Latest papers

6 papers
benchmark arXiv Mar 30, 2026 · 7d ago

Evaluating Privilege Usage of Agents on Real-World Tools

Quan Zhang, Lianhang Fu, Lvsi Lian et al. · East China Normal University · Xinjiang University +1 more

Benchmark evaluating LLM agents' privilege control under prompt injection attacks using real-world tools, finding 84.80% attack success

Prompt Injection Insecure Plugin Design Excessive Agency nlp
PDF
defense arXiv Feb 26, 2026 · 5w ago

All in One: Unifying Deepfake Detection, Tampering Localization, and Source Tracing with a Robust Landmark-Identity Watermark

Junjiang Wu, Liejun Wang, Zhiqing Guo · Xinjiang University · Xinjiang Multimodal Intelligent Processing and Information Security Engineering Technology Research Center

Proactive deepfake defense embedding landmark-identity watermarks into faces for unified detection, localization, and source tracing

Output Integrity Attack visiongenerative
PDF Code
attack arXiv Nov 3, 2025 · Nov 2025

Black-Box Membership Inference Attack for LVLMs via Prior Knowledge-Calibrated Memory Probing

Jinhua Yin, Peiru Yang, Chen Yang et al. · Tsinghua University · Beijing University of Posts and Telecommunications +1 more

First black-box membership inference attack on LVLMs using prior knowledge-calibrated probing to detect private training data.

Membership Inference Attack visionnlpmultimodal
1 citations PDF Code
defense arXiv Aug 24, 2025 · Aug 2025

Uncovering and Mitigating Destructive Multi-Embedding Attacks in Deepfake Proactive Forensics

Lixin Jia, Haiyang Sun, Zhiqing Guo et al. · Xinjiang University · Hefei University of Technology +1 more

Defines multi-embedding attacks that destroy deepfake forensic watermarks and defends with adversarial interference simulation training

Output Integrity Attack visiongenerative
PDF Code
defense arXiv Aug 14, 2025 · Aug 2025

Forgery Guided Learning Strategy with Dual Perception Network for Deepfake Cross-domain Detection

Lixin Jia, Zhiqing Guo, Gaobo Yang et al. · Xinjiang University · Xinjiang Multimodal Intelligent Processing and Information Security Engineering Technology Research Center +2 more

Proposes FGL strategy and DPNet architecture for cross-domain deepfake detection generalizing to unknown forgery techniques

Output Integrity Attack vision
PDF Code
defense arXiv Aug 11, 2025 · Aug 2025

Boosting Active Defense Persistence: A Two-Stage Defense Framework Combining Interruption and Poisoning Against Deepfake

Hongrui Zheng, Yuezun Li, Liejun Wang et al. · Xinjiang University · Ocean University of China +1 more

Defends against deepfake retraining attacks by combining adversarial interruption perturbations with data poisoning to ensure long-term persistence

Output Integrity Attack Data Poisoning Attack visiongenerative
PDF Code