Pr$εε$mpt: Sanitizing Sensitive Prompts for LLMs Authors: Amrita Roy Chowdhury, David Glukhov, Divyam Anshumaan, Prasad Chalasani, Nicolas Papernot, Somesh Jha, Mihir Bellare | Published: 2025-04-07 RAGインダイレクトプロンプトインジェクションプライバシー分析 2025.04.07 文献データベース
Tricking Retrievers with Influential Tokens: An Efficient Black-Box Corpus Poisoning Attack Authors: Cheng Wang, Yiwei Wang, Yujun Cai, Bryan Hooi | Published: 2025-03-27 RAGRAGへのポイズニング攻撃敵対的サンプルの脆弱性 2025.03.27 2025.04.03 文献データベース
Language Models May Verbatim Complete Text They Were Not Explicitly Trained On Authors: Ken Ziyu Liu, Christopher A. Choquette-Choo, Matthew Jagielski, Peter Kairouz, Sanmi Koyejo, Percy Liang, Nicolas Papernot | Published: 2025-03-21 | Updated: 2025-03-25 RAGメンバーシップ開示リスク敵対的攻撃 2025.03.21 2025.04.03 文献データベース
SOSecure: Safer Code Generation with RAG and StackOverflow Discussions Authors: Manisha Mukherjee, Vincent J. Hellendoorn | Published: 2025-03-17 RAGRAGへのポイズニング攻撃脆弱性検出 2025.03.17 2025.04.03 文献データベース
Privacy-Aware RAG: Secure and Isolated Knowledge Retrieval Authors: Pengcheng Zhou, Yinglun Feng, Zhongliang Yang | Published: 2025-03-17 RAGRAGへのポイズニング攻撃暗号学 2025.03.17 2025.04.03 文献データベース
TFHE-Coder: Evaluating LLM-agentic Fully Homomorphic Encryption Code Generation Authors: Mayank Kumar, Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2025-03-15 Few-Shot LearningRAG深層学習 2025.03.15 2025.04.03 文献データベース
RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language Models Authors: Peizhuo Lv, Mengjie Sun, Hao Wang, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Kai Chen, Limin Sun | Published: 2025-01-09 RAGウォーターマーキング透かし評価 2025.01.09 2025.04.03 文献データベース
On the Vulnerability of Applying Retrieval-Augmented Generation within Knowledge-Intensive Application Domains Authors: Xun Xian, Ganghua Wang, Xuan Bi, Jayanth Srinivasa, Ashish Kundu, Charles Fleming, Mingyi Hong, Jie Ding | Published: 2024-09-12 RAGポイズニング 2024.09.12 2025.04.03 文献データベース
A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution Authors: Sampath Rajapaksha, Ruby Rani, Erisa Karafili | Published: 2024-08-12 LLM性能評価RAGサイバーセキュリティ 2024.08.12 2025.04.03 文献データベース
Beyond Words: On Large Language Models Actionability in Mission-Critical Risk Analysis Authors: Matteo Esposito, Francesco Palagiano, Valentina Lenarduzzi, Davide Taibi | Published: 2024-06-11 | Updated: 2024-09-06 LLM性能評価RAGリスク管理 2024.06.11 2025.04.03 文献データベース