Latest papers

5 papers
tool arXiv Mar 31, 2026 · 8d ago

GazeCLIP: Gaze-Guided CLIP with Adaptive-Enhanced Fine-Grained Language Prompt for Deepfake Attribution and Detection

Yaning Zhang, Linlin Shen, Zitong Yu et al. · Qilu University of Technology · Shenzhen University +2 more

Deepfake detector using gaze patterns and CLIP-based vision-language matching to attribute and detect GAN/diffusion-generated faces

Output Integrity Attack visionmultimodal
PDF
attack arXiv Mar 15, 2026 · 24d ago

Membership Inference for Contrastive Pre-training Models with Text-only PII Queries

Ruoxi Cheng, Yizhong Ding, Hongyi Zhang et al. · Beijing Electronic Science and Technology Institute · Alibaba Group +2 more

Text-only membership inference attack on CLIP/CLAP models that detects PII memorization without exposing biometric data

Membership Inference Attack multimodalvisionaudionlp
PDF
defense arXiv Mar 12, 2026 · 27d ago

ForensicZip: More Tokens are Better but Not Necessary in Forensic Vision-Language Models

Yingxin Lai, Zitong Yu, Jun Wang et al. · Great Bay University · Shenzhen University +2 more

Forensic-aware visual token pruning for deepfake/AIGC detection VLMs using Birth-Death Optimal Transport to preserve manipulation traces

Output Integrity Attack visionmultimodalnlp
PDF Code
defense arXiv Dec 3, 2025 · Dec 2025

Context-Aware Hierarchical Learning: A Two-Step Paradigm towards Safer LLMs

Tengyun Ma, Jiaqi Yao, Daojing He et al. · Harbin Institute of Technology · Great Bay University +2 more

Proposes Tool-Completion Attack exploiting LLM function-calling and defends via context-aware instruction hierarchy training

Prompt Injection Insecure Plugin Design nlp
PDF Code
attack arXiv Nov 1, 2025 · Nov 2025

Enhancing Adversarial Transferability by Balancing Exploration and Exploitation with Gradient-Guided Sampling

Zenghao Niu, Weicheng Xie, Siyang Song et al. · Shenzhen University · Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ) +3 more

Gradient-guided sampling attack improves adversarial transferability across DNNs and VLMs by balancing loss flatness and attack potency

Input Manipulation Attack Prompt Injection visionmultimodal
PDF Code