Latest papers

3 papers
attack arXiv Apr 23, 2026 · 28d ago

Adversarial Evasion in Non-Stationary Malware Detection: Minimizing Drift Signals through Similarity-Constrained Perturbations

Pawan Acharya, Lan Zhang · Northern Arizona University

Adversarial attacks on ML malware detectors that evade classification while avoiding detection by drift monitoring systems

Input Manipulation Attack Model Skewing tabular
PDF
attack FLLM Mar 4, 2026 · 11w ago

Image-based Prompt Injection: Hijacking Multimodal LLMs through Visually Embedded Adversarial Instructions

Neha Nagaraja, Lan Zhang, Zhilong Wang et al. · Northern Arizona University · ByteDance

Black-box attack conceals adversarial text instructions inside natural images to hijack multimodal LLM outputs via visual prompt injection

Input Manipulation Attack Prompt Injection visionnlpmultimodal
PDF
defense arXiv Jan 10, 2026 · Jan 2026

Burn-After-Use for Preventing Data Leakage through a Secure Multi-Tenant Architecture in Enterprise LLM

Qiang Zhang, Elena Emma Wang, Jiaming Li et al. · Northern Arizona University · American Heritage Academy

Proposes tenant isolation and ephemeral context destruction architecture to prevent cross-session data leakage in enterprise LLMs

Sensitive Information Disclosure nlp
1 citations PDF