# chunking
標記為「chunking」的 8 篇文章
RAG Retrieval Security
Security of RAG retrieval pipelines from an embedding perspective: how retrieval can be manipulated through poisoned chunks, chunking boundary exploitation, and re-ranking attacks.
Retrieval Manipulation
Techniques for manipulating RAG retrieval: poisoning chunks to rank higher, exploiting chunking boundaries, cross-document injection, and re-ranking attacks.
Lab: Chunking Exploitation
Hands-on lab for crafting documents that split across chunks in ways that hide malicious content from chunk-level filtering while maintaining attack effectiveness.
Chunk Boundary Attacks
Exploiting document splitting and chunking mechanisms in RAG pipelines, including payload injection at chunk boundaries, cross-chunk instruction injection, and chunk size manipulation.
RAG 檢索安全
從嵌入向量觀點看 RAG 檢索管線的安全性:檢索如何透過投毒區塊、區塊邊界利用與重排序攻擊被操控。
檢索操弄
操弄 RAG 檢索的技術:投毒 chunk 以提升排名、利用分塊邊界、跨文件注入,以及重新排序攻擊。
實驗室: Chunking 利用ation
Hands-on lab for crafting documents that split across chunks in ways that hide malicious content from chunk-level filtering while maintaining attack effectiveness.
Chunk Boundary 攻擊s
利用ing document splitting and chunking mechanisms in RAG pipelines, including payload injection at chunk boundaries, cross-chunk instruction injection, and chunk size manipulation.