publications
2025
-
GradShield: Alignment Preserving Finetuning2025
-
arxivBetter Privilege Separation for Agents by Restricting Data TypesarXiv preprint arXiv:2509.25926, 2025
-
arxiv
-
Multimodal Physical Adversarial Clothing Evades Visible-Thermal Detectors with Non-Overlapping RGB-T Pattern2025
-
AISecJailbreaksovertime: Detecting jailbreak attacks under distribution shiftarXiv preprint arXiv:2504.19440, 2025
-
CODASPYPromptshield: Deployable detection for prompt injection attacksIn Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, 2025
-
TPAMIPhysical Adversarial Examples for Person Detectors in Thermal Images Based on 3D ModelingIEEE Transactions on Pattern Analysis and Machine Intelligence, 2025
2024
-
NeuripsSpotlightToxicity Detection for FreeIn The Thirty-Eighth Annual Conference on Neural Information Processing Systems (Neurips), 2024
-
NeuripsFull-Distance Evasion of Pedestrian Detectors in the Physical WorldIn The Thirty-Eighth Annual Conference on Neural Information Processing Systems (Neurips), 2024
-
CVPRLanguage-Driven Anchors for Zero-Shot Adversarial RobustnessIn Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2024
-
CVPRInfrared Adversarial Car StickersIn Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2024
-
arxivPerfect gradient inversion in federated learning: A new paradigm from the hidden subset sum problemarXiv preprint arXiv:2409.14260, 2024
-
TIFSOn the Privacy Effect of Data Enhancement via the Lens of MemorizationIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2024
2023
-
CVPRPhysically Realizable Natural-Looking Clothing Textures Evade Person Detectors via 3D ModelingIn Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2023
-
Appli.
-
ISCCDriving into Danger: Adversarial Patch Attack on End-to-End Autonomous Driving Systems Using Deep LearningIn 2023 IEEE Symposium on Computers and Communications (ISCC), 2023
2022
-
CVPROralAdversarial Texture for Fooling Person Detectors in the Physical WorldIn Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022
-
CVPROralInfrared Invisible Clothing: Hiding from Infrared Detectors at Multiple Angles in Real WorldIn Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022
-
Neuro.Amplification Trojan Network: Attack Deep Neural Networks by Amplifying Their Inherent WeaknessNeurocomputing, 2022
2017
-
ICONIPAn STDP-based Supervised Learning Algorithm for Spiking Neural NetworksIn International Conference on Neural Information Processing (ICONIP), 2017