The Shifting Sands of Retrieval: Poisoning Attacks in AI Systems

New research reveals how malicious data injected into knowledge sources can subtly manipulate the responses of AI systems powered by retrieval-augmented generation.

New research reveals how malicious data injected into knowledge sources can subtly manipulate the responses of AI systems powered by retrieval-augmented generation.
![]()
Okay, so Bethesda just announced a really cool, limited-edition Elder Scrolls thing for this summer! It’s all about Akatosh, who’s basically the Dragon God of Time – a super famous character in the games. I’m definitely trying to get my hands on it!
New research challenges the assumption that simply increasing the range of possible responses automatically improves data privacy in shuffle model settings.
![The system distills a raw stream of 6.27 million Ethereum transactions-initially filtered to identify potential Ethscriptions-down to a focused analytical set of 4.75 million ([latex]U\_2[/latex]), representing 75.8% of the initial candidates, through MIME classification, JSON validation, and grammatical parsing-a process that prioritizes data integrity and contextual relevance as the foundation for subsequent measurement.](https://arxiv.org/html/2603.19086v1/img/fig_methodology_v3_1.png)
A new empirical study reveals how seemingly inconsequential data embedded within Ethereum transactions-known as Ethscriptions-is reshaping the protocol’s economics and challenging core assumptions about data availability.
New research delves into the fascinating world of Sperner families and the phenomenon of ‘order shattering’, revealing key properties and characterizations.
Some lawmakers in Kentucky decided to throw in an amendment to a regulatory bill that’s got everyone up in arms. You’d think they were proposing to outlaw sweet tea or something! The crypto folks are saying this could practically make self-custody illegal. I mean, come on!
New research reveals how random walks behave in complex, disordered environments, offering insights into phenomena ranging from diffusion to network dynamics.
New research establishes tighter bounds on code smoothing, a critical process for building secure cryptographic systems resilient to attacks from future quantum computers.
The cryptocurrency sector is embarking on a new adventure, draped in the fineries of clearer regulations and a broader cast of players. Who would have thought?
![The study demonstrates how variations in Borel parameters influence hadronic coupling constants - specifically, the relationship between [latex]G_{\chi_{c1}\rho Z_{c}^{-}}[/latex] and [latex]G_{\chi_{c0}\pi Z_{c}^{+}}[/latex] - suggesting that even fundamental constants may be subject to shifts dependent on the framework used to observe them.](https://arxiv.org/html/2603.18877v1/x1.png)
New calculations using QCD sum rules offer theoretical predictions for the strong decays of exotic hidden-charm tetraquark states, paving the way for experimental validation.