Method責任帰属システム設計 2025.09.17 2025.09.19 Literature Database
AI Agentic Vulnerability Injection And Transformation with Optimized Reasoning Authors: Amine Lbath, Massih-Reza Amini, Aurelien Delaitre, Vadim Okun | Published: 2025-08-28 Poisoning attack on RAGIndirect Prompt InjectionVulnerability Analysis 2025.08.28 2025.09.01 Literature Database