Picture for Ninghui Li

Ninghui Li

AutoVerifier: An Agentic Automated Verification Framework Using Large Language Models

Add code
Apr 03, 2026
Viaarxiv icon

Security Considerations for Artificial Intelligence Agents

Add code
Mar 12, 2026
Viaarxiv icon

Membership Inference Attacks Against Fine-tuned Diffusion Language Models

Add code
Jan 27, 2026
Viaarxiv icon

Window-based Membership Inference Attacks Against Fine-tuned Large Language Models

Add code
Jan 06, 2026
Viaarxiv icon

SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks

Add code
Jun 12, 2025
Figure 1 for SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks
Figure 2 for SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks
Figure 3 for SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks
Figure 4 for SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks
Viaarxiv icon

LLM Agents Should Employ Security Principles

Add code
May 29, 2025
Viaarxiv icon

CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling

Add code
Jan 27, 2025
Figure 1 for CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling
Figure 2 for CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling
Figure 3 for CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling
Figure 4 for CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling
Viaarxiv icon

Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape - A Survey

Add code
May 06, 2024
Viaarxiv icon

Towards Principled Assessment of Tabular Data Synthesis Algorithms

Add code
Feb 09, 2024
Figure 1 for Towards Principled Assessment of Tabular Data Synthesis Algorithms
Figure 2 for Towards Principled Assessment of Tabular Data Synthesis Algorithms
Figure 3 for Towards Principled Assessment of Tabular Data Synthesis Algorithms
Figure 4 for Towards Principled Assessment of Tabular Data Synthesis Algorithms
Viaarxiv icon

MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training

Add code
Nov 02, 2023
Figure 1 for MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training
Figure 2 for MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training
Figure 3 for MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training
Figure 4 for MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training
Viaarxiv icon