Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PentestGPT: An LLM-empowered Automatic Penetration Testing Tool., , , , , , , , , and . CoRR, (2023)Oedipus: LLM-enchanced Reasoning CAPTCHA Solver., , , , , and . CoRR, (2024)SPOLRE: Semantic Preserving Object Layout Reconstruction for Image Captioning System Testing., , , , , , and . CoRR, (2024)GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models., , , , , , , , , and . CoRR, (2024)Image-Based Geolocation Using Large Vision-Language Models., , , , , , , , and . CoRR, (2024)SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View., , , , , and . EuroS&P, page 1082-1100. IEEE, (2023)The Threat of Offensive AI to Organizations., , , , , , , , , and . CoRR, (2021)Morest: Model-based RESTful API Testing with Execution Feedback., , , , , , , , and . ICSE, page 1406-1417. ACM, (2022)PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG)., , , , , , and . ICSE, page 64:1-64:12. ACM, (2024)Lockpicking LLMs: A Logit-Based Jailbreak Using Token-level Manipulation., , , , , , and . CoRR, (2024)