Picture for Shiwen Cui

Shiwen Cui

Taming OpenClaw: Security Analysis and Mitigation of Autonomous LLM Agent Threats

Add code
Mar 12, 2026
Viaarxiv icon

The Reasoning Trap: How Enhancing LLM Reasoning Amplifies Tool Hallucination

Add code
Oct 27, 2025
Viaarxiv icon

UpSafe$^\circ$C: Upcycling for Controllable Safety in Large Language Models

Add code
Oct 02, 2025
Figure 1 for UpSafe$^\circ$C: Upcycling for Controllable Safety in Large Language Models
Figure 2 for UpSafe$^\circ$C: Upcycling for Controllable Safety in Large Language Models
Figure 3 for UpSafe$^\circ$C: Upcycling for Controllable Safety in Large Language Models
Figure 4 for UpSafe$^\circ$C: Upcycling for Controllable Safety in Large Language Models
Viaarxiv icon

FragFake: A Dataset for Fine-Grained Detection of Edited Images with Vision Language Models

Add code
May 21, 2025
Figure 1 for FragFake: A Dataset for Fine-Grained Detection of Edited Images with Vision Language Models
Figure 2 for FragFake: A Dataset for Fine-Grained Detection of Edited Images with Vision Language Models
Figure 3 for FragFake: A Dataset for Fine-Grained Detection of Edited Images with Vision Language Models
Figure 4 for FragFake: A Dataset for Fine-Grained Detection of Edited Images with Vision Language Models
Viaarxiv icon

SEM: Reinforcement Learning for Search-Efficient Large Language Models

Add code
May 12, 2025
Viaarxiv icon

Thought Manipulation: External Thought Can Be Efficient for Large Reasoning Models

Add code
Apr 18, 2025
Viaarxiv icon

TroubleLLM: Align to Red Team Expert

Add code
Feb 28, 2024
Viaarxiv icon

Backpropagation Path Search On Adversarial Transferability

Add code
Aug 15, 2023
Figure 1 for Backpropagation Path Search On Adversarial Transferability
Figure 2 for Backpropagation Path Search On Adversarial Transferability
Figure 3 for Backpropagation Path Search On Adversarial Transferability
Figure 4 for Backpropagation Path Search On Adversarial Transferability
Viaarxiv icon

On the Robustness of Latent Diffusion Models

Add code
Jun 14, 2023
Figure 1 for On the Robustness of Latent Diffusion Models
Figure 2 for On the Robustness of Latent Diffusion Models
Figure 3 for On the Robustness of Latent Diffusion Models
Figure 4 for On the Robustness of Latent Diffusion Models
Viaarxiv icon

A2: Efficient Automated Attacker for Boosting Adversarial Training

Add code
Oct 07, 2022
Figure 1 for A2: Efficient Automated Attacker for Boosting Adversarial Training
Figure 2 for A2: Efficient Automated Attacker for Boosting Adversarial Training
Figure 3 for A2: Efficient Automated Attacker for Boosting Adversarial Training
Figure 4 for A2: Efficient Automated Attacker for Boosting Adversarial Training
Viaarxiv icon