{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:32:21Z","timestamp":1766442741673,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","funder":[{"name":"United States-Israel Binational Science Foundation (BSF)","award":["2023641"],"award-info":[{"award-number":["2023641"]}]},{"name":"Len Blavatnik and the Blavatnik Family foundation"},{"name":"Maus scholarship for excellent graduate students"},{"name":"Maof prize for outstanding young scientists"},{"name":"Ministry of Innovation, Science \\& Technology, Israel","award":["0603870071"],"award-info":[{"award-number":["0603870071"]}]},{"name":"Tel Aviv University Center for AI and Data Science"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765095","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:42:02Z","timestamp":1763854922000},"page":"4364-4378","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["GASLITEing the Retrieval: Exploring Vulnerabilities in Dense Embedding-based Search"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-3778-1685","authenticated-orcid":false,"given":"Matan","family":"Ben-Tov","sequence":"first","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7661-2220","authenticated-orcid":false,"given":"Mahmood","family":"Sharif","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/hf.co\/spaces\/mteb\/leaderboard","author":"Leaderboards MTEB","year":"2025","unstructured":"[n.d.]. MTEB Leaderboards. https:\/\/hf.co\/spaces\/mteb\/leaderboard. Accessed: Sept 2025."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/www.nvidia.com\/en-eu\/ai-on-rtx\/chatrtx\/","author":"A's","year":"2025","unstructured":"[n.d.]. NVIDIA's ChatRTX. https:\/\/www.nvidia.com\/en-eu\/ai-on-rtx\/chatrtx\/. Accessed: Sept 2025."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Mira Ait-Saada and Mohamed Nadif. 2023. Is Anisotropy Truly Harmful? A Case Study on Text Clustering. In ACL.","DOI":"10.18653\/v1\/2023.acl-short.103"},{"key":"e_1_3_2_1_4_1","volume-title":"Detecting Language Model Attacks with Perplexity. arXiv","author":"Alon Gabriel","year":"2023","unstructured":"Gabriel Alon and Michael Kamfonas. 2023. Detecting Language Model Attacks with Perplexity. arXiv (2023)."},{"key":"e_1_3_2_1_5_1","volume-title":"MS MARCO: A Human Generated Machine Reading Comprehension Dataset. arXiv","author":"Bajaj Payal","year":"2016","unstructured":"Payal Bajaj, Daniel Campos, Nick Craswell, Li Deng, Jianfeng Gao, Xiaodong Liu, Rangan Majumder, Andrew McNamara, Bhaskar Mitra, Tri Nguyen, et al. 2016. MS MARCO: A Human Generated Machine Reading Comprehension Dataset. arXiv (2016)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Battista Biggio Igino Corona Davide Maiorca Blaine Nelson Nedim \u0160rndi\u0107 Pavel Laskov Giorgio Giacinto and Fabio Roli. 2013. Evasion Attacks against Machine Learning at Test Time. In ECML PKDD.","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"e_1_3_2_1_7_1","unstructured":"Battista Biggio Blaine Nelson and Pavel Laskov. 2012. Poisoning Attacks Against Support Vector Machines. In ICML."},{"key":"e_1_3_2_1_8_1","volume-title":"On Evaluating Adversarial Robustness. arXiv","author":"Carlini Nicholas","year":"2019","unstructured":"Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, and Alexey Kurakin. 2019. On Evaluating Adversarial Robustness. arXiv (2019)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"N. Carlini M. Jagielski C. A. Choquette-Choo D. Paleka W. Pearce H. Anderson A. Terzis K. Thomas and F. Tramer. 2024. PoisoningWeb-Scale Training Datasets is Practical. In IEEE S&P.","DOI":"10.1109\/SP54263.2024.00179"},{"key":"e_1_3_2_1_10_1","volume-title":"Daphne Ippolito, Florian Tramer, and Ludwig Schmidt.","author":"Carlini Nicholas","year":"2023","unstructured":"Nicholas Carlini, Milad Nasr, Christopher A. Choquette-Choo, Matthew Jagielski, Irena Gao, Pang Wei W Koh, Daphne Ippolito, Florian Tramer, and Ludwig Schmidt. 2023. Are Aligned Neural Networks Adversarially Aligned?. In NeurIPS."},{"key":"e_1_3_2_1_11_1","volume-title":"Thomas Steinke, Jonathan Hayase, A. Feder Cooper, Katherine Lee, Matthew Jagielski, Milad Nasr, Arthur Conmy, Itay Yona, Eric Wallace, David Rolnick, and Florian Tram\u00e8r.","author":"Carlini Nicholas","year":"2024","unstructured":"Nicholas Carlini, Daniel Paleka, Krishnamurthy Dj Dvijotham, Thomas Steinke, Jonathan Hayase, A. Feder Cooper, Katherine Lee, Matthew Jagielski, Milad Nasr, Arthur Conmy, Itay Yona, Eric Wallace, David Rolnick, and Florian Tram\u00e8r. 2024. Stealing Part of a Production Language Model. In ICML."},{"key":"e_1_3_2_1_12_1","unstructured":"Daniel Cer Yinfei Yang Sheng-yi Kong Nan Hua Nicole Limtiaco Rhomni St. John Noah Constant Mario Guajardo-Cespedes Steve Yuan Chris Tar Brian Strope and Ray Kurzweil. 2018. Universal Sentence Encoder for English. In EMNLP: System Demonstrations."},{"key":"e_1_3_2_1_13_1","volume-title":"Phantom: General Trigger Attacks on Retrieval Augmented Language Generation. arXiv","author":"Chaudhari Harsh","year":"2024","unstructured":"Harsh Chaudhari, Giorgio Severi, John Abascal, Matthew Jagielski, Christopher A. Choquette-Choo, Milad Nasr, Cristina Nita-Rotaru, and Alina Oprea. 2024. Phantom: General Trigger Attacks on Retrieval Augmented Language Generation. arXiv (2024)."},{"key":"e_1_3_2_1_14_1","volume-title":"Agent- Poison: Red-teaming LLM Agents via Poisoning Memory or Knowledge Bases. In NeurIPS.","author":"Chen Zhaorun","year":"2024","unstructured":"Zhaorun Chen, Zhen Xiang, Chaowei Xiao, Dawn Song, and Bo Li. 2024. Agent- Poison: Red-teaming LLM Agents via Poisoning Memory or Knowledge Bases. In NeurIPS."},{"volume-title":"Cursor: The AI Code Editor","year":"2025","key":"e_1_3_2_1_15_1","unstructured":"Cursor. [n.d.]. Cursor: The AI Code Editor; Security, Codebase Indexing. https: \/\/cursor.com\/en\/security#codebase-indexing. Accessed: Sept 2025."},{"key":"e_1_3_2_1_16_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In NAACL.","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In NAACL."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Javid Ebrahimi Anyi Rao Daniel Lowd and Dejing Dou. 2018. HotFlip: White- Box Adversarial Examples for Text Classification. In ACL.","DOI":"10.18653\/v1\/P18-2006"},{"volume-title":"Elastic vector search - highly relevant, lightning fast search. https: \/\/www.elastic.co\/enterprise-search\/vector-search","year":"2025","key":"e_1_3_2_1_18_1","unstructured":"Elastic. [n.d.]. Elastic vector search - highly relevant, lightning fast search. https: \/\/www.elastic.co\/enterprise-search\/vector-search. Accessed: Jan 2025."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Kawin Ethayarajh. 2019. How Contextual are Contextualized Word Representations? Comparing the Geometry of BERT ELMo and GPT-2 Embeddings. In EMNLP.","DOI":"10.18653\/v1\/D19-1006"},{"key":"e_1_3_2_1_20_1","unstructured":"Tianyu Gao Xingcheng Yao and Danqi Chen. 2021. SimCSE: Simple Contrastive Learning of Sentence Embeddings. In EMNLP."},{"key":"e_1_3_2_1_21_1","volume-title":"Generative AI in Search: Let Google do the searching for you. https: \/\/blog.google\/products\/search\/generative-ai-google-search-may-2024\/","author":"Google AI.","year":"2025","unstructured":"Google AI. [n.d.]. Generative AI in Search: Let Google do the searching for you. https: \/\/blog.google\/products\/search\/generative-ai-google-search-may-2024\/. Accessed: Sept 2025."},{"key":"e_1_3_2_1_22_1","volume-title":"Generative summaries for search results","author":"Google AI.","year":"2025","unstructured":"Google AI. [n.d.]. Generative summaries for search results; Patent. https:\/\/patents. google.com\/patent\/US11769017B1\/en. Accessed: Sept 2025."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3605764.3623985"},{"key":"e_1_3_2_1_24_1","volume-title":"Toxigen: A Large-Scale Machine-Generated Dataset for Adversarial and Implicit Hate Speech Detection. arXiv","author":"Hartvigsen Thomas","year":"2022","unstructured":"Thomas Hartvigsen, Saadia Gabriel, Hamid Palangi, Maarten Sap, Dipankar Ray, and Ece Kamar. 2022. Toxigen: A Large-Scale Machine-Generated Dataset for Adversarial and Implicit Hate Speech Detection. arXiv (2022)."},{"key":"e_1_3_2_1_25_1","unstructured":"Andrew Ilyas Logan Engstrom Anish Athalye and Jessy Lin. 2018. Black-box Adversarial Attacks with Limited Queries and Information. In ICML."},{"key":"e_1_3_2_1_26_1","volume-title":"Unsupervised Dense Information Retrieval with Contrastive Learning. arXiv","author":"Izacard Gautier","year":"2021","unstructured":"Gautier Izacard, Mathilde Caron, Lucas Hosseini, Sebastian Riedel, Piotr Bojanowski, Armand Joulin, and Edouard Grave. 2021. Unsupervised Dense Information Retrieval with Contrastive Learning. arXiv (2021)."},{"key":"e_1_3_2_1_27_1","unstructured":"Matthew Jagielski Nicholas Carlini David Berthelot Alex Kurakin and Nicolas Papernot. 2020. High Accuracy and High Fidelity Extraction of Neural Networks. In USENIX Security."},{"key":"e_1_3_2_1_28_1","volume-title":"Baseline Defenses for Adversarial Attacks against Aligned Language Models. arXiv","author":"Jain Neel","year":"2023","unstructured":"Neel Jain, Avi Schwarzschild, Yuxin Wen, Gowthami Somepalli, John Kirchenbauer, Ping-yeh Chiang, Micah Goldblum, Aniruddha Saha, Jonas Geiping, and Tom Goldstein. 2023. Baseline Defenses for Adversarial Attacks against Aligned Language Models. arXiv (2023)."},{"key":"e_1_3_2_1_29_1","unstructured":"Erik Jones Anca Dragan Aditi Raghunathan and Jacob Steinhardt. 2023. Automatically auditing large language models via discrete optimization. In ICML."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Vladimir Karpukhin Barlas Oguz Sewon Min Patrick Lewis Ledell Wu Sergey Edunov Danqi Chen and Wen-tau Yih. 2020. Dense Passage Retrieval for Open-Domain Question Answering. In EMNLP.","DOI":"10.18653\/v1\/2020.emnlp-main.550"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24488-9"},{"key":"e_1_3_2_1_32_1","volume-title":"Manipulating large language models to increase product visibility. arXiv","author":"Kumar Aounon","year":"2024","unstructured":"Aounon Kumar and Himabindu Lakkaraju. 2024. Manipulating large language models to increase product visibility. arXiv (2024)."},{"key":"e_1_3_2_1_33_1","volume-title":"Natural Questions: A Benchmark for Question Answering Research. TACL","author":"Kwiatkowski Tom","year":"2019","unstructured":"Tom Kwiatkowski, Jennimaria Palomaki, Olivia Redfield, Michael Collins, Ankur Parikh, Chris Alberti, Danielle Epstein, Illia Polosukhin, Jacob Devlin, Kenton Lee, Kristina Toutanova, Llion Jones, Matthew Kelcey, Ming-Wei Chang, Andrew M. Dai, Jakob Uszkoreit, Quoc Le, and Slav Petrov. 2019. Natural Questions: A Benchmark for Question Answering Research. TACL (2019)."},{"key":"e_1_3_2_1_34_1","unstructured":"Haize Labs. 2024. Making a SOTA Adversarial Attack on LLMs 38x Faster. (2024). https:\/\/www.haizelabs.com\/technology\/making-a-sota-adversarialattack-on-llms-38x-faster."},{"key":"e_1_3_2_1_35_1","unstructured":"Patrick Lewis Ethan Perez Aleksandra Piktus Fabio Petroni Vladimir Karpukhin Naman Goyal Heinrich K\u00fcttler Mike Lewis Wen-tau Yih Tim Rockt\u00e4schel Sebastian Riedel and Douwe Kiela. 2020. Retrieval-Augmented Generation for Knowledge-Intensive NLP tasks. In NeurIPS."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02181-7"},{"key":"e_1_3_2_1_37_1","unstructured":"Jiawei Liu Yangyang Kang Di Tang Kaisong Song Changlong Sun Xiaofeng Wang Wei Lu and Xiaozhong Liu. 2022. Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models. In CCS."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"key":"e_1_3_2_1_39_1","unstructured":"Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In ICML."},{"key":"e_1_3_2_1_40_1","volume-title":"https:\/\/github.com\/meilisearch\/meilisearch","author":"GitHub","year":"2025","unstructured":"Meilisearch. [n.d.]. Melisearch; GitHub project. https:\/\/github.com\/meilisearch\/meilisearch. Accessed: Sept 2025."},{"key":"e_1_3_2_1_41_1","volume-title":"Scalable, Efficient, and Accurate Text Embedding Models. arXiv","author":"Merrick Luke","year":"2024","unstructured":"Luke Merrick, Danmei Xu, Gaurav Nuti, and Daniel Campos. 2024. Arctic-Embed: Scalable, Efficient, and Accurate Text Embedding Models. arXiv (2024)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"John Morris Volodymyr Kuleshov Vitaly Shmatikov and Alexander Rush. 2023. Text Embeddings Reveal (Almost) As Much As Text. In EMNLP.","DOI":"10.18653\/v1\/2023.emnlp-main.765"},{"key":"e_1_3_2_1_43_1","volume-title":"MTEB: Massive Text Embedding Benchmark. In EACL.","author":"Muennighoff Niklas","year":"2023","unstructured":"Niklas Muennighoff, Nouamane Tazi, Loic Magne, and Nils Reimers. 2023. MTEB: Massive Text Embedding Benchmark. In EACL."},{"key":"e_1_3_2_1_44_1","unstructured":"Fredrik Nestaas Edoardo Debenedetti and Florian Tram\u00e8r. 2024. Adversarial Search Engine Optimization for Large Language Models. In ICLR."},{"key":"e_1_3_2_1_45_1","volume-title":"Ji Ma, Vincent Zhao, Yi Luan, Keith Hall, Ming-Wei Chang, and Yinfei Yang.","author":"Ni Jianmo","year":"2022","unstructured":"Jianmo Ni, Chen Qu, Jing Lu, Zhuyun Dai, Gustavo Hernandez Abrego, Ji Ma, Vincent Zhao, Yi Luan, Keith Hall, Ming-Wei Chang, and Yinfei Yang. 2022. Large Dual Encoders Are Generalizable Retrievers. In EMNLP."},{"key":"e_1_3_2_1_46_1","volume-title":"https:\/\/github.com\/openwebui\/open-webui","author":"Open Open","year":"2025","unstructured":"Open WebUI. [n.d.]. Open WebUI; GitHub project. https:\/\/github.com\/openwebui\/open-webui. Accessed: Sept 2025."},{"key":"e_1_3_2_1_47_1","unstructured":"OpenAI. 2024. GPT-4 Technical Report. OpenAI blog (2024)."},{"key":"e_1_3_2_1_48_1","volume-title":"GPT-4o System Card. arXiv","author":"AI.","year":"2024","unstructured":"OpenAI. 2024. GPT-4o System Card. arXiv (2024)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3689932.3694764"},{"volume-title":"Encyclopedia of Autism Spectrum Disorders.","author":"Paul Rhea","key":"e_1_3_2_1_50_1","unstructured":"Rhea Paul and Deborah Weiss. 2013. Primacy Effects. In Encyclopedia of Autism Spectrum Disorders."},{"key":"e_1_3_2_1_51_1","volume-title":"AdvPrompter: Fast Adaptive Adversarial Prompting for LLMs. arXiv","author":"Paulus Anselm","year":"2024","unstructured":"Anselm Paulus, Arman Zharmagambetov, Chuan Guo, Brandon Amos, and Yuandong Tian. 2024. AdvPrompter: Fast Adaptive Adversarial Prompting for LLMs. arXiv (2024)."},{"key":"e_1_3_2_1_52_1","volume-title":"Language Models are Unsupervised Multitask Learners. OpenAI blog","author":"Radford Alec","year":"2019","unstructured":"Alec Radford, Jeff Wu, Rewon Child, David Luan, Dario Amodei, and Ilya Sutskever. 2019. Language Models are Unsupervised Multitask Learners. OpenAI blog (2019)."},{"key":"e_1_3_2_1_53_1","volume-title":"Hubs in Space: Popular Nearest Neighbors in High-Dimensional Data. JMLR","author":"Radovanovich Milos","year":"2010","unstructured":"Milos Radovanovich, Alexandros Nanopoulos, and Mirjana Ivanovich. 2010. Hubs in Space: Popular Nearest Neighbors in High-Dimensional Data. JMLR (2010)."},{"key":"e_1_3_2_1_54_1","volume-title":"In-Context Retrieval-Augmented Language Models. TACL","author":"Ram Ori","year":"2023","unstructured":"Ori Ram, Yoav Levine, Itay Dalmedigos, Dor Muhlgay, Amnon Shashua, Kevin Leyton-Brown, and Yoav Shoham. 2023. In-Context Retrieval-Augmented Language Models. TACL (2023)."},{"key":"e_1_3_2_1_55_1","volume-title":"One word at a time: adversarial attacks on retrieval models. arXiv","author":"Raval Nisarg","year":"2020","unstructured":"Nisarg Raval and Manisha Verma. 2020. One word at a time: adversarial attacks on retrieval models. arXiv (2020)."},{"volume-title":"Redis - Vector Database and Vector Search. https:\/\/redis.io\/solutions\/vector-database\/","year":"2025","key":"e_1_3_2_1_56_1","unstructured":"Redis. [n.d.]. Redis - Vector Database and Vector Search. https:\/\/redis.io\/solutions\/vector-database\/. Accessed: Jan 2025."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Nils Reimers and Iryna Gurevych. 2019. Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks. In EMNLP.","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_3_2_1_58_1","volume-title":"Harry Potter Books. https:\/\/www.kaggle.com\/datasets\/shubhammaindola\/harry-potter-books","author":"Rowling Joanne K.","year":"2025","unstructured":"Joanne K. Rowling. [n.d.]. Harry Potter Books. https:\/\/www.kaggle.com\/datasets\/shubhammaindola\/harry-potter-books. Accessed: Sept 2025."},{"key":"e_1_3_2_1_59_1","volume-title":"Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, and Prateek Mittal.","author":"Sehwag Vikash","year":"2019","unstructured":"Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, and Prateek Mittal. 2019. Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples. arXiv (2019)."},{"key":"e_1_3_2_1_60_1","unstructured":"Ali Shafahi W. Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks. In NeurIPS."},{"key":"e_1_3_2_1_61_1","unstructured":"Avital Shafran Roei Schuster and Vitaly Shmatikov. 2025. Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents. In USENIX Security."},{"key":"e_1_3_2_1_62_1","volume-title":"Anil Kumar Giri, and Sumit Kumar","author":"Sharma Dushyant","year":"2019","unstructured":"Dushyant Sharma, Rishabh Shukla, Anil Kumar Giri, and Sumit Kumar. 2019. A Brief Review on Search Engine Optimization. In ICCDE."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Congzheng Song Alexander Rush and Vitaly Shmatikov. 2020. Adversarial Semantic Collisions. In EMNLP.","DOI":"10.18653\/v1\/2020.emnlp-main.344"},{"key":"e_1_3_2_1_64_1","unstructured":"Kaitao Song Xu Tan Tao Qin Jianfeng Lu and Tie-Yan Liu. 2020. MPNet: Masked and Permuted Pre-training for Language Understanding. In NeurIPS."},{"key":"e_1_3_2_1_65_1","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian J. Goodfellow and Rob Fergus. 2014. Intriguing Properties of Neural Networks. In ICLR."},{"key":"e_1_3_2_1_66_1","volume-title":"FLRT: Fluent Student-Teacher Redteaming. arXiv","author":"Ben Thompson T.","year":"2024","unstructured":"T. Ben Thompson and Michael Sklar. 2024. FLRT: Fluent Student-Teacher Redteaming. arXiv (2024)."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Roman Vershynin. 2018. High-Dimensional Probability: An Introduction with Applications in Data Science.","DOI":"10.1017\/9781108231596"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Eric Wallace Shi Feng Nikhil Kandpal Matt Gardner and Sameer Singh. 2019. Universal Adversarial Triggers for Attacking and Analyzing NLP. In EMNLP.","DOI":"10.18653\/v1\/D19-1221"},{"key":"e_1_3_2_1_69_1","volume-title":"Text Embeddings by Weakly-Supervised Contrastive Pre-training. arXiv","author":"Wang Liang","year":"2022","unstructured":"Liang Wang, Nan Yang, Xiaolong Huang, Binxing Jiao, Linjun Yang, Daxin Jiang, Rangan Majumder, and Furu Wei. 2022. Text Embeddings by Weakly-Supervised Contrastive Pre-training. arXiv (2022)."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Wenhui Wang Furu Wei Li Dong Hangbo Bao Nan Yang and Ming Zhou. 2020. MiniLM: Deep self-attention distillation for task-agnostic compression of pre-trained transformers. In NeurIPS.","DOI":"10.18653\/v1\/2021.findings-acl.188"},{"key":"e_1_3_2_1_71_1","volume-title":"Faster, Longer: A Modern Bidirectional Encoder for Fast, Memory Efficient, and Long Context Finetuning and Inference. arXiv","author":"Warner Benjamin","year":"2024","unstructured":"Benjamin Warner, Antoine Chaffin, Benjamin Clavi\u00e9, Orion Weller, Oskar Hallstr\u00f6m, Said Taghadouini, Alexis Gallagher, Raja Biswas, Faisal Ladhak, Tom Aarsen, Nathan Cooper, Griffin Adams, Jeremy Howard, and Iacopo Poli. 2024. Smarter, Better, Faster, Longer: A Modern Bidirectional Encoder for Fast, Memory Efficient, and Long Context Finetuning and Inference. arXiv (2024)."},{"key":"e_1_3_2_1_72_1","volume-title":"Yixing Fan, and Xueqi Cheng.","author":"Wu Chen","year":"2023","unstructured":"Chen Wu, Ruqing Zhang, Jiafeng Guo, Maarten De Rijke, Yixing Fan, and Xueqi Cheng. 2023. PRADA: Practical Black-box Adversarial Attacks against Neural Ranking Models. ACM TOIS (2023)."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"Yanru Xiao and Cong Wang. 2021. You See What I Want You To See: Exploring Targeted Black-Box Transferability Attack for Hash-Based Image Retrieval Systems. In CVPR.","DOI":"10.1109\/CVPR46437.2021.00197"},{"key":"e_1_3_2_1_74_1","volume-title":"Approximate Nearest Neighbor Negative Contrastive Learning for Dense Text Retrieval. arXiv","author":"Xiong Lee","year":"2020","unstructured":"Lee Xiong, Chenyan Xiong, Ye Li, Kwok-Fung Tang, Jialin Liu, Paul Bennett, Junaid Ahmed, and Arnold Overwijk. 2020. Approximate Nearest Neighbor Negative Contrastive Learning for Dense Text Retrieval. arXiv (2020)."},{"key":"e_1_3_2_1_75_1","volume-title":"Jasper and Stella: distillation of SOTA embedding models. arXiv","author":"Zhang Dun","year":"2025","unstructured":"Dun Zhang, Jiacheng Li, Ziyang Zeng, and Fulong Wang. 2025. Jasper and Stella: distillation of SOTA embedding models. arXiv (2025)."},{"key":"e_1_3_2_1_76_1","volume-title":"Adversarial Hubness in Multi-Modal Retrieval. arXiv","author":"Zhang Tingwei","year":"2025","unstructured":"Tingwei Zhang, Fnu Suya, Rishi Jha, Collin Zhang, and Vitaly Shmatikov. 2025. Adversarial Hubness in Multi-Modal Retrieval. arXiv (2025)."},{"key":"e_1_3_2_1_77_1","volume-title":"Qwen3 Embedding: Advancing Text Embedding and Reranking Through Foundation Models. arXiv","author":"Zhang Yanzhao","year":"2025","unstructured":"Yanzhao Zhang, Mingxin Li, Dingkun Long, Xin Zhang, Huan Lin, Baosong Yang, Pengjun Xie, An Yang, Dayiheng Liu, Junyang Lin, Fei Huang, and Jingren Zhou. 2025. Qwen3 Embedding: Advancing Text Embedding and Reranking Through Foundation Models. arXiv (2025)."},{"key":"e_1_3_2_1_78_1","unstructured":"Lianmin Zheng Wei-Lin Chiang Ying Sheng Siyuan Zhuang Zhanghao Wu Yonghao Zhuang Zi Lin Zhuohan Li Dacheng Li Eric P. Xing Hao Zhang Joseph E. Gonzalez and Ion Stoica. 2023. Judging LLM-as-a-judge with MTbench and Chatbot Arena. In NeurIPS: D&B."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Zexuan Zhong Ziqing Huang Alexander Wettig and Danqi Chen. 2023. Poisoning Retrieval Corpora by Injecting Adversarial Passages. In EMNLP.","DOI":"10.18653\/v1\/2023.emnlp-main.849"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"crossref","unstructured":"Mo Zhou Zhenxing Niu LeWang Qilin Zhang and Gang Hua. 2020. Adversarial Ranking Attack and Defense. In ECVA.","DOI":"10.1007\/978-3-030-58568-6_46"},{"key":"e_1_3_2_1_81_1","unstructured":"Sicheng Zhu Ruiyi Zhang Bang An GangWu Joe Barrow ZichaoWang Furong Huang Ani Nenkova and Tong Sun. 2024. AutoDAN: Interpretable Gradient-Based Adversarial Attacks on Large Language Models. In COLM."},{"key":"e_1_3_2_1_82_1","volume-title":"Universal and Transferable Adversarial Attacks on Aligned Language Models. arXiv","author":"Zou Andy","year":"2023","unstructured":"Andy Zou, Zifan Wang, Nicholas Carlini, Milad Nasr, J. Zico Kolter, and Matt Fredrikson. 2023. Universal and Transferable Adversarial Attacks on Aligned Language Models. arXiv (2023)."},{"key":"e_1_3_2_1_83_1","volume-title":"PoisonedRAG: Knowledge Poisoning Attacks to Retrieval-Augmented Generation of Large Language Models. arXiv","author":"Zou Wei","year":"2024","unstructured":"Wei Zou, Runpeng Geng, Binghui Wang, and Jinyuan Jia. 2024. PoisonedRAG: Knowledge Poisoning Attacks to Retrieval-Augmented Generation of Large Language Models. arXiv (2024)."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"crossref","unstructured":"Herbert Zuze and Melius Weideman. 2013. Keyword Stuffing and The Big Three Search Engines. Online Inf. Rev. (2013).","DOI":"10.1108\/OIR-11-2011-0193"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:29:36Z","timestamp":1766442576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765095"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":84,"alternative-id":["10.1145\/3719027.3765095","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765095","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}