Ke Xu

Papers in Database (5)

defense arXiv Mar 24, 2026 · 15d ago

Chain-of-Authorization: Internalizing Authorization into Large Language Models via Reasoning Trajectories

Yang Li, Yule Liu, Xinlei He et al. · Tsinghua University · The Hong Kong University of Science and Technology +1 more

Fine-tunes LLMs to generate explicit authorization reasoning chains before responses, defending against unauthorized access and prompt injection

Prompt Injection Sensitive Information Disclosure nlp
PDF
defense arXiv Feb 11, 2026 · 8w ago

Blind Gods and Broken Screens: Architecting a Secure, Intent-Centric Mobile Agent Operating System

Zhenhua Zou, Sheng Guo, Qiuyang Zhan et al. · Tsinghua University

Proposes Aura, a secure mobile agent OS defending against prompt injection, visual spoofing, and privilege escalation in LLM agents

Prompt Injection Excessive Agency nlpmultimodal
PDF
attack arXiv Apr 1, 2026 · 7d ago

Enhancing Gradient Inversion Attacks in Federated Learning via Hierarchical Feature Optimization

Hao Fang, Wenbo Yu, Bin Chen et al. · Tsinghua University · Harbin Institute of Technology

GAN-based gradient inversion attack reconstructing client training data from FL gradients via hierarchical feature optimization

Model Inversion Attack visionfederated-learning
PDF
attack arXiv Aug 28, 2025 · Aug 2025

Revisiting the Privacy Risks of Split Inference: A GAN-Based Data Reconstruction Attack via Progressive Feature Optimization

Yixiang Qiu, Yanhan Liu, Hongyao Yu et al. · Tsinghua University · Harbin Institute of Technology

GAN-based attack reconstructs private inputs from split inference intermediate features using progressive hierarchical feature optimization

Model Inversion Attack vision
PDF
survey arXiv Mar 12, 2026 · 27d ago

Taming OpenClaw: Security Analysis and Mitigation of Autonomous LLM Agent Threats

Xinhao Deng, Yixiang Zhang, Jiaqing Wu et al. · Ant Group · Tsinghua University

Proposes five-layer lifecycle security framework for autonomous LLM agents, analyzing prompt injection, supply chain, memory poisoning, and intent drift threats

Prompt Injection Insecure Plugin Design Excessive Agency nlp
PDF