Picture for David Wagner

David Wagner

Web Agents Should Adopt the Plan-Then-Execute Paradigm

Add code
May 14, 2026
Viaarxiv icon

GradShield: Alignment Preserving Finetuning

Add code
May 13, 2026
Viaarxiv icon

Trojan Hippo: Weaponizing Agent Memory for Data Exfiltration

Add code
May 05, 2026
Viaarxiv icon

SeedAIchemy: LLM-Driven Seed Corpus Generation for Fuzzing

Add code
Nov 16, 2025
Figure 1 for SeedAIchemy: LLM-Driven Seed Corpus Generation for Fuzzing
Figure 2 for SeedAIchemy: LLM-Driven Seed Corpus Generation for Fuzzing
Figure 3 for SeedAIchemy: LLM-Driven Seed Corpus Generation for Fuzzing
Figure 4 for SeedAIchemy: LLM-Driven Seed Corpus Generation for Fuzzing
Viaarxiv icon

Meta SecAlign: A Secure Foundation LLM Against Prompt Injection Attacks

Add code
Jul 03, 2025
Viaarxiv icon

JULI: Jailbreak Large Language Models by Self-Introspection

Add code
May 17, 2025
Viaarxiv icon

Toxicity Detection for Free

Add code
May 29, 2024
Figure 1 for Toxicity Detection for Free
Figure 2 for Toxicity Detection for Free
Figure 3 for Toxicity Detection for Free
Figure 4 for Toxicity Detection for Free
Viaarxiv icon

Certifiably Robust RAG against Retrieval Corruption

Add code
May 24, 2024
Figure 1 for Certifiably Robust RAG against Retrieval Corruption
Figure 2 for Certifiably Robust RAG against Retrieval Corruption
Figure 3 for Certifiably Robust RAG against Retrieval Corruption
Figure 4 for Certifiably Robust RAG against Retrieval Corruption
Viaarxiv icon

Vulnerability Detection with Code Language Models: How Far Are We?

Add code
Mar 27, 2024
Figure 1 for Vulnerability Detection with Code Language Models: How Far Are We?
Figure 2 for Vulnerability Detection with Code Language Models: How Far Are We?
Figure 3 for Vulnerability Detection with Code Language Models: How Far Are We?
Figure 4 for Vulnerability Detection with Code Language Models: How Far Are We?
Viaarxiv icon

Generative AI Security: Challenges and Countermeasures

Add code
Feb 20, 2024
Figure 1 for Generative AI Security: Challenges and Countermeasures
Figure 2 for Generative AI Security: Challenges and Countermeasures
Figure 3 for Generative AI Security: Challenges and Countermeasures
Figure 4 for Generative AI Security: Challenges and Countermeasures
Viaarxiv icon