Latest papers

5 papers
defense arXiv Dec 23, 2025 · Dec 2025

ChatGPT: Excellent Paper! Accept It. Editor: Imposter Found! Review Rejected

Kanchon Gharami, Sanjiv Kumar Sarkar, Yongxin Liu et al. · Embry-Riddle Aeronautical University · Axelon Services Corporation

Attacks LLM peer reviewers via hidden PDF prompt injection and defends with trigger-trap detection to expose AI-generated reviews

Output Integrity Attack Prompt Injection nlp
PDF
defense Computer Assisted Radiology an... Nov 2, 2025 · Nov 2025

Keys in the Weights: Transformer Authentication Using Model-Bound Latent Representations

Ayşe S. Okatan, Mustafa İlhan Akbaş, Laxima Niure Kandel et al. · Embry-Riddle Aeronautical University

Exploits natural transformer weight divergence as a secret-free model authentication primitive for secure AI pipelines

Model Theft nlp
PDF Code
defense Computer Assisted Radiology an... Nov 2, 2025 · Nov 2025

Seed-Induced Uniqueness in Transformer Models: Subspace Alignment Governs Subliminal Transfer

Ayşe Selin Okatan, Mustafa İlhan Akbaş, Laxima Niure Kandel et al. · Embry-Riddle Aeronautical University

Analyzes covert subliminal transfer through distillation, showing random seed controls subspace alignment and thus trait leakage between transformers

Transfer Learning Attack nlp
PDF Code
defense arXiv Sep 24, 2025 · Sep 2025

Advancing Practical Homomorphic Encryption for Federated Learning: Theoretical Guarantees and Efficiency Optimizations

Ren-Yi Huang, Dumindu Samaraweera, Prashant Shekhar et al. · University of South Florida · Embry-Riddle Aeronautical University

Theoretical BCRLB framework analyzes selective homomorphic encryption as a defense against gradient reconstruction attacks in federated learning

Model Inversion Attack federated-learning
1 citations PDF
attack arXiv Aug 31, 2025 · Aug 2025

Clone What You Can't Steal: Black-Box LLM Replication via Logit Leakage and Distillation

Kanchon Gharami, Hansaka Aluvihare, Shafika Showkat Moni et al. · Embry-Riddle Aeronautical University

Two-stage black-box LLM cloning attack using top-k logit leakage and distillation, completing in under 24 GPU-hours with 10k queries

Model Theft Model Theft nlp
PDF