Latest papers

5 papers
benchmark arXiv Nov 14, 2025 · Nov 2025

Exposing Weak Links in Multi-Agent Systems under Adversarial Prompting

Nirmit Arora, Sathvik Joel, Ishan Kavathekar et al. · Microsoft Research · International Institute of Information Technology +1 more

Benchmarks adversarial prompt vulnerabilities across five multi-agent LLM architectures using a new evaluation framework and diagnostic metric

Prompt Injection Excessive Agency nlp
2 citations PDF Code
attack arXiv Nov 10, 2025 · Nov 2025

LoReTTA: A Low Resource Framework To Poison Continuous Time Dynamic Graphs

Himanshu Pal, Venkata Sai Pranav Bachina, Ankit Gangwal et al. · International Institute of Information Technology

Two-phase data poisoning attack on temporal GNNs that degrades performance 29% by removing critical edges and injecting adversarial negatives

Data Poisoning Attack graph
PDF Code
benchmark arXiv Nov 7, 2025 · Nov 2025

TAMAS: Benchmarking Adversarial Risks in Multi-Agent LLM Systems

Ishan Kavathekar, Hemang Jain, Ameya Rathod et al. · International Institute of Information Technology · Microsoft Research

Benchmark evaluating six adversarial attack types against multi-agent LLM systems across 10 backbone LLMs and two agent frameworks

Prompt Injection Excessive Agency nlp
PDF Code
attack arXiv Oct 28, 2025 · Oct 2025

Attack on a PUF-based Secure Binary Neural Network

Bijeet Basak, Nupur Patil, Kurian Polachan et al. · International Institute of Information Technology

Differential cryptanalysis-inspired attack recovers PUF key bit-by-bit to steal protected BNN weights from memristive hardware.

Model Theft vision
1 citations PDF
benchmark arXiv Sep 28, 2025 · Sep 2025

Merge Now, Regret Later: The Hidden Cost of Model Merging is Adversarial Transferability

Ankit Gangwal, Aaryan Ajay Sharma · International Institute of Information Technology

Reveals model merging increases black-box transfer attack vulnerability to >95% success rate across 336 attack settings, contradicting the 'free robustness' assumption

Input Manipulation Attack vision
1 citations PDF