RAGへのポイズニング攻撃

Bugdar: AI-Augmented Secure Code Review for GitHub Pull Requests

Authors: John Naulty, Eason Chen, Joy Wang, George Digkas, Kostas Chalkias | Published: 2025-03-21
RAGへのポイズニング攻撃
システム開発
脆弱性分析

DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence

Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti | Published: 2025-03-20
RAGへのポイズニング攻撃
性能評価手法
特徴抽出手法

SOSecure: Safer Code Generation with RAG and StackOverflow Discussions

Authors: Manisha Mukherjee, Vincent J. Hellendoorn | Published: 2025-03-17
RAG
RAGへのポイズニング攻撃
脆弱性検出

Privacy-Aware RAG: Secure and Isolated Knowledge Retrieval

Authors: Pengcheng Zhou, Yinglun Feng, Zhongliang Yang | Published: 2025-03-17
RAG
RAGへのポイズニング攻撃
暗号学

Poison-RAG: Adversarial Data Poisoning Attacks on Retrieval-Augmented Generation in Recommender Systems

Authors: Fatemeh Nazary, Yashar Deldjoo, Tommaso di Noia | Published: 2025-01-20
RAGへのポイズニング攻撃
タグ選択戦略
ポイズニング攻撃

Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications

Authors: Quan Zhang, Binqi Zeng, Chijin Zhou, Gwihwan Go, Heyuan Shi, Yu Jiang | Published: 2024-04-26
RAGへのポイズニング攻撃
プロンプトリーキング
ポイズニング

Poisoning Retrieval Corpora by Injecting Adversarial Passages

Authors: Zexuan Zhong, Ziqing Huang, Alexander Wettig, Danqi Chen | Published: 2023-10-29
RAGへのポイズニング攻撃
ポイズニング
敵対的サンプル

Poisoning Attacks to Graph-Based Recommender Systems

Authors: Minghong Fang, Guolei Yang, Neil Zhenqiang Gong, Jia Liu | Published: 2018-09-11
RAGへのポイズニング攻撃
ポイズニング
敵対的攻撃