RAGへのポイズニング攻撃

DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence

Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti | Published: 2025-03-20
RAGへのポイズニング攻撃
性能評価手法
特徴抽出手法

SOSecure: Safer Code Generation with RAG and StackOverflow Discussions

Authors: Manisha Mukherjee, Vincent J. Hellendoorn | Published: 2025-03-17
RAG
RAGへのポイズニング攻撃
脆弱性検出

Privacy-Aware RAG: Secure and Isolated Knowledge Retrieval

Authors: Pengcheng Zhou, Yinglun Feng, Zhongliang Yang | Published: 2025-03-17
RAG
RAGへのポイズニング攻撃
暗号学

Poison-RAG: Adversarial Data Poisoning Attacks on Retrieval-Augmented Generation in Recommender Systems

Authors: Fatemeh Nazary, Yashar Deldjoo, Tommaso di Noia | Published: 2025-01-20
RAGへのポイズニング攻撃
タグ選択戦略
ポイズニング攻撃

Evaluating and Improving the Robustness of Security Attack Detectors Generated by LLMs

Authors: Samuele Pasini, Jinhan Kim, Tommaso Aiello, Rocio Cabrera Lozoya, Antonino Sabetta, Paolo Tonella | Published: 2024-11-27 | Updated: 2025-09-17
RAG
RAGへのポイズニング攻撃
評価手法

When Machine Unlearning Meets Retrieval-Augmented Generation (RAG): Keep Secret or Forget Knowledge?

Authors: Shang Wang, Tianqing Zhu, Dayong Ye, Wanlei Zhou | Published: 2024-10-20 | Updated: 2025-10-13
RAG
RAGへのポイズニング攻撃
プライバシー保護技術

Phantom: General Backdoor Attacks on Retrieval Augmented Language Generation

Authors: Harsh Chaudhari, Giorgio Severi, John Abascal, Anshuman Suri, Matthew Jagielski, Christopher A. Choquette-Choo, Milad Nasr, Cristina Nita-Rotaru, Alina Oprea | Published: 2024-05-30 | Updated: 2025-10-01
RAGへのポイズニング攻撃
最適化戦略
構造的攻撃

Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications

Authors: Quan Zhang, Binqi Zeng, Chijin Zhou, Gwihwan Go, Heyuan Shi, Yu Jiang | Published: 2024-04-26
RAGへのポイズニング攻撃
プロンプトリーキング
ポイズニング

Poisoning Retrieval Corpora by Injecting Adversarial Passages

Authors: Zexuan Zhong, Ziqing Huang, Alexander Wettig, Danqi Chen | Published: 2023-10-29
RAGへのポイズニング攻撃
ポイズニング
敵対的サンプル

Poisoning Attacks to Graph-Based Recommender Systems

Authors: Minghong Fang, Guolei Yang, Neil Zhenqiang Gong, Jia Liu | Published: 2018-09-11
RAGへのポイズニング攻撃
ポイズニング
敵対的攻撃