PR-Attack: Coordinated Prompt-RAG Attacks on Retrieval-Augmented Generation in Large Language Models via Bilevel Optimization Authors: Yang Jiao, Xiaodong Wang, Kai Yang | Published: 2025-04-10 | Updated: 2025-04-17 LLM Performance EvaluationPoisoning attack on RAGAdversarial Attack Assessment 2025.04.10 2025.05.12 Literature Database
Tricking Retrievers with Influential Tokens: An Efficient Black-Box Corpus Poisoning Attack Authors: Cheng Wang, Yiwei Wang, Yujun Cai, Bryan Hooi | Published: 2025-03-27 RAGPoisoning attack on RAGVulnerability of Adversarial Examples 2025.03.27 2025.05.12 Literature Database
Bugdar: AI-Augmented Secure Code Review for GitHub Pull Requests Authors: John Naulty, Eason Chen, Joy Wang, George Digkas, Kostas Chalkias | Published: 2025-03-21 Poisoning attack on RAGSystem DevelopmentVulnerability Analysis 2025.03.21 2025.05.12 Literature Database
DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti | Published: 2025-03-20 Poisoning attack on RAGPerformance Evaluation MethodFeature Extraction Method 2025.03.20 2025.05.12 Literature Database
SOSecure: Safer Code Generation with RAG and StackOverflow Discussions Authors: Manisha Mukherjee, Vincent J. Hellendoorn | Published: 2025-03-17 RAGPoisoning attack on RAGVulnerability detection 2025.03.17 2025.05.12 Literature Database
Privacy-Aware RAG: Secure and Isolated Knowledge Retrieval Authors: Pengcheng Zhou, Yinglun Feng, Zhongliang Yang | Published: 2025-03-17 RAGPoisoning attack on RAGCryptography 2025.03.17 2025.05.12 Literature Database
Poison-RAG: Adversarial Data Poisoning Attacks on Retrieval-Augmented Generation in Recommender Systems Authors: Fatemeh Nazary, Yashar Deldjoo, Tommaso di Noia | Published: 2025-01-20 Poisoning attack on RAGTag Selection StrategyPoisoning Attack 2025.01.20 2025.05.12 Literature Database
Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications Authors: Quan Zhang, Binqi Zeng, Chijin Zhou, Gwihwan Go, Heyuan Shi, Yu Jiang | Published: 2024-04-26 Poisoning attack on RAGPrompt leakingPoisoning 2024.04.26 2025.05.12 Literature Database
Poisoning Retrieval Corpora by Injecting Adversarial Passages Authors: Zexuan Zhong, Ziqing Huang, Alexander Wettig, Danqi Chen | Published: 2023-10-29 Poisoning attack on RAGPoisoningAdversarial Example 2023.10.29 2025.05.12 Literature Database
Poisoning Attacks to Graph-Based Recommender Systems Authors: Minghong Fang, Guolei Yang, Neil Zhenqiang Gong, Jia Liu | Published: 2018-09-11 Poisoning attack on RAGPoisoningAdversarial attack 2018.09.11 2025.05.13 Literature Database