RAGへのポイズニング攻撃

The Digital Cybersecurity Expert: How Far Have We Come?

Authors: Dawei Wang, Geng Zhou, Xianglong Li, Yu Bai, Li Chen, Ting Qin, Jian Sun, Dan Li | Published: 2025-04-16
LLM性能評価
RAGへのポイズニング攻撃
プロンプトインジェクション

Exploring Backdoor Attack and Defense for LLM-empowered Recommendations

Authors: Liangbo Ning, Wenqi Fan, Qing Li | Published: 2025-04-15
LLM性能評価
RAGへのポイズニング攻撃
敵対的攻撃分析

ControlNET: A Firewall for RAG-based LLM System

Authors: Hongwei Yao, Haoran Shi, Yidou Chen, Yixin Jiang, Cong Wang, Zhan Qin | Published: 2025-04-13 | Updated: 2025-04-17
RAGへのポイズニング攻撃
インダイレクトプロンプトインジェクション
データ侵害リスク

PR-Attack: Coordinated Prompt-RAG Attacks on Retrieval-Augmented Generation in Large Language Models via Bilevel Optimization

Authors: Yang Jiao, Xiaodong Wang, Kai Yang | Published: 2025-04-10
LLM性能評価
RAGへのポイズニング攻撃
敵対的攻撃評価

Tricking Retrievers with Influential Tokens: An Efficient Black-Box Corpus Poisoning Attack

Authors: Cheng Wang, Yiwei Wang, Yujun Cai, Bryan Hooi | Published: 2025-03-27
RAG
RAGへのポイズニング攻撃
敵対的サンプルの脆弱性

Bugdar: AI-Augmented Secure Code Review for GitHub Pull Requests

Authors: John Naulty, Eason Chen, Joy Wang, George Digkas, Kostas Chalkias | Published: 2025-03-21
RAGへのポイズニング攻撃
システム開発
脆弱性分析

DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence

Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti | Published: 2025-03-20
RAGへのポイズニング攻撃
性能評価手法
特徴抽出手法

SOSecure: Safer Code Generation with RAG and StackOverflow Discussions

Authors: Manisha Mukherjee, Vincent J. Hellendoorn | Published: 2025-03-17
RAG
RAGへのポイズニング攻撃
脆弱性検出

Privacy-Aware RAG: Secure and Isolated Knowledge Retrieval

Authors: Pengcheng Zhou, Yinglun Feng, Zhongliang Yang | Published: 2025-03-17
RAG
RAGへのポイズニング攻撃
暗号学

Poison-RAG: Adversarial Data Poisoning Attacks on Retrieval-Augmented Generation in Recommender Systems

Authors: Fatemeh Nazary, Yashar Deldjoo, Tommaso di Noia | Published: 2025-01-20
RAGへのポイズニング攻撃
タグ選択戦略
ポイズニング攻撃