# semantic-similarity
4 articlestagged with “semantic-similarity”
Semantic Similarity-Based Defense (Defense Mitigation)
Using semantic similarity to detect prompt injection by comparing user inputs against known attack patterns.
Adversarial Embeddings
Techniques for crafting adversarial embeddings that are semantically close to target content but contain malicious payloads, including embedding space manipulation and optimization methods.
Retrieval Manipulation (Rag Data Attacks)
Techniques for manipulating RAG retrieval to control which documents reach the LLM context, including adversarial query reformulation, retriever bias exploitation, and semantic similarity gaming.
Semantic Similarity Detection
Step-by-step walkthrough for using text embeddings to detect semantically similar prompt injection attempts, covering embedding model selection, vector database setup, similarity threshold tuning, and production deployment.