Zonghao Ying

Papers in Database (5)

survey arXiv Mar 13, 2026 · 9w ago

Uncovering Security Threats and Architecting Defenses in Autonomous Agents: A Case Study of OpenClaw

Zonghao Ying, Xiao Yang, Siyang Wu et al. · Beihang University · Zhongguancun Laboratory +1 more

Security analysis of OpenClaw autonomous agents revealing prompt injection RCE, tool chain attacks, and proposing FASA defense architecture

AI Supply Chain Attacks Prompt Injection Insecure Plugin Design Excessive Agency nlpmultimodal
PDF Code
attack arXiv Apr 7, 2026 · 6w ago

Reading Between the Pixels: An Inscriptive Jailbreak Attack on Text-to-Image Models

Zonghao Ying, Haowen Dai, Lianyu Hu et al. · Beihang University · University of Nottingham Ningbo China +3 more

Black-box jailbreak attack coercing T2I models to render harmful text in benign images via layered prompt decomposition

Prompt Injection multimodalvisionnlp
PDF
defense arXiv Apr 27, 2026 · 24d ago

AgentVisor: Defending LLM Agents Against Prompt Injection via Semantic Virtualization

Zonghao Ying, Haozheng Wang, Jiangfan Liu et al. · Beihang University · 360 AI Security Lab +1 more

OS-inspired defense framework that intercepts LLM agent tool calls and enforces privilege separation to block prompt injection attacks

Prompt Injection Excessive Agency nlp
PDF
attack arXiv Mar 7, 2026 · 10w ago

Two Frames Matter: A Temporal Attack for Text-to-Video Model Jailbreaking

Moyang Chen, Zonghao Ying, Wenzhuo Xu et al. · Wenzhou-Kean University · 360 AI Security Lab +1 more

Jailbreaks text-to-video models by exploiting temporal infilling: sparse boundary-frame prompts induce harmful intermediate content generation

Prompt Injection multimodalgenerative
PDF
attack arXiv Mar 10, 2026 · 10w ago

Reasoning-Oriented Programming: Chaining Semantic Gadgets to Jailbreak Large Vision Language Models

Quanchen Zou, Moyang Chen, Zonghao Ying et al. · 360 AI Security Lab · Wenzhou-Kean University +1 more

Jailbreaks VLMs by chaining semantically benign visual gadgets via prompt-controlled reasoning to synthesize harmful outputs, bypassing perception-level alignment

Input Manipulation Attack Prompt Injection visionnlpmultimodal
PDF