Latest papers

3 papers
defense arXiv Nov 4, 2025 · Nov 2025

Adaptive and Robust Data Poisoning Detection and Sanitization in Wearable IoT Systems using Large Language Models

W.K.M Mithsara, Ning Yang, Ahmed Imteaj et al. · Southern Illinois University · Florida Atlantic University +1 more

Defends wearable IoT HAR models against data poisoning using LLMs with zero/few-shot prompting and chain-of-thought reasoning for detection and sanitization.

Data Poisoning Attack timeseriesnlp
PDF
attack arXiv Oct 1, 2025 · Oct 2025

On the Adversarial Robustness of Learning-based Conformal Novelty Detection

Daofu Zhang, Mehrdad Pournaderi, Hanne M. Clifford et al. · University of Utah · Syracuse University +1 more

Attacks ML-based conformal novelty detectors via black-box perturbations that inflate false discovery rates while preserving detection power

Input Manipulation Attack visiontabular
1 citations PDF
attack arXiv Sep 30, 2025 · Sep 2025

Revoking Amnesia: RL-based Trajectory Optimization to Resurrect Erased Concepts in Diffusion Models

Daiheng Gao, Nanxiang Jiang, Andi Zhang et al. · University of Science and Technology of China · Beihang University +3 more

RL-based trajectory steering attack that resurrects concepts erased by safety mechanisms in diffusion models 10x faster than prior methods

Input Manipulation Attack visiongenerative
8 citations 1 influentialPDF