Latest papers

11 papers
tool arXiv Mar 19, 2026 · 18d ago

MedForge: Interpretable Medical Deepfake Detection via Forgery-aware Reasoning

Zhihui Chen, Kai He, Qingyuan Lei et al. · National University of Singapore · The Chinese University of Hong Kong +3 more

Detects medical image deepfakes via localize-then-analyze reasoning with expert-aligned explanations on synthetic lesion edits

Output Integrity Attack visionmultimodal
PDF Code
attack arXiv Feb 3, 2026 · 8w ago

Invisible Clean-Label Backdoor Attacks for Generative Data Augmentation

Ting Xiang, Jinhui Zhao, Changjian Chen et al. · Hunan University

Proposes InvLBA, a latent-space clean-label backdoor attack against generative data augmentation pipelines, raising ASR by 46%

Model Poisoning Data Poisoning Attack visiongenerative
PDF
defense arXiv Jan 6, 2026 · Jan 2026

GRRE: Leveraging G-Channel Removed Reconstruction Error for Robust Detection of AI-Generated Images

Shuman He, Xiehua Li, Xioaju Yang et al. · Hunan University · State University of New York at New Paltz

Detects AI-generated images by exploiting reconstruction error differences when the green channel is removed and reconstructed

Output Integrity Attack visiongenerative
PDF
defense arXiv Jan 5, 2026 · Jan 2026

DDNet: A Dual-Stream Graph Learning and Disentanglement Framework for Temporal Forgery Localization

Boyang Zhao, Xin Liao, Jiaxin Chen et al. · Hunan University · Changsha University of Science & Technology

Dual-stream graph learning framework localizes forged video segments by capturing both local artifacts and global semantic anomalies

Output Integrity Attack vision
PDF
attack arXiv Nov 27, 2025 · Nov 2025

Can Protective Watermarking Safeguard the Copyright of 3D Gaussian Splatting?

Wenkai Huang, Yijia Guo, Gaolei Li et al. · Shanghai Jiao Tong University · Shanghai Key Laboratory of Integrated Administration Technologies for Information Security +4 more

Attacks copyright watermarks on 3D Gaussian Splatting assets by isolating and removing watermark-bearing Gaussian primitives via view-dependent rendering analysis

Output Integrity Attack vision
1 citations PDF
defense arXiv Nov 18, 2025 · Nov 2025

Sigil: Server-Enforced Watermarking in U-Shaped Split Federated Learning via Gradient Injection

Zhengchunmin Dai, Jiaxiong Tang, Peng Sun et al. · East China Normal University · Hunan University +1 more

Embeds ownership watermarks into client models via server-side gradient injection in split federated learning to defend against model theft

Model Theft visionfederated-learning
PDF
defense arXiv Nov 17, 2025 · Nov 2025

Robust Client-Server Watermarking for Split Federated Learning

Jiaxiong Tang, Zhengchunmin Dai, Liantao Wu et al. · East China Normal University · Hunan University +1 more

Embeds asymmetric client-server watermarks into split federated learning models to prove joint ownership and resist removal attacks

Model Theft federated-learning
PDF
attack arXiv Nov 12, 2025 · Nov 2025

Boosting Adversarial Transferability via Ensemble Non-Attention

Yipeng Zou, Qin Liu, Jie Wu et al. · Hunan University · China Telecom +2 more

Ensemble adversarial attack leveraging non-attention regions and meta-learning to boost black-box transferability across CNNs and ViTs

Input Manipulation Attack vision
PDF
defense arXiv Oct 9, 2025 · Oct 2025

Physics-Driven Spatiotemporal Modeling for AI-Generated Video Detection

Shuhai Zhang, ZiHao Lian, Jiahao Yang et al. · South China University of Technology · Pazhou Lab +4 more

Detects AI-generated videos via physics-driven NSG statistic quantifying violations of probability flow conservation laws

Output Integrity Attack visiongenerative
6 citations 1 influentialPDF Code
defense arXiv Aug 24, 2025 · Aug 2025

Uncovering and Mitigating Destructive Multi-Embedding Attacks in Deepfake Proactive Forensics

Lixin Jia, Haiyang Sun, Zhiqing Guo et al. · Xinjiang University · Hefei University of Technology +1 more

Defines multi-embedding attacks that destroy deepfake forensic watermarks and defends with adversarial interference simulation training

Output Integrity Attack visiongenerative
PDF Code
defense arXiv Aug 14, 2025 · Aug 2025

Forgery Guided Learning Strategy with Dual Perception Network for Deepfake Cross-domain Detection

Lixin Jia, Zhiqing Guo, Gaobo Yang et al. · Xinjiang University · Xinjiang Multimodal Intelligent Processing and Information Security Engineering Technology Research Center +2 more

Proposes FGL strategy and DPNet architecture for cross-domain deepfake detection generalizing to unknown forgery techniques

Output Integrity Attack vision
PDF Code