Picture for Zhenyuan Guo

Zhenyuan Guo

Optimal Parameter Adaptation for Safety-Critical Control via Safe Barrier Bayesian Optimization

Add code
Mar 25, 2025
Viaarxiv icon

Dialogue Injection Attack: Jailbreaking LLMs through Context Manipulation

Add code
Mar 11, 2025
Figure 1 for Dialogue Injection Attack: Jailbreaking LLMs through Context Manipulation
Figure 2 for Dialogue Injection Attack: Jailbreaking LLMs through Context Manipulation
Figure 3 for Dialogue Injection Attack: Jailbreaking LLMs through Context Manipulation
Figure 4 for Dialogue Injection Attack: Jailbreaking LLMs through Context Manipulation
Viaarxiv icon

R.R.: Unveiling LLM Training Privacy through Recollection and Ranking

Add code
Feb 18, 2025
Figure 1 for R.R.: Unveiling LLM Training Privacy through Recollection and Ranking
Figure 2 for R.R.: Unveiling LLM Training Privacy through Recollection and Ranking
Figure 3 for R.R.: Unveiling LLM Training Privacy through Recollection and Ranking
Figure 4 for R.R.: Unveiling LLM Training Privacy through Recollection and Ranking
Viaarxiv icon

Be Cautious When Merging Unfamiliar LLMs: A Phishing Model Capable of Stealing Privacy

Add code
Feb 17, 2025
Figure 1 for Be Cautious When Merging Unfamiliar LLMs: A Phishing Model Capable of Stealing Privacy
Figure 2 for Be Cautious When Merging Unfamiliar LLMs: A Phishing Model Capable of Stealing Privacy
Figure 3 for Be Cautious When Merging Unfamiliar LLMs: A Phishing Model Capable of Stealing Privacy
Figure 4 for Be Cautious When Merging Unfamiliar LLMs: A Phishing Model Capable of Stealing Privacy
Viaarxiv icon