LLMAC: A Global and Explainable Access Control Framework with Large Language Model Authors: Sharif Noor Zisad, Ragib Hasan | Published: 2026-02-10 LLM Performance EvaluationPoisoning attack on RAGアクセス制御モデル 2026.02.10 2026.02.12 Literature Database
User-Centric Phishing Detection: A RAG and LLM-Based Approach Authors: Abrar Hamed Al Barwani, Abdelaziz Amara Korba, Raja Waseem Anwar | Published: 2026-01-29 LLM Performance EvaluationPoisoning attack on RAGユーザー中心のフィッシング検出 2026.01.29 2026.01.31 Literature Database
Connect the Dots: Knowledge Graph-Guided Crawler Attack on Retrieval-Augmented Generation Systems Authors: Mengyu Yao, Ziqi Zhang, Ning Luo, Shaofei Li, Yifeng Cai, Xiangqun Chen, Yao Guo, Ding Li | Published: 2026-01-22 Poisoning attack on RAGRobustness Evaluation知識グラフ設計 2026.01.22 2026.01.24 Literature Database
Lightweight LLMs for Network Attack Detection in IoT Networks Authors: Piyumi Bhagya Sudasinghe, Kushan Sudheera Kalupahana Liyanage, Harsha S. Gardiyawasam Pussewalage | Published: 2026-01-21 IoT Security RisksLLM活用Poisoning attack on RAG 2026.01.21 2026.01.23 Literature Database
LADFA: A Framework of Using Large Language Models and Retrieval-Augmented Generation for Personal Data Flow Analysis in Privacy Policies Authors: Haiyue Yuan, Nikolay Matyunin, Ali Raza, Shujun Li | Published: 2026-01-15 RAGPoisoning attack on RAGPrivacy Protection 2026.01.15 2026.01.17 Literature Database
KryptoPilot: An Open-World Knowledge-Augmented LLM Agent for Automated Cryptographic Exploitation Authors: Xiaonan Liu, Zhihao Li, Xiao Lan, Hao Ren, Haizhou Wang, Xingshu Chen | Published: 2026-01-14 LLM活用RAGPoisoning attack on RAG 2026.01.14 2026.01.16 Literature Database
SoK: Privacy Risks and Mitigations in Retrieval-Augmented Generation Systems Authors: Andreea-Elena Bodea, Stephen Meisenbacher, Alexandra Klymenko, Florian Matthes | Published: 2026-01-07 RAGPoisoning attack on RAGPrivacy Enhancing Technology 2026.01.07 2026.01.09 Literature Database
Systematization of Knowledge: Security and Safety in the Model Context Protocol Ecosystem Authors: Shiva Gaire, Srijan Gyawali, Saroj Mishra, Suman Niroula, Dilip Thakur, Umesh Yadav | Published: 2025-12-09 Poisoning attack on RAGCybersecurityInformation Security 2025.12.09 2025.12.11 Literature Database
EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations Authors: Xinyun Zhou, Xinfeng Li, Yinan Peng, Ming Xu, Xuanwang Zhang, Miao Yu, Yidong Wang, Xiaojun Jia, Kun Wang, Qingsong Wen, XiaoFeng Wang, Wei Dong | Published: 2025-12-01 Poisoning attack on RAGCybersecurityData Contamination Detection 2025.12.01 2025.12.03 Literature Database
GRAPHTEXTACK: A Realistic Black-Box Node Injection Attack on LLM-Enhanced GNNs Authors: Jiaji Ma, Puja Trivedi, Danai Koutra | Published: 2025-11-16 Poisoning attack on RAGClassification of Malicious ActorsInformation Security 2025.11.16 2025.11.18 Literature Database