# semantic-similarity
標記為「semantic-similarity」的 8 篇文章
Semantic Similarity-Based Defense (Defense Mitigation)
Using semantic similarity to detect prompt injection by comparing user inputs against known attack patterns.
Adversarial Embeddings
Techniques for crafting adversarial embeddings that are semantically close to target content but contain malicious payloads, including embedding space manipulation and optimization methods.
Retrieval Manipulation (Rag Data Attacks)
Techniques for manipulating RAG retrieval to control which documents reach the LLM context, including adversarial query reformulation, retriever bias exploitation, and semantic similarity gaming.
Semantic Similarity Detection
Step-by-step walkthrough for using text embeddings to detect semantically similar prompt injection attempts, covering embedding model selection, vector database setup, similarity threshold tuning, and production deployment.
Semantic Similarity-Based 防禦 (防禦 Mitigation)
Using semantic similarity to detect prompt injection by comparing user inputs against known attack patterns.
對抗性嵌入
打造在語意上與目標內容接近、但載有惡意 payload 之對抗性嵌入的技術,包括嵌入空間操弄與最佳化方法。
Retrieval Manipulation (Rag Data 攻擊s)
Techniques for manipulating RAG retrieval to control which documents reach the LLM context, including adversarial query reformulation, retriever bias exploitation, and semantic similarity gaming.
Semantic Similarity Detection
Step-by-step walkthrough for using text embeddings to detect semantically similar prompt injection attempts, covering embedding model selection, vector database setup, similarity threshold tuning, and production deployment.