Latest papers

10 papers
attack CoDAIM workshop Mar 21, 2026 · 16d ago

ACRFence: Preventing Semantic Rollback Attacks in Agent Checkpoint-Restore

Yusheng Zheng, Yiwei Yang, Wei Zhang et al. · UC Santa Cruz · University of Connecticut

LLM agent checkpoint-restore creates replay vulnerabilities enabling duplicate payments and credential reuse through non-deterministic request regeneration

Insecure Plugin Design Excessive Agency nlp
PDF
attack arXiv Mar 21, 2026 · 16d ago

Adversarial Attacks on Locally Private Graph Neural Networks

Matta Varun, Ajay Kumar Dhakar, Yuan Hong et al. · Indian Institute of Technology Kharagpur · University of Connecticut

Analyzes adversarial attacks on LDP-protected GNNs, exploring how privacy noise affects attack effectiveness and robustness

Input Manipulation Attack Data Poisoning Attack graph
PDF
defense arXiv Mar 17, 2026 · 20d ago

Detecting Data Poisoning in Code Generation LLMs via Black-Box, Vulnerability-Oriented Scanning

Shenao Yan, Shimaa Ahmed, Shan Jin et al. · University of Connecticut · Visa Research

Black-box scanning framework detecting poisoned code generation LLMs by identifying recurring vulnerable code structures across diverse prompts

Data Poisoning Attack Model Poisoning Training Data Poisoning nlp
PDF
benchmark arXiv Feb 28, 2026 · 5w ago

Analyzing Physical Adversarial Example Threats to Machine Learning in Election Systems

Khaleque Md Aashiq Kamal, Surya Eada, Aayushi Verma et al. · University of Rhode Island · University of Connecticut

Analyzes physical adversarial example attacks on ML ballot classifiers using a probabilistic framework to quantify election-flipping thresholds

Input Manipulation Attack vision
PDF Code
defense arXiv Oct 22, 2025 · Oct 2025

Towards Strong Certified Defense with Universal Asymmetric Randomization

Hanbin Hong, Ashish Kundu, Ali Payani et al. · University of Connecticut · Cisco Research +1 more

Certified adversarial defense using anisotropic randomized smoothing that outperforms isotropic baselines by up to 182.6% on certified accuracy

Input Manipulation Attack vision
PDF Code
survey arXiv Oct 17, 2025 · Oct 2025

SoK: Taxonomy and Evaluation of Prompt Security in Large Language Models

Hanbin Hong, Shuya Feng, Nima Naderloui et al. · University of Connecticut · University of Alabama at Birmingham

SoK survey unifying LLM jailbreak taxonomy, threat models, evaluation toolkit, and the largest annotated jailbreak dataset

Input Manipulation Attack Prompt Injection nlp
2 citations 1 influentialPDF Code
defense In Proceedings of the 32nd ACM... Sep 5, 2025 · Sep 2025

Safeguarding Graph Neural Networks against Topology Inference Attacks

Jie Fu, Yuan Hong, Zhili Chen et al. · Stevens Institute of Technology · University of Connecticut +1 more

Proposes graph topology reconstruction attacks on GNNs and a bi-level optimization defense to prevent training data leakage

Model Inversion Attack graph
PDF Code
defense arXiv Aug 11, 2025 · Aug 2025

Selective KV-Cache Sharing to Mitigate Timing Side-Channels in LLM Inference

Kexin Chu, Zecheng Lin, Dawei Xiang et al. · University of Connecticut · Tsinghua University +3 more

Defends multi-tenant LLM inference from timing side-channels that leak user queries via KV-cache hit/miss timing differences

Sensitive Information Disclosure nlp
PDF Code
attack arXiv Aug 3, 2025 · Aug 2025

Practical, Generalizable and Robust Backdoor Attacks on Text-to-Image Diffusion Models

Haoran Dai, Jiawen Wang, Ruo Yang et al. · Illinois Institute of Technology · Samsung +2 more

Backdoor attack on text-to-image diffusion models achieving >90% success with only 10 poisoned samples and natural-language triggers

Model Poisoning Data Poisoning Attack visionnlpgenerative
PDF
defense arXiv Jan 4, 2025 · Jan 2025

AdaMixup: A Dynamic Defense Framework for Membership Inference Attack Mitigation

Ying Chen, Jiajing Chen, Yijie Weng et al. · New York University · University of California +3 more

Defends against membership inference attacks using adaptive mixup training that dynamically adjusts interpolation ratios during training

Membership Inference Attack vision
3 citations PDF