Connect the Dots: Knowledge Graph-Guided Crawler Attack on Retrieval-Augmented Generation Systems Authors: Mengyu Yao, Ziqi Zhang, Ning Luo, Shaofei Li, Yifeng Cai, Xiangqun Chen, Yao Guo, Ding Li | Published: 2026-01-22 Poisoning attack on RAGRobustness Evaluation知識グラフ設計 2026.01.22 2026.01.24 Literature Database
Lightweight LLMs for Network Attack Detection in IoT Networks Authors: Piyumi Bhagya Sudasinghe, Kushan Sudheera Kalupahana Liyanage, Harsha S. Gardiyawasam Pussewalage | Published: 2026-01-21 IoT Security RisksLLM活用Poisoning attack on RAG 2026.01.21 2026.01.23 Literature Database
LADFA: A Framework of Using Large Language Models and Retrieval-Augmented Generation for Personal Data Flow Analysis in Privacy Policies Authors: Haiyue Yuan, Nikolay Matyunin, Ali Raza, Shujun Li | Published: 2026-01-15 RAGPoisoning attack on RAGPrivacy Protection 2026.01.15 2026.01.17 Literature Database
KryptoPilot: An Open-World Knowledge-Augmented LLM Agent for Automated Cryptographic Exploitation Authors: Xiaonan Liu, Zhihao Li, Xiao Lan, Hao Ren, Haizhou Wang, Xingshu Chen | Published: 2026-01-14 LLM活用RAGPoisoning attack on RAG 2026.01.14 2026.01.16 Literature Database
SoK: Privacy Risks and Mitigations in Retrieval-Augmented Generation Systems Authors: Andreea-Elena Bodea, Stephen Meisenbacher, Alexandra Klymenko, Florian Matthes | Published: 2026-01-07 RAGPoisoning attack on RAGPrivacy Enhancing Technology 2026.01.07 2026.01.09 Literature Database
Systematization of Knowledge: Security and Safety in the Model Context Protocol Ecosystem Authors: Shiva Gaire, Srijan Gyawali, Saroj Mishra, Suman Niroula, Dilip Thakur, Umesh Yadav | Published: 2025-12-09 Poisoning attack on RAGCybersecurityInformation Security 2025.12.09 2025.12.11 Literature Database
EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations Authors: Xinyun Zhou, Xinfeng Li, Yinan Peng, Ming Xu, Xuanwang Zhang, Miao Yu, Yidong Wang, Xiaojun Jia, Kun Wang, Qingsong Wen, XiaoFeng Wang, Wei Dong | Published: 2025-12-01 Poisoning attack on RAGCybersecurityData Contamination Detection 2025.12.01 2025.12.03 Literature Database
GRAPHTEXTACK: A Realistic Black-Box Node Injection Attack on LLM-Enhanced GNNs Authors: Jiaji Ma, Puja Trivedi, Danai Koutra | Published: 2025-11-16 Poisoning attack on RAGClassification of Malicious ActorsInformation Security 2025.11.16 2025.11.18 Literature Database
Large Language Models for Cyber Security Authors: Raunak Somani, Aswani Kumar Cherukuri | Published: 2025-11-06 Poisoning attack on RAGIndirect Prompt InjectionInformation Security 2025.11.06 2025.11.08 Literature Database
RAGRank: Using PageRank to Counter Poisoning in CTI LLM Pipelines Authors: Austin Jia, Avaneesh Ramesh, Zain Shamsi, Daniel Zhang, Alex Liu | Published: 2025-10-23 RAGPoisoning attack on RAGCyber Threat Intelligence 2025.10.23 2025.10.25 Literature Database