CDS4RAG cyclically optimizes full RAG hyperparameters by distinguishing and alternating between retriever and generator components, boosting performance up to 1.54x over prior methods on benchmarks.
Rag and roll: An end-to-end evaluation of indirect prompt manipulations in llm-based application frameworks.CoRR, abs/2408.05025
3 Pith papers cite this work. Polarity classification is still indexing.
years
2026 3representative citing papers
Large-scale analysis of 1.2B URLs identifies 15.3K indirect prompt injection instances in the wild, mostly targeting AI systems with up to 8% compliance in model experiments.
This paper establishes a taxonomy of RAG security organized around six workflow stages, three trust boundaries, and four primary security surfaces, while reviewing attacks, defenses, and gaps in current protections.
citing papers explorer
-
CDS4RAG: Cyclic Dual-Sequential Hyperparameter Optimization for RAG
CDS4RAG cyclically optimizes full RAG hyperparameters by distinguishing and alternating between retriever and generator components, boosting performance up to 1.54x over prior methods on benchmarks.
-
Indirect Prompt Injection in the Wild: An Empirical Study of Prevalence, Techniques, and Objectives
Large-scale analysis of 1.2B URLs identifies 15.3K indirect prompt injection instances in the wild, mostly targeting AI systems with up to 8% compliance in model experiments.
-
Securing Retrieval-Augmented Generation: A Taxonomy of Attacks, Defenses, and Future Directions
This paper establishes a taxonomy of RAG security organized around six workflow stages, three trust boundaries, and four primary security surfaces, while reviewing attacks, defenses, and gaps in current protections.