RAG

Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning

Authors: Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang | Published: 2025-08-27
RAG
RAGへのポイズニング攻撃
プロンプトインジェクション

SoK: Large Language Model Copyright Auditing via Fingerprinting

Authors: Shuo Shao, Yiming Li, Yu He, Hongwei Yao, Wenyuan Yang, Dacheng Tao, Zhan Qin | Published: 2025-08-27
LLMフィンガープリンティング
RAG
プロンプトエンジニアリング

AutoBnB-RAG: Enhancing Multi-Agent Incident Response with Retrieval-Augmented Generation

Authors: Zefang Liu, Arman Anwar | Published: 2025-08-18
RAG
プロトコル手順
マルチエージェントシステム

SoK: Data Minimization in Machine Learning

Authors: Robin Staab, Nikola Jovanović, Kimberly Mai, Prakhar Ganesh, Martin Vechev, Ferdinando Fioretto, Matthew Jagielski | Published: 2025-08-14
RAG
プライバシー評価
差分プライバシー

Advancing Autonomous Incident Response: Leveraging LLMs and Cyber Threat Intelligence

Authors: Amine Tellache, Abdelaziz Amara Korba, Amdjed Mokhtari, Horea Moldovan, Yacine Ghamri-Doudane | Published: 2025-08-14
LLM活用
RAG
フレームワーク

PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction

Authors: Leon Garza, Anantaa Kotal, Aritran Piplai, Lavanya Elluri, Prajit Das, Aman Chadha | Published: 2025-08-07
RAG
性能評価手法
深層学習

Transportation Cyber Incident Awareness through Generative AI-Based Incident Analysis and Retrieval-Augmented Question-Answering Systems

Authors: Ostonya Thomas, Muhaimin Bin Munir, Jean-Michel Tine, Mizanur Rahman, Yuchen Cai, Khandakar Ashrafi Akbar, Md Nahiyan Uddin, Latifur Khan, Trayce Hockstad, Mashrur Chowdhury | Published: 2025-08-04
RAG
交通シミュレーション
透かし

From Semantic Web and MAS to Agentic AI: A Unified Narrative of the Web of Agents

Authors: Tatiana Petrova, Boris Bliznioukov, Aleksandr Puzikov, Radu State | Published: 2025-07-14 | Updated: 2025-07-16
AIエージェントの相互作用
RAG
標準化と相互運用性

Tuning without Peeking: Provable Privacy and Generalization Bounds for LLM Post-Training

Authors: Ismail Labiad, Mathurin Videau, Matthieu Kowalski, Marc Schoenauer, Alessandro Leite, Julia Kempe, Olivier Teytaud | Published: 2025-07-02
RAG
プライバシー保証
差分プライバシー

LLM Embedding-based Attribution (LEA): Quantifying Source Contributions to Generative Model’s Response for Vulnerability Analysis

Authors: Reza Fayyazi, Michael Zuzak, Shanchieh Jay Yang | Published: 2025-06-12 | Updated: 2025-09-03
RAG
トークン分布分析
脆弱性分析