# re-ranking
2 articlestagged with “re-ranking”
RAG Retrieval Security
Security of RAG retrieval pipelines from an embedding perspective: how retrieval can be manipulated through poisoned chunks, chunking boundary exploitation, and re-ranking attacks.
rag-securityretrievalchunkingre-rankingembedding-security
Retrieval Manipulation
Techniques for manipulating RAG retrieval: poisoning chunks to rank higher, exploiting chunking boundaries, cross-document injection, and re-ranking attacks.
retrieval-manipulationrag-poisoningchunkingcross-document-injectionre-ranking