Privacy-Aware RAG: Secure and Isolated Knowledge Retrieval Authors: Pengcheng Zhou, Yinglun Feng, Zhongliang Yang | Published: 2025-03-17 RAGPoisoning attack on RAGCryptography 2025.03.17 2025.05.27 Literature Database
Poison-RAG: Adversarial Data Poisoning Attacks on Retrieval-Augmented Generation in Recommender Systems Authors: Fatemeh Nazary, Yashar Deldjoo, Tommaso di Noia | Published: 2025-01-20 Poisoning attack on RAGTag Selection StrategyPoisoning Attack 2025.01.20 2025.05.27 Literature Database
Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications Authors: Quan Zhang, Binqi Zeng, Chijin Zhou, Gwihwan Go, Heyuan Shi, Yu Jiang | Published: 2024-04-26 Poisoning attack on RAGPrompt leakingPoisoning 2024.04.26 2025.05.27 Literature Database
Poisoning Retrieval Corpora by Injecting Adversarial Passages Authors: Zexuan Zhong, Ziqing Huang, Alexander Wettig, Danqi Chen | Published: 2023-10-29 Poisoning attack on RAGPoisoningAdversarial Example 2023.10.29 2025.05.28 Literature Database
Poisoning Attacks to Graph-Based Recommender Systems Authors: Minghong Fang, Guolei Yang, Neil Zhenqiang Gong, Jia Liu | Published: 2018-09-11 Poisoning attack on RAGPoisoningAdversarial attack 2018.09.11 2025.05.28 Literature Database