


default search action
Tianshuo Cong
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[c9]Yichen Gong, Delong Ran, Jinyuan Liu, Conglei Wang, Tianshuo Cong, Anyu Wang, Sisi Duan, Xiaoyun Wang:
FigStep: Jailbreaking Large Vision-Language Models via Typographic Visual Prompts. AAAI 2025: 23951-23959
[c8]Jingyi Zheng, Tianyi Hu, Tianshuo Cong, Xinlei He:
CL-Attack: Textual Backdoor Attacks via Cross-Lingual Triggers. AAAI 2025: 26427-26435
[c7]Sibo Yi, Tianshuo Cong, Xinlei He, Qi Li, Jiaxing Song:
Beyond the Tip of Efficiency: Uncovering the Submerged Threats of Jailbreak Attacks in Small Language Models. ACL (Findings) 2025: 17221-17234
[c6]Yichen Gong, Delong Ran, Xinlei He, Tianshuo Cong, Anyu Wang, Xiaoyun Wang:
Safety Misalignment Against Large Language Models. NDSS 2025
[c5]Zhen Sun, Tianshuo Cong, Yule Liu, Chenhao Lin, Xinlei He, Rongmao Chen, Xingshuo Han, Xinyi Huang:
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning. SP 2025: 1713-1731
[c4]Lijin Wang, Jingjing Wang, Tianshuo Cong, Xinlei He, Zhan Qin, Xinyi Huang:
From Purity to Peril: Backdooring Merged Models From "Harmless" Benign Components. USENIX Security Symposium 2025: 6339-6358
[i21]Heyi Zhang, Yule Liu, Xinlei He, Jun Wu, Tianshuo Cong, Xinyi Huang:
SoK: Benchmarking Poisoning Attacks and Defenses in Federated Learning. CoRR abs/2502.03801 (2025)
[i20]Sibo Yi, Tianshuo Cong, Xinlei He, Qi Li
, Jiaxing Song:
Behind the Tip of Efficiency: Uncovering the Submerged Threats of Jailbreak Attacks in Small Language Models. CoRR abs/2502.19883 (2025)
[i19]Zhen Sun, Ziyi Zhang, Zeren Luo, Zeyang Sha, Tianshuo Cong, Zheng Li, Shiwen Cui, Weiqiang Wang, Jiaheng Wei, Xinlei He, Qi Li, Qian Wang:
FragFake: A Dataset for Fine-Grained Detection of Edited Images with Vision Language Models. CoRR abs/2505.15644 (2025)
[i18]Yugeng Liu, Tianshuo Cong, Michael Backes, Zheng Li, Yang Zhang:
Watermarking LLM-Generated Datasets in Downstream Tasks. CoRR abs/2506.13494 (2025)
[i17]Delong Ran, Xinlei He, Tianshuo Cong, Anyu Wang, Qi Li, Xiaoyun Wang:
LoRA-Leak: Membership Inference Attacks Against LoRA Fine-tuned Language Models. CoRR abs/2507.18302 (2025)
[i16]Xiangtao Meng, Tianshuo Cong, Li Wang, Wenyu Chen, Zheng Li, Shanqing Guo, Xiaoyun Wang:
From Defender to Devil? Unintended Risk Interactions Induced by LLM Defenses. CoRR abs/2510.07968 (2025)
[i15]Yule Liu, Heyi Zhang, Jinyi Zheng, Zhen Sun, Zifan Peng, Tianshuo Cong, Yilong Yang, Xinlei He, Zhuo Ma:
GRPO Privacy Is at Risk: A Membership Inference Attack Against Reinforcement Learning With Verifiable Rewards. CoRR abs/2511.14045 (2025)
[i14]Tianrui Wang, Anyu Wang, Tianshuo Cong, Delong Ran, Jinyuan Liu, Xiaoyun Wang:
Cryptanalysis of Pseudorandom Error-Correcting Codes. CoRR abs/2512.17310 (2025)
[i13]Tianrui Wang, Anyu Wang, Tianshuo Cong, Delong Ran, Jinyuan Liu, Xiaoyun Wang:
Cryptanalysis of Pseudorandom Error-Correcting Codes. IACR Cryptol. ePrint Arch. 2025: 2283 (2025)- 2024
[c3]Tianshuo Cong
, Delong Ran
, Zesen Liu
, Xinlei He
, Jinyuan Liu
, Yichen Gong
, Qi Li
, Anyu Wang
, Xiaoyun Wang
:
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging. LAMPS@CCS 2024: 69-76
[c2]Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang:
Test-Time Poisoning Attacks Against Test-Time Adaptation Models. SP 2024: 1306-1324
[d1]Yichen Gong
, Delong Ran
, Xinlei He
, Tianshuo Cong
, Anyu Wang
, Xiaoyun Wang
:
Safety Misalignment Against Large Language Models. Zenodo, 2024
[i12]Tianshuo Cong, Delong Ran, Zesen Liu, Xinlei He, Jinyuan Liu, Yichen Gong, Qi Li
, Anyu Wang, Xiaoyun Wang:
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging. CoRR abs/2404.05188 (2024)
[i11]Delong Ran, Jinyuan Liu, Yichen Gong, Jingyi Zheng, Xinlei He, Tianshuo Cong, Anyu Wang:
JailbreakEval: An Integrated Toolkit for Evaluating Jailbreak Attempts Against Large Language Models. CoRR abs/2406.09321 (2024)
[i10]Sibo Yi, Yule Liu, Zhen Sun, Tianshuo Cong, Xinlei He, Jiaxing Song, Ke Xu, Qi Li
:
Jailbreak Attacks and Defenses Against Large Language Models: A Survey. CoRR abs/2407.04295 (2024)
[i9]Zesen Liu, Tianshuo Cong, Xinlei He, Qi Li:
On Evaluating The Performance of Watermarked Machine-Generated Texts Under Adversarial Attacks. CoRR abs/2407.04794 (2024)
[i8]Zhen Sun, Tianshuo Cong, Yule Liu, Chenhao Lin, Xinlei He, Rongmao Chen, Xingshuo Han, Xinyi Huang:
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning. CoRR abs/2411.17453 (2024)
[i7]Jingyi Zheng, Tianyi Hu, Tianshuo Cong, Xinlei He:
CL-attack: Textual Backdoor Attacks via Cross-Lingual Triggers. CoRR abs/2412.19037 (2024)- 2023
[i6]Yugeng Liu, Tianshuo Cong, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang
:
Robustness Over Time: Understanding Adversarial Examples' Effectiveness on Longitudinal Versions of Large Language Models. CoRR abs/2308.07847 (2023)
[i5]Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang
:
Test-Time Poisoning Attacks Against Test-Time Adaptation Models. CoRR abs/2308.08505 (2023)
[i4]Yichen Gong, Delong Ran, Jinyuan Liu, Conglei Wang, Tianshuo Cong, Anyu Wang, Sisi Duan, Xiaoyun Wang:
FigStep: Jailbreaking Large Vision-language Models via Typographic Visual Prompts. CoRR abs/2311.05608 (2023)- 2022
[c1]Tianshuo Cong, Xinlei He, Yang Zhang
:
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders. CCS 2022: 579-593
[i3]Tianshuo Cong, Xinlei He, Yang Zhang:
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders. CoRR abs/2201.11692 (2022)
[i2]Xuting Zhou, Tianshuo Cong:
Construction of generalized-involutory MDS matrices. IACR Cryptol. ePrint Arch. 2022: 577 (2022)- 2020
[i1]Tianshuo Cong, Ximing Fu, Xuting Zhou, Yuli Zou, Haining Fan:
New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version). IACR Cryptol. ePrint Arch. 2020: 47 (2020)
2010 – 2019
- 2019
[j1]Tianshuo Cong, Jingjing Wang
, Sanghai Guan
, Yifei Mu
, Tong Bai, Yong Ren:
Big Data Driven Oriented Graph Theory Aided tagSNPs Selection for Genetic Precision Therapy. IEEE Access 7: 3746-3754 (2019)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-03 23:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






