RAG

TFHE-Coder: Evaluating LLM-agentic Fully Homomorphic Encryption Code Generation

Authors: Mayank Kumar, Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2025-03-15
Few-Shot Learning
RAG
Deep Learning

SoK: Knowledge is All You Need: Accelerating Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs

Authors: Wenrui Cheng, Tiantian Zhu, Chunlin Xiong, Haofei Sun, Zijun Wang, Shunan Jing, Mingqi Lv, Yan Chen | Published: 2025-03-05 | Updated: 2025-04-28
RAG
Calculation of Output Harmfulness
Attack Detection

Riddle Me This! Stealthy Membership Inference for Retrieval-Augmented Generation

Authors: Ali Naseh, Yuefeng Peng, Anshuman Suri, Harsh Chaudhari, Alina Oprea, Amir Houmansadr | Published: 2025-02-01 | Updated: 2025-06-30
RAG
Prompt leaking
Membership Inference

RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language Models

Authors: Peizhuo Lv, Mengjie Sun, Hao Wang, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Kai Chen, Limin Sun | Published: 2025-01-09
RAG
Watermarking
Watermark Evaluation

Evaluating and Improving the Robustness of Security Attack Detectors Generated by LLMs

Authors: Samuele Pasini, Jinhan Kim, Tommaso Aiello, Rocio Cabrera Lozoya, Antonino Sabetta, Paolo Tonella | Published: 2024-11-27 | Updated: 2025-09-17
RAG
Poisoning attack on RAG
Evaluation Method

When Machine Unlearning Meets Retrieval-Augmented Generation (RAG): Keep Secret or Forget Knowledge?

Authors: Shang Wang, Tianqing Zhu, Dayong Ye, Wanlei Zhou | Published: 2024-10-20 | Updated: 2025-10-13
RAG
Poisoning attack on RAG
Privacy Enhancing Technology

On the Vulnerability of Applying Retrieval-Augmented Generation within Knowledge-Intensive Application Domains

Authors: Xun Xian, Ganghua Wang, Xuan Bi, Jayanth Srinivasa, Ashish Kundu, Charles Fleming, Mingyi Hong, Jie Ding | Published: 2024-09-12
RAG
Poisoning

A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution

Authors: Sampath Rajapaksha, Ruby Rani, Erisa Karafili | Published: 2024-08-12
LLM Performance Evaluation
RAG
Cybersecurity

Beyond Words: On Large Language Models Actionability in Mission-Critical Risk Analysis

Authors: Matteo Esposito, Francesco Palagiano, Valentina Lenarduzzi, Davide Taibi | Published: 2024-06-11 | Updated: 2024-09-06
LLM Performance Evaluation
RAG
Risk Management

From Local to Global: A Graph RAG Approach to Query-Focused Summarization

Authors: Darren Edge, Ha Trinh, Newman Cheng, Joshua Bradley, Alex Chao, Apurva Mody, Steven Truitt, Dasha Metropolitansky, Robert Osazuwa Ness, Jonathan Larson | Published: 2024-04-24 | Updated: 2025-02-19
RAG
Explainability of Graph Machine Learning
Data Extraction and Analysis