Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning Authors: Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang | Published: 2025-08-27 RAGRAGへのポイズニング攻撃プロンプトインジェクション 2025.08.27 文献データベース
SoK: Large Language Model Copyright Auditing via Fingerprinting Authors: Shuo Shao, Yiming Li, Yu He, Hongwei Yao, Wenyuan Yang, Dacheng Tao, Zhan Qin | Published: 2025-08-27 LLMフィンガープリンティングRAGプロンプトエンジニアリング 2025.08.27 文献データベース
AutoBnB-RAG: Enhancing Multi-Agent Incident Response with Retrieval-Augmented Generation Authors: Zefang Liu, Arman Anwar | Published: 2025-08-18 RAGプロトコル手順マルチエージェントシステム 2025.08.18 文献データベース
SoK: Data Minimization in Machine Learning Authors: Robin Staab, Nikola Jovanović, Kimberly Mai, Prakhar Ganesh, Martin Vechev, Ferdinando Fioretto, Matthew Jagielski | Published: 2025-08-14 RAGプライバシー評価差分プライバシー 2025.08.14 文献データベース
Advancing Autonomous Incident Response: Leveraging LLMs and Cyber Threat Intelligence Authors: Amine Tellache, Abdelaziz Amara Korba, Amdjed Mokhtari, Horea Moldovan, Yacine Ghamri-Doudane | Published: 2025-08-14 LLM活用RAGフレームワーク 2025.08.14 文献データベース
PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction Authors: Leon Garza, Anantaa Kotal, Aritran Piplai, Lavanya Elluri, Prajit Das, Aman Chadha | Published: 2025-08-07 RAG性能評価手法深層学習 2025.08.07 文献データベース
Transportation Cyber Incident Awareness through Generative AI-Based Incident Analysis and Retrieval-Augmented Question-Answering Systems Authors: Ostonya Thomas, Muhaimin Bin Munir, Jean-Michel Tine, Mizanur Rahman, Yuchen Cai, Khandakar Ashrafi Akbar, Md Nahiyan Uddin, Latifur Khan, Trayce Hockstad, Mashrur Chowdhury | Published: 2025-08-04 RAG交通シミュレーション透かし 2025.08.04 文献データベース
From Semantic Web and MAS to Agentic AI: A Unified Narrative of the Web of Agents Authors: Tatiana Petrova, Boris Bliznioukov, Aleksandr Puzikov, Radu State | Published: 2025-07-14 | Updated: 2025-07-16 AIエージェントの相互作用RAG標準化と相互運用性 2025.07.14 文献データベース
Tuning without Peeking: Provable Privacy and Generalization Bounds for LLM Post-Training Authors: Ismail Labiad, Mathurin Videau, Matthieu Kowalski, Marc Schoenauer, Alessandro Leite, Julia Kempe, Olivier Teytaud | Published: 2025-07-02 RAGプライバシー保証差分プライバシー 2025.07.02 文献データベース
LLM Embedding-based Attribution (LEA): Quantifying Source Contributions to Generative Model’s Response for Vulnerability Analysis Authors: Reza Fayyazi, Michael Zuzak, Shanchieh Jay Yang | Published: 2025-06-12 | Updated: 2025-09-03 RAGトークン分布分析脆弱性分析 2025.06.12 文献データベース