Picture for Wenyuan Xu

Wenyuan Xu

Zhejiang University

Differentially Private and Communication Efficient Large Language Model Split Inference via Stochastic Quantization and Soft Prompt

Add code
Feb 12, 2026
Viaarxiv icon

Phantom Menace: Exploring and Enhancing the Robustness of VLA Models against Physical Sensor Attacks

Add code
Nov 13, 2025
Viaarxiv icon

PAG: Multi-Turn Reinforced LLM Self-Correction with Policy as Generative Verifier

Add code
Jun 12, 2025
Viaarxiv icon

AudioTrust: Benchmarking the Multifaceted Trustworthiness of Audio Large Language Models

Add code
May 22, 2025
Figure 1 for AudioTrust: Benchmarking the Multifaceted Trustworthiness of Audio Large Language Models
Figure 2 for AudioTrust: Benchmarking the Multifaceted Trustworthiness of Audio Large Language Models
Figure 3 for AudioTrust: Benchmarking the Multifaceted Trustworthiness of Audio Large Language Models
Figure 4 for AudioTrust: Benchmarking the Multifaceted Trustworthiness of Audio Large Language Models
Viaarxiv icon

A Comprehensive Survey in LLM(-Agent) Full Stack Safety: Data, Training and Deployment

Add code
Apr 22, 2025
Viaarxiv icon

VAPO: Efficient and Reliable Reinforcement Learning for Advanced Reasoning Tasks

Add code
Apr 08, 2025
Figure 1 for VAPO: Efficient and Reliable Reinforcement Learning for Advanced Reasoning Tasks
Figure 2 for VAPO: Efficient and Reliable Reinforcement Learning for Advanced Reasoning Tasks
Figure 3 for VAPO: Efficient and Reliable Reinforcement Learning for Advanced Reasoning Tasks
Viaarxiv icon

A Unified Pairwise Framework for RLHF: Bridging Generative Reward Modeling and Policy Optimization

Add code
Apr 07, 2025
Viaarxiv icon

Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities

Add code
Jan 13, 2025
Figure 1 for Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities
Figure 2 for Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities
Figure 3 for Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities
Figure 4 for Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities
Viaarxiv icon

PowerRadio: Manipulate Sensor Measurementvia Power GND Radiation

Add code
Dec 24, 2024
Viaarxiv icon

POEX: Policy Executable Embodied AI Jailbreak Attacks

Add code
Dec 21, 2024
Figure 1 for POEX: Policy Executable Embodied AI Jailbreak Attacks
Figure 2 for POEX: Policy Executable Embodied AI Jailbreak Attacks
Figure 3 for POEX: Policy Executable Embodied AI Jailbreak Attacks
Figure 4 for POEX: Policy Executable Embodied AI Jailbreak Attacks
Viaarxiv icon