BadLingual: A Novel Lingual-Backdoor Attack against Large Language Models Authors: Zihan Wang, Hongwei Li, Rui Zhang, Wenbo Jiang, Kangjie Chen, Tianwei Zhang, Qingchuan Zhao, Guowen Xu | Published: 2025-05-06 RAGへのポイズニング攻撃バックドア攻撃対策敵対的学習 2025.05.06 2025.05.12 Literature Database
An LLM-based Self-Evolving Security Framework for 6G Space-Air-Ground Integrated Networks Authors: Qi Qin, Xinye Cao, Guoshun Nan, Sihan Chen, Rushan Li, Li Su, Haitao Du, Qimei Cui, Pengxuan Mao, Xiaofeng Tao, Tony Q. S. Quek | Published: 2025-05-06 | Updated: 2025-05-07 RAGへのポイズニング攻撃セキュリティ戦略生成自己進化型フレームワーク 2025.05.06 2025.05.12 Literature Database
Hoist with His Own Petard: Inducing Guardrails to Facilitate Denial-of-Service Attacks on Retrieval-Augmented Generation of LLMs Authors: Pan Suo, Yu-Ming Shang, San-Chuan Guo, Xi Zhang | Published: 2025-04-30 LLM性能評価RAGへのポイズニング攻撃攻撃タイプ 2025.04.30 2025.05.12 Literature Database
Traceback of Poisoning Attacks to Retrieval-Augmented Generation Authors: Baolei Zhang, Haoran Xin, Minghong Fang, Zhuqing Liu, Biao Yi, Tong Li, Zheli Liu | Published: 2025-04-30 RAGへのポイズニング攻撃攻撃タイプ毒データの検知 2025.04.30 2025.05.12 Literature Database
BadMoE: Backdooring Mixture-of-Experts LLMs via Optimizing Routing Triggers and Infecting Dormant Experts Authors: Qingyue Wang, Qi Pang, Xixun Lin, Shuai Wang, Daoyuan Wu | Published: 2025-04-24 | Updated: 2025-04-29 RAGへのポイズニング攻撃バックドア攻撃手法攻撃手法 2025.04.24 2025.05.12 Literature Database
Give LLMs a Security Course: Securing Retrieval-Augmented Code Generation via Knowledge Injection Authors: Bo Lin, Shangwen Wang, Yihao Qin, Liqian Chen, Xiaoguang Mao | Published: 2025-04-23 RAGへのポイズニング攻撃インダイレクトプロンプトインジェクションコード生成のセキュリティ 2025.04.23 2025.05.12 Literature Database
The Digital Cybersecurity Expert: How Far Have We Come? Authors: Dawei Wang, Geng Zhou, Xianglong Li, Yu Bai, Li Chen, Ting Qin, Jian Sun, Dan Li | Published: 2025-04-16 LLM性能評価RAGへのポイズニング攻撃プロンプトインジェクション 2025.04.16 2025.05.12 Literature Database
Exploring Backdoor Attack and Defense for LLM-empowered Recommendations Authors: Liangbo Ning, Wenqi Fan, Qing Li | Published: 2025-04-15 LLM性能評価RAGへのポイズニング攻撃敵対的攻撃分析 2025.04.15 2025.05.12 Literature Database
ControlNET: A Firewall for RAG-based LLM System Authors: Hongwei Yao, Haoran Shi, Yidou Chen, Yixin Jiang, Cong Wang, Zhan Qin | Published: 2025-04-13 | Updated: 2025-04-17 RAGへのポイズニング攻撃インダイレクトプロンプトインジェクションデータ侵害リスク 2025.04.13 2025.05.12 Literature Database
PR-Attack: Coordinated Prompt-RAG Attacks on Retrieval-Augmented Generation in Large Language Models via Bilevel Optimization Authors: Yang Jiao, Xiaodong Wang, Kai Yang | Published: 2025-04-10 | Updated: 2025-04-17 LLM性能評価RAGへのポイズニング攻撃敵対的攻撃評価 2025.04.10 2025.05.12 Literature Database