{"id":"https://openalex.org/W7133361534","doi":"https://doi.org/10.48550/arxiv.2603.01454","title":"VidDoS: Universal Denial-of-Service Attack on Video-based Large Language Models","display_name":"VidDoS: Universal Denial-of-Service Attack on Video-based Large Language Models","publication_year":2026,"publication_date":"2026-03-02","ids":{"openalex":"https://openalex.org/W7133361534","doi":"https://doi.org/10.48550/arxiv.2603.01454"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.01454","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.01454","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.01454","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5127940390","display_name":"Duoxun Tang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tang, Duoxun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010781772","display_name":"D. Z. Dai","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dai, Dasen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5127915780","display_name":"Jiyao Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Jiyao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5127915655","display_name":"Xiao Yang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang, Xiao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5127967637","display_name":"Jianyu Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Jianyu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5128023417","display_name":"Siqi Cai","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cai, Siqi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5127940390"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9025999903678894,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9025999903678894,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.012400000356137753,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.010499999858438969,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.7357000112533569},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6583999991416931},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.6218000054359436},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.4560999870300293},{"id":"https://openalex.org/keywords/mainstream","display_name":"Mainstream","score":0.3481999933719635},{"id":"https://openalex.org/keywords/language-model","display_name":"Language model","score":0.3228999972343445}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7588000297546387},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.7357000112533569},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6583999991416931},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.6218000054359436},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.4560999870300293},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3684999942779541},{"id":"https://openalex.org/C2777617010","wikidata":"https://www.wikidata.org/wiki/Q18957","display_name":"Mainstream","level":2,"score":0.3481999933719635},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.3228999972343445},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3018999993801117},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.30090001225471497},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.2969000041484833},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25870001316070557},{"id":"https://openalex.org/C158600405","wikidata":"https://www.wikidata.org/wiki/Q5054566","display_name":"Causal inference","level":2,"score":0.257999986410141},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.25099998712539673}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.01454","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.01454","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.01454","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.01454","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Video-LLMs":[0,99],"are":[1,8],"increasingly":[2],"deployed":[3],"in":[4,166],"safety-critical":[5],"applications":[6],"but":[7],"vulnerable":[9],"to":[10,59,76,91,135,151,159],"Energy-Latency":[11],"Attacks":[12],"(ELAs)":[13],"that":[14,63,146],"exhaust":[15],"computational":[16],"resources.":[17],"Current":[18],"image-centric":[19],"methods":[20],"fail":[21],"because":[22],"temporal":[23],"aggregation":[24],"mechanisms":[25],"dilute":[26],"individual":[27],"frame":[28],"perturbations.":[29],"Additionally,":[30],"real-time":[31,140],"demands":[32],"make":[33],"instance-wise":[34],"optimization":[35,58],"impractical":[36],"for":[37,52],"continuous":[38],"video":[39,102,106],"streams.":[40],"We":[41,69,155],"introduce":[42],"VidDoS,":[43],"which":[44,104],"is":[45],"the":[46,127,157],"first":[47],"universal":[48,57],"ELA":[49,165],"framework":[50],"tailored":[51],"Video-LLMs.":[53,167],"Our":[54],"method":[55],"leverages":[56],"create":[60],"instance-agnostic":[61],"triggers":[62],"require":[64],"no":[65],"inference-time":[66],"gradient":[67],"calculation.":[68],"achieve":[70],"this":[71,147],"through":[72],"$\\textit{masked":[73],"teacher":[74],"forcing}$":[75],"steer":[77],"models":[78],"toward":[79],"expensive":[80],"target":[81],"sequences,":[82],"combined":[83],"with":[84],"a":[85,118],"$\\textit{refusal":[86],"penalty}$":[87],"and":[88,100,109,125,161],"$\\textit{early-termination":[89],"suppression}$":[90],"override":[92],"conciseness":[93],"priors.":[94],"Testing":[95],"across":[96],"three":[97,101],"mainstream":[98],"datasets,":[103],"include":[105],"question":[107],"answering":[108],"autonomous":[110,141],"driving":[111,142],"scenarios,":[112],"shows":[113],"extreme":[114],"degradation.":[115],"VidDoS":[116],"induces":[117],"token":[119],"expansion":[120],"of":[121,139],"more":[122,131],"than":[123,132],"205$\\times$":[124],"inflates":[126],"inference":[128],"latency":[129,149],"by":[130],"15$\\times$":[133],"relative":[134],"clean":[136],"baselines.":[137],"Simulations":[138],"streams":[143],"further":[144],"reveal":[145],"induced":[148],"leads":[150],"critical":[152],"safety":[153],"violations.":[154],"urge":[156],"community":[158],"recognize":[160],"mitigate":[162],"these":[163],"high-hazard":[164]},"counts_by_year":[],"updated_date":"2026-03-04T07:09:34.246503","created_date":"2026-03-04T00:00:00"}
