Picture for Jiate Li

Jiate Li

When Simulation Lies: A Sim-to-Real Benchmark and Domain-Randomized RL Recipe for Tool-Use Agents

Add code
May 12, 2026
Viaarxiv icon

Geometry over Density: Few-Shot Cross-Domain OOD Detection

Add code
May 05, 2026
Viaarxiv icon

The Blind Spot of Agent Safety: How Benign User Instructions Expose Critical Vulnerabilities in Computer-Use Agents

Add code
Apr 12, 2026
Viaarxiv icon

Auditable Agents

Add code
Apr 07, 2026
Viaarxiv icon

No Attacker Needed: Unintentional Cross-User Contamination in Shared-State LLM Agents

Add code
Apr 01, 2026
Viaarxiv icon

A Systematic Study of Model Extraction Attacks on Graph Foundation Models

Add code
Nov 14, 2025
Viaarxiv icon

When Deepfake Detection Meets Graph Neural Network:a Unified and Lightweight Learning Framework

Add code
Aug 07, 2025
Viaarxiv icon

Practicable Black-box Evasion Attacks on Link Prediction in Dynamic Graphs -- A Graph Sequential Embedding Method

Add code
Dec 17, 2024
Figure 1 for Practicable Black-box Evasion Attacks on Link Prediction in Dynamic Graphs -- A Graph Sequential Embedding Method
Figure 2 for Practicable Black-box Evasion Attacks on Link Prediction in Dynamic Graphs -- A Graph Sequential Embedding Method
Figure 3 for Practicable Black-box Evasion Attacks on Link Prediction in Dynamic Graphs -- A Graph Sequential Embedding Method
Figure 4 for Practicable Black-box Evasion Attacks on Link Prediction in Dynamic Graphs -- A Graph Sequential Embedding Method
Viaarxiv icon

Graph Neural Network Explanations are Fragile

Add code
Jun 05, 2024
Viaarxiv icon