{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T17:05:09Z","timestamp":1775840709265,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","funder":[{"name":"National Natural Science Foundation of China","award":["62406057"],"award-info":[{"award-number":["62406057"]}]},{"name":"Fundamental Research Funds for the Central Universities","award":["ZYGX2025XJ042"],"award-info":[{"award-number":["ZYGX2025XJ042"]}]},{"name":"Noncommunicable Chronic Diseases-National Science and Technology Major Project","award":["2023ZD0501806"],"award-info":[{"award-number":["2023ZD0501806"]}]},{"name":"Sichuan Science and Technology Program under Grant","award":["2024ZDZX0011"],"award-info":[{"award-number":["2024ZDZX0011"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3774904.3792547","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T21:54:39Z","timestamp":1775771679000},"page":"2308-2319","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["KEPo: Knowledge Evolution Poison on Graph-based Retrieval-Augmented Generation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8661-5596","authenticated-orcid":false,"given":"Qizhi","family":"Chen","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic and Science Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7181-5828","authenticated-orcid":false,"given":"Chao","family":"Qi","sequence":"additional","affiliation":[{"name":"Institute of Intelligent Computing, University of Electronic and Science Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3644-1272","authenticated-orcid":false,"given":"Yihong","family":"Huang","sequence":"additional","affiliation":[{"name":"Institute of Intelligent Computing, University of Electronic and Science Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3417-2007","authenticated-orcid":false,"given":"Muquan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic and Science Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5498-7443","authenticated-orcid":false,"given":"Rongzheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Intelligent Computing, University of Electronic and Science Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4839-0234","authenticated-orcid":false,"given":"Dongyang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Intelligent Computing, University of Electronic and Science Technology of China, Chengdu, China and Ubiquitous Intelligence and Trusted Services Key Laboratory of Sichuan Province, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6174-3877","authenticated-orcid":false,"given":"Ke","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic and Science Technology of China, Chengdu, China and Ubiquitous Intelligence and Trusted Services Key Laboratory of Sichuan Province, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7387-2801","authenticated-orcid":false,"given":"Shuang","family":"Liang","sequence":"additional","affiliation":[{"name":"Institute of Intelligent Computing, University of Electronic and Science Technology of China, Chengdu, China and Ubiquitous Intelligence and Trusted Services Key Laboratory of Sichuan Province, Chengdu, China"}]}],"member":"320","published-online":{"date-parts":[[2026,4,12]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"79","article-title":"Not What You've Signed Up For","author":"Abdelnabi Sahar","year":"2023","unstructured":"Sahar Abdelnabi, Kai Greshake, Shailesh Mishra, Christoph Endres, Thorsten Holz, and Mario Fritz. 2023. Not What You've Signed Up For: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection. In AISec. 79-90.","journal-title":"Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection. In AISec."},{"key":"e_1_3_2_1_2_1","volume-title":"From Local to Global: A Graph RAG Approach to Query-Focused Summarization. CoRR","author":"Edge Darren","year":"2024","unstructured":"Darren Edge, Ha Trinh, Newman Cheng, Joshua Bradley, Alex Chao, Apurva Mody, Steven Truitt, and Jonathan Larson. 2024. From Local to Global: A Graph RAG Approach to Query-Focused Summarization. CoRR, Vol. abs\/2404.16130 (2024)."},{"key":"e_1_3_2_1_3_1","first-page":"6174","article-title":"BAE","author":"Garg Siddhant","year":"2020","unstructured":"Siddhant Garg and Goutham Ramakrishnan. 2020. BAE: BERT-based Adversarial Examples for Text Classification. In EMNLP. 6174-6181.","journal-title":"BERT-based Adversarial Examples for Text Classification. In EMNLP."},{"key":"e_1_3_2_1_4_1","volume-title":"LightRAG: Simple and Fast Retrieval-Augmented Generation. CoRR","author":"Guo Zirui","year":"2024","unstructured":"Zirui Guo, Lianghao Xia, Yanhua Yu, Tu Ao, and Chao Huang. 2024. LightRAG: Simple and Fast Retrieval-Augmented Generation. CoRR, Vol. abs\/2410.05779 (2024)."},{"key":"e_1_3_2_1_5_1","first-page":"59532","article-title":"HippoRAG: Neurobiologically Inspired Long-Term Memory for Large Language Models","volume":"37","author":"Gutierrez Bernal Jimenez","year":"2024","unstructured":"Bernal Jimenez Gutierrez, Yiheng Shu, Yu Gu, Michihiro Yasunaga, and Yu Su. 2024. HippoRAG: Neurobiologically Inspired Long-Term Memory for Large Language Models. In NeurIPS, Vol. 37. 59532-59569.","journal-title":"NeurIPS"},{"key":"e_1_3_2_1_6_1","first-page":"4895","article-title":"EXIT","author":"Hwang Taeho","year":"2025","unstructured":"Taeho Hwang, Sukmin Cho, Soyeong Jeong, Hoyun Song, SeungYoon Han, and Jong C. Park. 2025. EXIT: Context-Aware Extractive Compression for Enhancing Retrieval-Augmented Generation. In Findings of ACL. 4895-4924.","journal-title":"Context-Aware Extractive Compression for Enhancing Retrieval-Augmented Generation. In Findings of ACL."},{"key":"e_1_3_2_1_7_1","first-page":"656","article-title":"PR-Attack: Coordinated Prompt-RAG Attacks on Retrieval-Augmented Generation in Large Language Models via Bilevel Optimization","author":"Jiao Yang","year":"2025","unstructured":"Yang Jiao, Xiaodong Wang, and Kai Yang. 2025. PR-Attack: Coordinated Prompt-RAG Attacks on Retrieval-Augmented Generation in Large Language Models via Bilevel Optimization. In SIGIR. 656-667.","journal-title":"SIGIR."},{"key":"e_1_3_2_1_8_1","first-page":"39","article-title":"ColBERT: Efficient and Effective Passage Search via Contextualized Late Interaction over BERT","author":"Khattab Omar","year":"2020","unstructured":"Omar Khattab and Matei Zaharia. 2020. ColBERT: Efficient and Effective Passage Search via Contextualized Late Interaction over BERT. In SIGIR. 39-48.","journal-title":"SIGIR."},{"key":"e_1_3_2_1_9_1","first-page":"1793","article-title":"Universal Knowledge Graph Embeddings","author":"Jean Kouagou N'Dah","year":"2024","unstructured":"N'Dah Jean Kouagou, Caglar Demir, Hamada M. Zahera, Adrian Wilke, Stefan Heindorf, Jiayi Li, and Axel-Cyrille Ngonga Ngomo. 2024. Universal Knowledge Graph Embeddings. In WWW. 1793-1797.","journal-title":"WWW."},{"key":"e_1_3_2_1_10_1","first-page":"9459","article-title":"Retrieval-Augmented Generation for Knowledge-Intensive NLP Tasks","volume":"33","author":"Lewis Patrick","year":"2020","unstructured":"Patrick Lewis, Ethan Perez, Aleksandra Piktus, Fabio Petroni, Vladimir Karpukhin, Naman Goyal, Heinrich K\u00fcttler, Mike Lewis, Wen-tau Yih, Tim Rockt\u00e4schel, Sebastian Riedel, and Douwe Kiela. 2020. Retrieval-Augmented Generation for Knowledge-Intensive NLP Tasks. In NeurIPS, Vol. 33. 9459-9474.","journal-title":"NeurIPS"},{"key":"e_1_3_2_1_11_1","volume-title":"NeuroPath: Neurobiology-Inspired Path Tracking and Reflection for Semantically Coherent Retrieval. CoRR","author":"Li Junchen","year":"2025","unstructured":"Junchen Li, Rongzheng Wang, Yihong Huang, Qizhi Chen, Jiasheng Zhang, and Shuang Liang. 2025a. NeuroPath: Neurobiology-Inspired Path Tracking and Reflection for Semantically Coherent Retrieval. CoRR, Vol. abs\/2511.14096 (2025)."},{"key":"e_1_3_2_1_12_1","volume-title":"DSAS: A Universal Plug-and-Play Framework for Attention Optimization in Multi-Document Question Answering. CoRR","author":"Li Jiakai","year":"2025","unstructured":"Jiakai Li, Rongzheng Wang, Yizhuo Ma, Shuang Liang, Guangchun Luo, and Ke Qin. 2025b. DSAS: A Universal Plug-and-Play Framework for Attention Optimization in Multi-Document Question Answering. CoRR, Vol. abs\/2510.12251 (2025)."},{"key":"e_1_3_2_1_13_1","first-page":"6193","article-title":"BERT-ATTACK","author":"Li Linyang","year":"2020","unstructured":"Linyang Li, Ruotian Ma, Qipeng Guo, Xiangyang Xue, and Xipeng Qiu. 2020. BERT-ATTACK: Adversarial Attack Against BERT Using BERT. In EMNLP. 6193-6202.","journal-title":"Adversarial Attack Against BERT Using BERT. In EMNLP."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Muquan Li Dongyang Zhang Qiang Dong Xiurui Xie and Ke Qin. 2025c. Adaptive Dataset Quantization. In AAAI-25 Sponsored by the Association for the Advancement of Artificial Intelligence. 12093-12101.","DOI":"10.1609\/aaai.v39i11.33317"},{"key":"e_1_3_2_1_15_1","volume-title":"GraphRAG under Fire. CoRR","author":"Liang Jiacheng","year":"2025","unstructured":"Jiacheng Liang, Yuhui Wang, Changjiang Li, Rongyi Zhu, Tanqiu Jiang, Neil Gong, and Ting Wang. 2025. GraphRAG under Fire. CoRR, Vol. abs\/2501.14050 (2025)."},{"key":"e_1_3_2_1_16_1","first-page":"2894","article-title":"Mask-based Membership Inference Attacks for Retrieval-Augmented Generation","author":"Liu Mingrui","year":"2025","unstructured":"Mingrui Liu, Sixiao Zhang, and Cheng Long. 2025b. Mask-based Membership Inference Attacks for Retrieval-Augmented Generation. In WWW. 2894-2907.","journal-title":"WWW."},{"key":"e_1_3_2_1_17_1","first-page":"29139","article-title":"EventGPT","author":"Liu Shaoyu","year":"2025","unstructured":"Shaoyu Liu, Jianing Li, Guanghui Zhao, Yunjian Zhang, Xin Meng, Fei Richard Yu, Xiangyang Ji, and Ming Li. 2025a. EventGPT: Event Stream Understanding with Multimodal Large Language Models. In CVPR. 29139-29149.","journal-title":"Event Stream Understanding with Multimodal Large Language Models. In CVPR."},{"key":"e_1_3_2_1_18_1","volume-title":"Prompt Injection Attacks and Defenses in LLM-Integrated Applications. CoRR","author":"Liu Yupei","year":"2023","unstructured":"Yupei Liu, Yuqi Jia, Runpeng Geng, Jinyuan Jia, and Neil Zhenqiang Gong. 2023. Prompt Injection Attacks and Defenses in LLM-Integrated Applications. CoRR, Vol. abs\/2310.12815 (2023)."},{"key":"e_1_3_2_1_19_1","first-page":"1831","article-title":"Formalizing and Benchmarking Prompt Injection Attacks and Defenses","author":"Liu Yupei","year":"2024","unstructured":"Yupei Liu, Yuqi Jia, Runpeng Geng, Jinyuan Jia, and Neil Zhenqiang Gong. 2024. Formalizing and Benchmarking Prompt Injection Attacks and Defenses. In USENIX. 1831-1847.","journal-title":"USENIX."},{"key":"e_1_3_2_1_20_1","volume-title":"StyleTailor: Towards Personalized Fashion Styling via Hierarchical Negative Feedback. CoRR","author":"Ma Hongbo","year":"2025","unstructured":"Hongbo Ma, Fei Shen, Hongbin Xu, Xiaoce Wang, Gang Xu, Jinkai Zheng, Liangqiong Qu, and Ming Li. 2025a. StyleTailor: Towards Personalized Fashion Styling via Hierarchical Negative Feedback. CoRR, Vol. abs\/2508.06555 (2025)."},{"key":"e_1_3_2_1_21_1","volume-title":"TopoLLM: LLM-driven adaptive tool learning for real-time emergency network topology planning. Digital Communications and Networks","author":"Ma Yizhuo","year":"2025","unstructured":"Yizhuo Ma, Rongzheng Wang, Shuang Liang, Guangchun Luo, and Ke Qin. 2025b. TopoLLM: LLM-driven adaptive tool learning for real-time emergency network topology planning. Digital Communications and Networks (2025)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Deepak Nathani Jatin Chauhan Charu Sharma and Manohar Kaul. 2019. Learning Attention-based Embeddings for Relation Prediction in Knowledge Graphs. In ACL Anna Korhonen David R. Traum and Llu\u00eds M\u00e0rquez (Eds.). 4710-4723.","DOI":"10.18653\/v1\/P19-1466"},{"key":"e_1_3_2_1_23_1","unstructured":"OpenAI. 2023. GPT-4 Technical Report. CoRR Vol. abs\/2303.08774 (2023)."},{"key":"e_1_3_2_1_24_1","first-page":"6106","article-title":"Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks","author":"Shafahi Ali","year":"2018","unstructured":"Ali Shafahi, W. Ronny Huang, Mahyar Najibi, Octavian Suciu, Christoph Studer, Tudor Dumitras, and Tom Goldstein. 2018. Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks. In NeurIPS. 6106-6116.","journal-title":"NeurIPS."},{"key":"e_1_3_2_1_25_1","volume-title":"Ming Li, and Si Yong Yeo.","author":"Shi Yufei","year":"2025","unstructured":"Yufei Shi, Weilong Yan, Gang Xu, Yumeng Li, Yuchen Li, Zhenxi Li, Fei Richard Yu, Ming Li, and Si Yong Yeo. 2025. PVChat: Personalized Video Chat with One-Shot Learning. CoRR, Vol. abs\/2503.17069 (2025)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00530"},{"key":"e_1_3_2_1_27_1","first-page":"3505","article-title":"Paths-over-Graph","author":"Tan Xingyu","year":"2025","unstructured":"Xingyu Tan, Xiaoyang Wang, Qing Liu, Xiwei Xu, Xin Yuan, and Wenjie Zhang. 2025. Paths-over-Graph: Knowledge Graph Empowered Large Language Model Reasoning. In WWW. 3505-3522.","journal-title":"Knowledge Graph Empowered Large Language Model Reasoning. In WWW."},{"key":"e_1_3_2_1_28_1","first-page":"1610","article-title":"Glue pizza and eat rocks - Exploiting Vulnerabilities in Retrieval-Augmented Generative Models","author":"Tan Zhen","year":"2024","unstructured":"Zhen Tan, Chengshuai Zhao, Raha Moraffah, Yifan Li, Song Wang, Jundong Li, Tianlong Chen, and Huan Liu. 2024. Glue pizza and eat rocks - Exploiting Vulnerabilities in Retrieval-Augmented Generative Models. In EMNLP. 1610-1626.","journal-title":"EMNLP."},{"key":"e_1_3_2_1_29_1","first-page":"539","article-title":"MuSiQue: Multihop Questions via Single-hop Question","volume":"10","author":"Trivedi Harsh","year":"2022","unstructured":"Harsh Trivedi, Niranjan Balasubramanian, Tushar Khot, and Ashish Sabharwal. 2022. MuSiQue: Multihop Questions via Single-hop Question Composition. Trans. Assoc. Comput. Linguistics, Vol. 10 (2022), 539-554.","journal-title":"Composition. Trans. Assoc. Comput. Linguistics"},{"key":"e_1_3_2_1_30_1","first-page":"2704","article-title":"Multi-hop Reading Comprehension across Multiple Documents by Reasoning over Heterogeneous Graphs","author":"Tu Ming","year":"2019","unstructured":"Ming Tu, Guangtao Wang, Jing Huang, Yun Tang, Xiaodong He, and Bowen Zhou. 2019. Multi-hop Reading Comprehension across Multiple Documents by Reasoning over Heterogeneous Graphs. In ACL. 2704-2713.","journal-title":"ACL."},{"key":"e_1_3_2_1_31_1","first-page":"2153","article-title":"Universal Adversarial Triggers for Attacking and Analyzing NLP","author":"Wallace Eric","year":"2019","unstructured":"Eric Wallace, Shi Feng, Nikhil Kandpal, Matt Gardner, and Sameer Singh. 2019. Universal Adversarial Triggers for Attacking and Analyzing NLP. In EMNLP. 2153-2162.","journal-title":"EMNLP."},{"key":"e_1_3_2_1_32_1","volume-title":"GraphCogent: Overcoming LLMs' Working Memory Constraints via Multi-Agent Collaboration in Complex Graph Understanding. CoRR","author":"Wang Rongzheng","year":"2025","unstructured":"Rongzheng Wang, Qizhi Chen, Yihong Huang, Yizhuo Ma, Muquan Li, Jiakai Li, Ke Qin, Guangchun Luo, and Shuang Liang. 2025a. GraphCogent: Overcoming LLMs' Working Memory Constraints via Multi-Agent Collaboration in Complex Graph Understanding. CoRR, Vol. abs\/2508.12379 (2025)."},{"key":"e_1_3_2_1_33_1","first-page":"1492","article-title":"GraphTool-Instruction: Revolutionizing Graph Reasoning in LLMs through Decomposed Subtask Instruction","author":"Wang Rongzheng","year":"2025","unstructured":"Rongzheng Wang, Shuang Liang, Qizhi Chen, Jiasheng Zhang, and Ke Qin. 2025b. GraphTool-Instruction: Revolutionizing Graph Reasoning in LLMs through Decomposed Subtask Instruction. In KDD. 1492-1503.","journal-title":"KDD."},{"key":"e_1_3_2_1_34_1","volume-title":"A Few Words Can Distort Graphs: Knowledge Poisoning Attacks on Graph-based Retrieval-Augmented Generation of Large Language Models. CoRR","author":"Wen Jiayi","year":"2025","unstructured":"Jiayi Wen, Tianxin Chen, Zhirun Zheng, and Cheng Huang. 2025. A Few Words Can Distort Graphs: Knowledge Poisoning Attacks on Graph-based Retrieval-Augmented Generation of Large Language Models. CoRR, Vol. abs\/2508.04276 (2025)."},{"key":"e_1_3_2_1_35_1","volume-title":"When to use Graphs in RAG: A Comprehensive Analysis for Graph Retrieval-Augmented Generation. CoRR","author":"Xiang Zhishang","year":"2025","unstructured":"Zhishang Xiang, Chuanjie Wu, Qinggang Zhang, Shengyuan Chen, Zijin Hong, Xiao Huang, and Jinsong Su. 2025. When to use Graphs in RAG: A Comprehensive Analysis for Graph Retrieval-Augmented Generation. CoRR, Vol. abs\/2506.05690 (2025)."},{"key":"e_1_3_2_1_36_1","first-page":"2369","article-title":"HotpotQA: A Dataset for Diverse","author":"Yang Zhilin","year":"2018","unstructured":"Zhilin Yang, Peng Qi, Saizheng Zhang, Yoshua Bengio, William W. Cohen, Ruslan Salakhutdinov, and Christopher D. Manning. 2018. HotpotQA: A Dataset for Diverse, Explainable Multi-hop Question Answering. In EMNLP. 2369-2380.","journal-title":"Explainable Multi-hop Question Answering. In EMNLP."},{"key":"e_1_3_2_1_37_1","unstructured":"Gustavo Ye Terence Liu Rangehow and Chasing. 2024. a simple easy-to-hack graphrag implementation. https:\/\/github.com\/gusye1234\/nano-graphrag"},{"key":"e_1_3_2_1_38_1","first-page":"4221","article-title":"Intuitive or Dependent? Investigating LLMs' Behavior Style to Conflicting Prompts","author":"Ying Jiahao","year":"2024","unstructured":"Jiahao Ying, Yixin Cao, Kai Xiong, Long Cui, Yidong He, and Yongbin Liu. 2024. Intuitive or Dependent? Investigating LLMs' Behavior Style to Conflicting Prompts. In ACL. 4221-4246.","journal-title":"ACL."},{"key":"e_1_3_2_1_39_1","volume-title":"Practical Poisoning Attacks against Retrieval-Augmented Generation. CoRR","author":"Zhang Baolei","year":"2025","unstructured":"Baolei Zhang, Yuxi Chen, Minghong Fang, Zhuqing Liu, Lihai Nie, Tong Li, and Zheli Liu. 2025a. Practical Poisoning Attacks against Retrieval-Augmented Generation. CoRR, Vol. abs\/2504.03957 (2025)."},{"key":"e_1_3_2_1_40_1","first-page":"2085","article-title":"Traceback of Poisoning Attacks to Retrieval-Augmented Generation","author":"Zhang Baolei","year":"2025","unstructured":"Baolei Zhang, Haoran Xin, Minghong Fang, Zhuqing Liu, Biao Yi, Tong Li, and Zheli Liu. 2025b. Traceback of Poisoning Attacks to Retrieval-Augmented Generation. In WWW. 2085-2097.","journal-title":"WWW."},{"key":"e_1_3_2_1_41_1","first-page":"2116","article-title":"HaSa","author":"Zhang Honggen","year":"2024","unstructured":"Honggen Zhang, June Zhang, and Igor Molybog. 2024. HaSa: Hardness and Structure-Aware Contrastive Knowledge Graph Embedding. In WWW. 2116-2127.","journal-title":"Hardness and Structure-Aware Contrastive Knowledge Graph Embedding. In WWW."},{"key":"e_1_3_2_1_42_1","first-page":"1","article-title":"IAG","author":"Zhang Zhebin","year":"2023","unstructured":"Zhebin Zhang, Xinyu Zhang, Yuanhang Ren, Saijiang Shi, Meng Han, Yongkang Wu, Ruofei Lai, and Zhao Cao. 2023. IAG: Induction-Augmented Generation Framework for Answering Reasoning Questions. In EMNLP. 1-14.","journal-title":"Induction-Augmented Generation Framework for Answering Reasoning Questions. In EMNLP."},{"key":"e_1_3_2_1_43_1","first-page":"13764","article-title":"Poisoning Retrieval Corpora by Injecting Adversarial Passages","author":"Zhong Zexuan","year":"2023","unstructured":"Zexuan Zhong, Ziqing Huang, Alexander Wettig, and Danqi Chen. 2023. Poisoning Retrieval Corpora by Injecting Adversarial Passages. In EMNLP. 13764-13775.","journal-title":"EMNLP."},{"key":"e_1_3_2_1_44_1","first-page":"539","article-title":"GraphControl: Adding Conditional Control to Universal Graph Pre-trained Models for Graph Domain Transfer Learning","author":"Zhu Yun","year":"2024","unstructured":"Yun Zhu, Yaoke Wang, Haizhou Shi, Zhenshuo Zhang, Dian Jiao, and Siliang Tang. 2024. GraphControl: Adding Conditional Control to Universal Graph Pre-trained Models for Graph Domain Transfer Learning. In WWW. 539-550.","journal-title":"WWW."},{"key":"e_1_3_2_1_45_1","volume-title":"PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models. USENIX","author":"Zou Wei","year":"2025","unstructured":"Wei Zou, Runpeng Geng, Binghui Wang, and Jinyuan Jia. 2025. PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models. USENIX (2025), 3827-3844."}],"event":{"name":"WWW '26: The ACM Web Conference 2026","location":"Dubai United Arab Emirates","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2026"],"original-title":[],"deposited":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:16:40Z","timestamp":1775837800000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3774904.3792547"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,12]]},"references-count":45,"alternative-id":["10.1145\/3774904.3792547","10.1145\/3774904"],"URL":"https:\/\/doi.org\/10.1145\/3774904.3792547","relation":{},"subject":[],"published":{"date-parts":[[2026,4,12]]},"assertion":[{"value":"2026-04-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}