RAG

LADFA: A Framework of Using Large Language Models and Retrieval-Augmented Generation for Personal Data Flow Analysis in Privacy Policies

Authors: Haiyue Yuan, Nikolay Matyunin, Ali Raza, Shujun Li | Published: 2026-01-15
RAG
RAGへのポイズニング攻撃
プライバシー保護

KryptoPilot: An Open-World Knowledge-Augmented LLM Agent for Automated Cryptographic Exploitation

Authors: Xiaonan Liu, Zhihao Li, Xiao Lan, Hao Ren, Haizhou Wang, Xingshu Chen | Published: 2026-01-14
LLM活用
RAG
RAGへのポイズニング攻撃

SoK: Privacy Risks and Mitigations in Retrieval-Augmented Generation Systems

Authors: Andreea-Elena Bodea, Stephen Meisenbacher, Alexandra Klymenko, Florian Matthes | Published: 2026-01-07
RAG
RAGへのポイズニング攻撃
プライバシー保護技術

Multi-Agent Framework for Threat Mitigation and Resilience in AI-Based Systems

Authors: Armstrong Foundjem, Lionel Nganyewou Tidjon, Leuson Da Silva, Foutse Khomh | Published: 2025-12-29
RAG
モデルDoS
脆弱性優先順位付け

From Retrieval to Reasoning: A Framework for Cyber Threat Intelligence NER with Explicit and Adaptive Instructions

Authors: Jiaren Peng, Hongda Sun, Xuan Tian, Cheng Huang, Zeqing Li, Rui Yan | Published: 2025-12-22
RAG
データ選択戦略
プロンプトリーキング

Uncovering Gaps Between RFC Updates and TCP/IP Implementations: LLM-Facilitated Differential Checks on Intermediate Representations

Authors: Yifan Wu, Xuewei Feng, Yuxiang Yang, Ke Xu | Published: 2025-10-28
RAG
TCP接続特性
脆弱性分析

LLMLogAnalyzer: A Clustering-Based Log Analysis Chatbot using Large Language Models

Authors: Peng Cai, Reza Ryan, Nickson M. Karie | Published: 2025-10-28
RAG
プロンプトインジェクション
ログの異常検知

RAGRank: Using PageRank to Counter Poisoning in CTI LLM Pipelines

Authors: Austin Jia, Avaneesh Ramesh, Zain Shamsi, Daniel Zhang, Alex Liu | Published: 2025-10-23
RAG
RAGへのポイズニング攻撃
サイバー脅威インテリジェンス

The Attribution Story of WhisperGate: An Academic Perspective

Authors: Oleksandr Adamov, Anders Carlsson | Published: 2025-10-21
RAG
ネットワーク脅威検出
情報漏洩分析

Benchmarking LLM-Assisted Blue Teaming via Standardized Threat Hunting

Authors: Yuqiao Meng, Luoxi Tang, Feiyang Yu, Xi Li, Guanhua Yan, Ping Yang, Zhaohan Xi | Published: 2025-09-28 | Updated: 2025-10-01
RAG
セキュリティ戦略生成
学習タスクの効率的な解決