Exploiting Instruction-Following Retrievers for Malicious Information Retrieval Paper • 2503.08644 • Published Mar 11 • 16