Picture for Xuewen Dong

Xuewen Dong

When Convenience Becomes Risk: A Semantic View of Under-Specification in Host-Acting Agents

Add code
Mar 22, 2026
Viaarxiv icon

Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks

Add code
Mar 12, 2025
Figure 1 for Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
Figure 2 for Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
Figure 3 for Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
Figure 4 for Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
Viaarxiv icon

Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy

Add code
Feb 12, 2025
Figure 1 for Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
Figure 2 for Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
Figure 3 for Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
Figure 4 for Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
Viaarxiv icon