Picture for Taeho Hwang

Taeho Hwang

Temporal Information Retrieval via Time-Specifier Model Merging

Add code
Jul 09, 2025
Viaarxiv icon

Lossless Acceleration of Large Language Models with Hierarchical Drafting based on Temporal Locality in Speculative Decoding

Add code
Feb 08, 2025
Viaarxiv icon

EXIT: Context-Aware Extractive Compression for Enhancing Retrieval-Augmented Generation

Add code
Dec 17, 2024
Figure 1 for EXIT: Context-Aware Extractive Compression for Enhancing Retrieval-Augmented Generation
Figure 2 for EXIT: Context-Aware Extractive Compression for Enhancing Retrieval-Augmented Generation
Figure 3 for EXIT: Context-Aware Extractive Compression for Enhancing Retrieval-Augmented Generation
Figure 4 for EXIT: Context-Aware Extractive Compression for Enhancing Retrieval-Augmented Generation
Viaarxiv icon

DSLR: Document Refinement with Sentence-Level Re-ranking and Reconstruction to Enhance Retrieval-Augmented Generation

Add code
Jul 04, 2024
Figure 1 for DSLR: Document Refinement with Sentence-Level Re-ranking and Reconstruction to Enhance Retrieval-Augmented Generation
Figure 2 for DSLR: Document Refinement with Sentence-Level Re-ranking and Reconstruction to Enhance Retrieval-Augmented Generation
Figure 3 for DSLR: Document Refinement with Sentence-Level Re-ranking and Reconstruction to Enhance Retrieval-Augmented Generation
Figure 4 for DSLR: Document Refinement with Sentence-Level Re-ranking and Reconstruction to Enhance Retrieval-Augmented Generation
Viaarxiv icon

Typos that Broke the RAG's Back: Genetic Attack on RAG Pipeline by Simulating Documents in the Wild via Low-level Perturbations

Add code
Apr 22, 2024
Figure 1 for Typos that Broke the RAG's Back: Genetic Attack on RAG Pipeline by Simulating Documents in the Wild via Low-level Perturbations
Figure 2 for Typos that Broke the RAG's Back: Genetic Attack on RAG Pipeline by Simulating Documents in the Wild via Low-level Perturbations
Figure 3 for Typos that Broke the RAG's Back: Genetic Attack on RAG Pipeline by Simulating Documents in the Wild via Low-level Perturbations
Figure 4 for Typos that Broke the RAG's Back: Genetic Attack on RAG Pipeline by Simulating Documents in the Wild via Low-level Perturbations
Viaarxiv icon