LADFA: A Framework of Using Large Language Models and Retrieval-Augmented Generation for Personal Data Flow Analysis in Privacy Policies Authors: Haiyue Yuan, Nikolay Matyunin, Ali Raza, Shujun Li | Published: 2026-01-15 RAGRAGへのポイズニング攻撃プライバシー保護 2026.01.15 文献データベース
KryptoPilot: An Open-World Knowledge-Augmented LLM Agent for Automated Cryptographic Exploitation Authors: Xiaonan Liu, Zhihao Li, Xiao Lan, Hao Ren, Haizhou Wang, Xingshu Chen | Published: 2026-01-14 LLM活用RAGRAGへのポイズニング攻撃 2026.01.14 文献データベース
SoK: Privacy Risks and Mitigations in Retrieval-Augmented Generation Systems Authors: Andreea-Elena Bodea, Stephen Meisenbacher, Alexandra Klymenko, Florian Matthes | Published: 2026-01-07 RAGRAGへのポイズニング攻撃プライバシー保護技術 2026.01.07 文献データベース
Multi-Agent Framework for Threat Mitigation and Resilience in AI-Based Systems Authors: Armstrong Foundjem, Lionel Nganyewou Tidjon, Leuson Da Silva, Foutse Khomh | Published: 2025-12-29 RAGモデルDoS脆弱性優先順位付け 2025.12.29 文献データベース
From Retrieval to Reasoning: A Framework for Cyber Threat Intelligence NER with Explicit and Adaptive Instructions Authors: Jiaren Peng, Hongda Sun, Xuan Tian, Cheng Huang, Zeqing Li, Rui Yan | Published: 2025-12-22 RAGデータ選択戦略プロンプトリーキング 2025.12.22 文献データベース
Uncovering Gaps Between RFC Updates and TCP/IP Implementations: LLM-Facilitated Differential Checks on Intermediate Representations Authors: Yifan Wu, Xuewei Feng, Yuxiang Yang, Ke Xu | Published: 2025-10-28 RAGTCP接続特性脆弱性分析 2025.10.28 文献データベース
LLMLogAnalyzer: A Clustering-Based Log Analysis Chatbot using Large Language Models Authors: Peng Cai, Reza Ryan, Nickson M. Karie | Published: 2025-10-28 RAGプロンプトインジェクションログの異常検知 2025.10.28 文献データベース
RAGRank: Using PageRank to Counter Poisoning in CTI LLM Pipelines Authors: Austin Jia, Avaneesh Ramesh, Zain Shamsi, Daniel Zhang, Alex Liu | Published: 2025-10-23 RAGRAGへのポイズニング攻撃サイバー脅威インテリジェンス 2025.10.23 文献データベース
The Attribution Story of WhisperGate: An Academic Perspective Authors: Oleksandr Adamov, Anders Carlsson | Published: 2025-10-21 RAGネットワーク脅威検出情報漏洩分析 2025.10.21 文献データベース
Benchmarking LLM-Assisted Blue Teaming via Standardized Threat Hunting Authors: Yuqiao Meng, Luoxi Tang, Feiyang Yu, Xi Li, Guanhua Yan, Ping Yang, Zhaohan Xi | Published: 2025-09-28 | Updated: 2025-10-01 RAGセキュリティ戦略生成学習タスクの効率的な解決 2025.09.28 文献データベース