Rescuing the Unpoisoned: Efficient Defense against Knowledge Corruption Attacks on RAG Systems