Author of the publication

Two-in-One: A Model Hijacking Attack Against Text Generation Models.

, , , and . USENIX Security Symposium, page 2223-2240. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inferring causal molecular networks: empirical assessment through a community-based effort, , , , , , , , , and 163 other author(s). Nature Methods, 13 (4): 310--318 (Feb 22, 2016)A Multi-scale SAR Scene Matching Algorithm Based on Compressed Contour Feature., , and . ICIG (1), volume 9217 of Lecture Notes in Computer Science, page 188-197. Springer, (2015)Real-time transceiver implementation for SC-FDE acoustic modems., , , and . WUWNet, page 5. ACM, (2016)Human Flesh Search Engine and Online Privacy., and . Science and Engineering Ethics, 22 (2): 601-604 (2016)Service Replacement Algorithm Using Complex Network., and . Trans. Edutainment, (2012)Tiered Cloud Storage via Two-Stage, Latency-Aware Bidding., , , and . IEEE Trans. Network and Service Management, 16 (1): 176-191 (2019)A Low Cost Method for Determining the Entire Network Path Bandwidths of Indirect High-Performance Computer Networks., , , , , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 15-22. IEEE, (2018)Specific vehicle detection and tracking in road environment., , , , and . ICIMCS, page 182-186. ACM, (2011)Social network analysis on data diffusion in delay tolerant networks., and . MobiHoc, page 345-346. ACM, (2009)An Efficient Method for Determining Full Point-to-Point Latency of Arbitrary Indirect HPC Networks., , , , , and . NPC, volume 11276 of Lecture Notes in Computer Science, page 52-63. Springer, (2018)