Latest papers

3 papers
defense arXiv Mar 24, 2026 · 13d ago

SAiW: Source-Attributable Invisible Watermarking for Proactive Deepfake Defense

Bibek Das, Chandranath Adak, Soumi Chattopadhyay et al. · Indian Institute of Technology Patna · Indian Institute of Technology Indore +2 more

Embeds source-attributable invisible watermarks in generated images to trace deepfake origins and verify media authenticity

Output Integrity Attack visiongenerative
PDF Code
attack arXiv Jan 23, 2026 · 10w ago

Persona Jailbreaking in Large Language Models

Jivnesh Sandhan, Fei Cheng, Tushar Sandhan et al. · Kyoto University · Indian Institute of Technology Kanpur

Black-box attack gradually hijacks LLM personas via adversarial conversational history, bypassing guardrails across 8 LLMs

Prompt Injection nlp
PDF Code
attack arXiv Oct 17, 2025 · Oct 2025

Constrained Adversarial Perturbation

Virendra Nishad, Bhaskar Mukhoty, Hilal AlQuabeh et al. · Indian Institute of Technology Kanpur · Indian Institute of Technology Delhi +2 more

Proposes CAP, constraint-aware universal adversarial perturbations for tabular domains via augmented Lagrangian min-max optimization

Input Manipulation Attack tabular
PDF