Latest papers

3 papers
attack arXiv Dec 18, 2025 · Dec 2025

Hacking Neural Evaluation Metrics with Single Hub Text

Hiroyuki Deguchi, Katsuki Chousa, Yusuke Sakai · NTT · Nara Institute of Science and Technology

Adversarial hub text attack fools COMET translation metric into assigning high scores regardless of source or reference

Input Manipulation Attack nlp
PDF
defense arXiv Nov 12, 2025 · Nov 2025

Robust Backdoor Removal by Reconstructing Trigger-Activated Changes in Latent Representation

Kazuki Iwahana, Yusuke Yamasaki, Akira Ito et al. · NTT

Defends against backdoor attacks by reconstructing trigger-activated latent changes via convex optimization to identify and remove poisoned neurons

Model Poisoning vision
PDF Code
attack IACR ePrint Oct 8, 2025 · Oct 2025

Is the Hard-Label Cryptanalytic Model Extraction Really Polynomial?

Akira Ito, Takayuki Miura, Yosuke Todo · NTT

Critiques polynomial-time model extraction claims for deep ReLU nets and proposes CrossLayer Extraction to reduce query costs

Model Theft vision
4 citations 1 influentialPDF