Picture for Fengyuan Xu

Fengyuan Xu

A Systematic Study of Code Obfuscation Against LLM-based Vulnerability Detection

Add code
Dec 18, 2025
Figure 1 for A Systematic Study of Code Obfuscation Against LLM-based Vulnerability Detection
Figure 2 for A Systematic Study of Code Obfuscation Against LLM-based Vulnerability Detection
Figure 3 for A Systematic Study of Code Obfuscation Against LLM-based Vulnerability Detection
Figure 4 for A Systematic Study of Code Obfuscation Against LLM-based Vulnerability Detection
Viaarxiv icon

Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping

Add code
Nov 17, 2025
Figure 1 for Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping
Figure 2 for Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping
Figure 3 for Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping
Figure 4 for Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping
Viaarxiv icon

GTR-Mamba: Geometry-to-Tangent Routing for Hyperbolic POI Recommendation

Add code
Oct 27, 2025
Viaarxiv icon

LLM-based Human-like Traffic Simulation for Self-driving Tests

Add code
Aug 23, 2025
Viaarxiv icon

FLiP: Privacy-Preserving Federated Learning based on the Principle of Least Privileg

Add code
Oct 25, 2024
Figure 1 for FLiP: Privacy-Preserving Federated Learning based on the Principle of Least Privileg
Figure 2 for FLiP: Privacy-Preserving Federated Learning based on the Principle of Least Privileg
Figure 3 for FLiP: Privacy-Preserving Federated Learning based on the Principle of Least Privileg
Figure 4 for FLiP: Privacy-Preserving Federated Learning based on the Principle of Least Privileg
Viaarxiv icon

Making Every Frame Matter: Continuous Video Understanding for Large Models via Adaptive State Modeling

Add code
Oct 19, 2024
Figure 1 for Making Every Frame Matter: Continuous Video Understanding for Large Models via Adaptive State Modeling
Figure 2 for Making Every Frame Matter: Continuous Video Understanding for Large Models via Adaptive State Modeling
Figure 3 for Making Every Frame Matter: Continuous Video Understanding for Large Models via Adaptive State Modeling
Figure 4 for Making Every Frame Matter: Continuous Video Understanding for Large Models via Adaptive State Modeling
Viaarxiv icon

Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?

Add code
Sep 24, 2024
Figure 1 for Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?
Figure 2 for Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?
Figure 3 for Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?
Figure 4 for Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?
Viaarxiv icon

CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation

Add code
Sep 04, 2024
Figure 1 for CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation
Figure 2 for CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation
Figure 3 for CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation
Figure 4 for CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation
Viaarxiv icon

Manipulating Transfer Learning for Property Inference

Add code
Mar 21, 2023
Figure 1 for Manipulating Transfer Learning for Property Inference
Figure 2 for Manipulating Transfer Learning for Property Inference
Figure 3 for Manipulating Transfer Learning for Property Inference
Figure 4 for Manipulating Transfer Learning for Property Inference
Viaarxiv icon

Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection

Add code
Jun 18, 2021
Figure 1 for Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection
Figure 2 for Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection
Figure 3 for Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection
Figure 4 for Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection
Viaarxiv icon