# knowledge-poisoning
標記為「knowledge-poisoning」的 2 篇文章
RAG Pipeline Exploitation
Methodology for attacking Retrieval-Augmented Generation pipelines: knowledge poisoning, chunk boundary manipulation, retrieval score gaming, cross-tenant leakage, GraphRAG attacks, and metadata injection.
ragretrievalvector-dbknowledge-poisoningembeddingsgraphragcross-tenant
RAG Pipeline 利用ation
Methodology for attacking Retrieval-Augmented Generation pipelines: knowledge poisoning, chunk boundary manipulation, retrieval score gaming, cross-tenant leakage, GraphRAG attacks, and metadata injection.
ragretrievalvector-dbknowledge-poisoningembeddingsgraphragcross-tenant