Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SPOLRE: Semantic Preserving Object Layout Reconstruction for Image Captioning System Testing., , , , , , and . CoRR, (2024)Oedipus: LLM-enchanced Reasoning CAPTCHA Solver., , , , , and . CoRR, (2024)PentestGPT: An LLM-empowered Automatic Penetration Testing Tool., , , , , , , , , and . CoRR, (2023)GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models., , , , , , , , , and . CoRR, (2024)Image-Based Geolocation Using Large Vision-Language Models., , , , , , , , and . CoRR, (2024)The Threat of Offensive AI to Organizations., , , , , , , , , and . CoRR, (2021)SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View., , , , , and . EuroS&P, page 1082-1100. IEEE, (2023)PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG)., , , , , , and . ICSE, page 64:1-64:12. ACM, (2024)Lockpicking LLMs: A Logit-Based Jailbreak Using Token-level Manipulation., , , , , , and . CoRR, (2024)LLM Jailbreak Attack versus Defense Techniques - A Comprehensive Study., , , , and . CoRR, (2024)