Skip to main content
redteams.ai
All tags

# re-ranking

2 articlestagged with “re-ranking

RAG Retrieval Security

Security of RAG retrieval pipelines from an embedding perspective: how retrieval can be manipulated through poisoned chunks, chunking boundary exploitation, and re-ranking attacks.

rag-securityretrievalchunkingre-rankingembedding-security
Intermediate

Retrieval Manipulation

Techniques for manipulating RAG retrieval: poisoning chunks to rank higher, exploiting chunking boundaries, cross-document injection, and re-ranking attacks.

retrieval-manipulationrag-poisoningchunkingcross-document-injectionre-ranking
Advanced