Similar Items: CleanBase: Detecting Malicious Documents in RAG Knowledge Databases
- LeakDojo: Decoding the Leakage Threats of RAG Systems
- When RAG Chatbots Expose Their Backend: An Anonymized Case Study of Privacy and Security Risks in Patient-Facing Medical AI
- SecGoal: A Benchmark for Security Goal Extraction and Formalization from Protocol Documents
- Latent Adversarial Detection: Adaptive Probing of LLM Activations for Multi-Turn Attack Detection
- Evaluating Tabular Representation Learning for Network Intrusion Detection
- Trident: Improving Malware Detection with LLMs and Behavioral Features