# inversion-attacks
2 articlestagged with “inversion-attacks”
Embedding Inversion Attacks
Techniques for reconstructing input text from embedding vectors: model-specific inversion methods, privacy implications, and defenses against embedding inversion.
inversion-attackstext-reconstructionprivacyembedding-inversiondata-extraction
Embedding Space Exploitation
Techniques for exploiting embedding geometry, performing inversion attacks, crafting adversarial perturbations, and poisoning RAG systems via nearest-neighbor manipulation.
embeddingsvector-spaceinversion-attacksadversarial-perturbationnearest-neighbor