Latest papers

3 papers
defense arXiv Mar 23, 2026 · 14d ago

Disentangling Speaker Traits for Deepfake Source Verification via Chebyshev Polynomial and Riemannian Metric Learning

Xi Xuan, Wenxin Zhang, Zhiyu Li et al. · University of Eastern Finland · City University of Hong Kong +3 more

Disentangles speaker traits from deepfake source embeddings using Chebyshev polynomials and Riemannian geometry for robust generator verification

Output Integrity Attack audiogenerative
PDF Code
defense arXiv Sep 26, 2025 · Sep 2025

Adversarial training with restricted data manipulation

David Benfield, Stefano Coniglio, Phan Tu Vuong et al. · University of Southampton · University of Bergamo

Constrained bilevel optimization for adversarial training that restricts the adversary to produce more realistic evasion attacks

Input Manipulation Attack visionnlptabular
PDF
defense arXiv Sep 26, 2025 · Sep 2025

Countering adversarial evasion in regression analysis

David Benfield, Phan Tu Vuong, Alain Zemkoho · University of Southampton

Pessimistic bilevel optimization defense extends adversarial evasion robustness from classifiers to regression without convexity assumptions

Input Manipulation Attack tabular
PDF