Poisoning attack on RAG

LLM-enabled Applications Require System-Level Threat Monitoring

Authors: Yedi Zhang, Haoyu Wang, Xianglin Yang, Jin Song Dong, Jun Sun | Published: 2026-02-23
Poisoning attack on RAG
Model Extraction Attack
監視手法

Agentic AI as a Cybersecurity Attack Surface: Threats, Exploits, and Defenses in Runtime Supply Chains

Authors: Xiaochong Jiang, Shiqi Yang, Wenting Yang, Yichen Liu, Cheng Ji | Published: 2026-02-23
Poisoning attack on RAG
データ毒性
Vulnerability Analysis

Differentially Private Retrieval-Augmented Generation

Authors: Tingting Tang, James Flemings, Yongqin Wang, Murali Annavaram | Published: 2026-02-16
RAG
Poisoning attack on RAG
Differential Privacy

LLMAC: A Global and Explainable Access Control Framework with Large Language Model

Authors: Sharif Noor Zisad, Ragib Hasan | Published: 2026-02-10
LLM Performance Evaluation
Poisoning attack on RAG
アクセス制御モデル

User-Centric Phishing Detection: A RAG and LLM-Based Approach

Authors: Abrar Hamed Al Barwani, Abdelaziz Amara Korba, Raja Waseem Anwar | Published: 2026-01-29
LLM Performance Evaluation
Poisoning attack on RAG
ユーザー中心のフィッシング検出

Connect the Dots: Knowledge Graph-Guided Crawler Attack on Retrieval-Augmented Generation Systems

Authors: Mengyu Yao, Ziqi Zhang, Ning Luo, Shaofei Li, Yifeng Cai, Xiangqun Chen, Yao Guo, Ding Li | Published: 2026-01-22
Poisoning attack on RAG
Robustness Evaluation
知識グラフ設計

Lightweight LLMs for Network Attack Detection in IoT Networks

Authors: Piyumi Bhagya Sudasinghe, Kushan Sudheera Kalupahana Liyanage, Harsha S. Gardiyawasam Pussewalage | Published: 2026-01-21
IoT Security Risks
LLM活用
Poisoning attack on RAG

LADFA: A Framework of Using Large Language Models and Retrieval-Augmented Generation for Personal Data Flow Analysis in Privacy Policies

Authors: Haiyue Yuan, Nikolay Matyunin, Ali Raza, Shujun Li | Published: 2026-01-15
RAG
Poisoning attack on RAG
Privacy Protection

KryptoPilot: An Open-World Knowledge-Augmented LLM Agent for Automated Cryptographic Exploitation

Authors: Xiaonan Liu, Zhihao Li, Xiao Lan, Hao Ren, Haizhou Wang, Xingshu Chen | Published: 2026-01-14
LLM活用
RAG
Poisoning attack on RAG

SoK: Privacy Risks and Mitigations in Retrieval-Augmented Generation Systems

Authors: Andreea-Elena Bodea, Stephen Meisenbacher, Alexandra Klymenko, Florian Matthes | Published: 2026-01-07
RAG
Poisoning attack on RAG
Privacy Enhancing Technology