Poisoning attack on RAG

SoK: The Attack Surface of Agentic AI — Tools, and Autonomy

Authors: Ali Dehghantanha, Sajad Homayoun | Published: 2026-03-24
RAG
Poisoning attack on RAG
Risk Management

Towards Secure Retrieval-Augmented Generation: A Comprehensive Review of Threats, Defenses and Benchmarks

Authors: Yanming Mu, Hao Hu, Feiyang Li, Qiao Yuan, Jiang Wu, Zichuan Liu, Pengcheng Liu, Mei Wang, Hongwei Zhou, Yuling Liu | Published: 2026-03-23
RAG
Poisoning attack on RAG
データ毒性攻撃

Network- and Device-Level Cyber Deception for Contested Environments Using RL and LLMs

Authors: Abhijeet Sahu, Shuva Paul, Rochard Macwan | Published: 2026-03-18
LLM Performance Evaluation
Poisoning attack on RAG
Evaluation Method

KEPo: Knowledge Evolution Poison on Graph-based Retrieval-Augmented Generation

Authors: Qizhi Chen, Chao Qi, Yihong Huang, Muquan Li, Rongzheng Wang, Dongyang Zhang, Ke Qin, Shuang Liang | Published: 2026-03-12
Poisoning attack on RAG
データ毒性
Content Specialized for Toxicity Attacks

When Safety Becomes a Vulnerability: Exploiting LLM Alignment Homogeneity for Transferable Blocking in RAG

Authors: Junchen Li, Chao Qi, Rongzheng Wang, Qizhi Chen, Liang Xu, Di Liang, Bob Simons, Shuang Liang | Published: 2026-03-04
LLM Performance Evaluation
RAG
Poisoning attack on RAG

LLM-enabled Applications Require System-Level Threat Monitoring

Authors: Yedi Zhang, Haoyu Wang, Xianglin Yang, Jin Song Dong, Jun Sun | Published: 2026-02-23
Poisoning attack on RAG
Model Extraction Attack
監視手法

Agentic AI as a Cybersecurity Attack Surface: Threats, Exploits, and Defenses in Runtime Supply Chains

Authors: Xiaochong Jiang, Shiqi Yang, Wenting Yang, Yichen Liu, Cheng Ji | Published: 2026-02-23
Poisoning attack on RAG
データ毒性
Vulnerability Analysis

Differentially Private Retrieval-Augmented Generation

Authors: Tingting Tang, James Flemings, Yongqin Wang, Murali Annavaram | Published: 2026-02-16
RAG
Poisoning attack on RAG
Differential Privacy

LLMAC: A Global and Explainable Access Control Framework with Large Language Model

Authors: Sharif Noor Zisad, Ragib Hasan | Published: 2026-02-10
LLM Performance Evaluation
Poisoning attack on RAG
アクセス制御モデル

User-Centric Phishing Detection: A RAG and LLM-Based Approach

Authors: Abrar Hamed Al Barwani, Abdelaziz Amara Korba, Raja Waseem Anwar | Published: 2026-01-29
LLM Performance Evaluation
Poisoning attack on RAG
ユーザー中心のフィッシング検出