{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:32:43Z","timestamp":1763191963173,"version":"3.45.0"},"reference-count":57,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100007514","name":"Universit\u00e0 di Pisa","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007514","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11228722","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Attacking RAG Systems in Multiple Domains with Locally Running and Automatic Procedures"],"prefix":"10.1109","author":[{"given":"Christian","family":"Di Maio","sequence":"first","affiliation":[{"name":"University of Pisa,Department of Computer Science,Pisa,Italy"}]},{"given":"Stefano","family":"Melacci","sequence":"additional","affiliation":[{"name":"University of Siena,Department of Information Engineering,Siena,Italy"}]}],"member":"263","reference":[{"key":"ref1","first-page":"3929","article-title":"Retrieval augmented language model pre-training","volume-title":"International conference on machine learning","author":"Guu"},{"key":"ref2","first-page":"9459","article-title":"Retrieval-augmented generation for knowledge-intensive nlp tasks","volume":"33","author":"Lewis","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService62917.2024.00008"},{"article-title":"Confusedpilot: Compromising enterprise information integrity and confidentiality with copilot for microsoft 365","year":"2024","author":"RoyChowdhury","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT60155.2024.10544639"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3495162"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-long.307"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-naacl.176"},{"article-title":"A survey on large language models for code generation","year":"2024","author":"Jiang","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11191-024-00530-2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.lindif.2023.102274"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.276"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1162\/coli.a.16"},{"article-title":"LoRA: Low-rank adaptation of large language models","volume-title":"International Conference on Learning Representations","author":"Hu","key":"ref14"},{"article-title":"Speciality vs generality: An empirical study on catastrophic forgetting in fine-tuning foundation models","year":"2023","author":"Lin","key":"ref15"},{"article-title":"Tomorrow brings greater knowledge: Large language models join dynamic temporal knowledge graphs","volume-title":"Conference on Lifelong Learning Agents, CoLLAs 2024, 29 July-1 August 2024, University of Pisa, Siena, Italy","author":"Di Maio","key":"ref16"},{"article-title":"Retrieval-augmented generation for ai-generated content: A survey","year":"2024","author":"Zhao","key":"ref17"},{"article-title":"Language models are few-shot learners","year":"2020","author":"Brown","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00605"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhm.2023.103437"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3381611"},{"article-title":"Considerations for differentially private learning with large-scale public pretraining","year":"2022","author":"Tram\u00e8r","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/23311975.2024.2393743"},{"key":"ref24","article-title":"Decodingtrust: A comprehensive assessment of trustworthiness in gpt models","author":"Wang","year":"2023","journal-title":"NeurIPS"},{"key":"ref25","first-page":"2633","article-title":"Extracting training data from large language models","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Carlini"},{"key":"ref26","first-page":"4222","article-title":"AutoPrompt: Eliciting Knowledge from Language Models with Automatically Generated Prompts","volume-title":"Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP)","author":"Shin"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3523273"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref30","first-page":"4505","article-title":"The good and the bad: Exploring privacy issues in retrieval-augmented generation (RAG)","volume-title":"Findings of the Association for Computational Linguistics: ACL 2024","author":"Zeng"},{"article-title":"Follow my instruction and spill the beans: Scalable data extraction from retrieval-augmented generation systems","year":"2024","author":"Qi","key":"ref31"},{"article-title":"Unleashing worms and extracting data: Escalating the outcome of attacks against rag-based inference in scale and severity using jailbreaking","year":"2024","author":"Cohen","key":"ref32"},{"article-title":"Trustworthiness in retrieval-augmented generation systems: A survey","year":"2024","author":"Zhou","key":"ref33"},{"article-title":"Rag-thief: Scalable extraction of private data from retrieval-augmented generation applications with agent-based attacks","year":"2024","author":"Jiang","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3585385"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3251842"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3264418"},{"article-title":"On the privacy risk of in-context learning","volume-title":"The 61st Annual Meeting Of The Association For Computational Linguistics","author":"Duan","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.5220\/0013108300003899"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/icassp49660.2025.10889013"},{"key":"ref41","first-page":"2013","article-title":"WikiQA: A challenge dataset for open-domain question answering","volume-title":"Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing","author":"Yang"},{"article-title":"Gpt-4o system card","year":"2024","author":"Hurst","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3624010"},{"key":"ref44","first-page":"8332","article-title":"Quantifying privacy risks of masked language models using membership inference attacks","volume-title":"Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing","author":"Mireshghallah"},{"article-title":"Membership inference attacks against nlp classification models","volume-title":"NeurIPS 2021 Workshop Privacy in Machine Learning","author":"Shejwalkar","key":"ref45"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00299"},{"key":"ref47","first-page":"14 887","article-title":"Privacy implications of retrieval-based language models","volume-title":"Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing","author":"Huang"},{"year":"2024","key":"ref48","article-title":"The llama 3 herd of models"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3626772.3657878"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.7759\/cureus.40895"},{"article-title":"Phi-3 technical report: A highly capable language model locally on your phone","year":"2024","author":"Abdin","key":"ref51"},{"article-title":"Text embeddings by weakly-supervised contrastive pre-training","year":"2022","author":"Wang","key":"ref52"},{"year":"2024","key":"ref53","article-title":"Rag-mini-wikipedia"},{"year":"2024","key":"ref54","article-title":"Llama 3.2 1b model card"},{"article-title":"Towards general text embeddings with multi-stage contrastive learning","year":"2023","author":"Li","key":"ref55"},{"year":"2024","key":"ref56","article-title":"Rag-mini-bioasq"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3600006.3613165"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2025,6,30]]},"location":"Rome, Italy","end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11228722.pdf?arnumber=11228722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:28:08Z","timestamp":1763191688000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11228722\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11228722","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}