Siyuan Liang

Papers in Database (5)

attack arXiv Aug 12, 2025 · Aug 2025

SMA: Who Said That? Auditing Membership Leakage in Semi-Black-box RAG Controlling

Shixuan Sun, Siyuan Liang, Ruoyu Chen et al. · Sun Yat-Sen University · University of Chinese Academy of Sciences +3 more

Source-aware membership inference audit for RAG/MRAG systems attributing outputs to training data, retrieval, or user input via zero-order optimization

Membership Inference Attack Sensitive Information Disclosure nlpmultimodal
PDF
attack arXiv Aug 7, 2025 · Aug 2025

Physical Adversarial Camouflage through Gradient Calibration and Regularization

Jiawei Liang, Siyuan Liang, Jianjie Huang et al. · Sun Yat-Sen University · Peng Cheng Laboratory +2 more

Physical adversarial camouflage attack on object detectors using gradient calibration and decorrelation for multi-angle, multi-distance robustness

Input Manipulation Attack vision
PDF
attack arXiv Mar 13, 2026 · 24d ago

CtrlAttack: A Unified Attack on World-Model Control in Diffusion Models

Shuhan Xu, Siyuan Liang, Hongling Zheng et al. · Wuhan University · Nanyang Technological University +1 more

Adversarial attack on diffusion I2V models that disrupts temporal consistency via low-dimensional velocity field perturbations

Input Manipulation Attack visiongenerative
PDF
defense arXiv Aug 2, 2025 · Aug 2025

PromptSafe: Gated Prompt Tuning for Safe Text-to-Image Generation

Zonglei Jing, Xiao Yang, Xiaoqian Li et al. · Beihang University · Beijing University of Posts and Telecommunications +3 more

Gated soft prompt tuning defense for T2I diffusion models that adaptively suppresses NSFW generation based on estimated prompt toxicity

Prompt Injection generative
PDF
attack arXiv Aug 21, 2025 · Aug 2025

Towards a 3D Transfer-based Black-box Attack via Critical Feature Guidance

Shuchao Pang, Zhenghan Chen, Shen Zhang et al. · Nanjing University of Science and Technology · Microsoft +2 more

Transfer-based black-box adversarial attack on 3D point clouds by corrupting shared critical features across DNN architectures

Input Manipulation Attack vision
PDF Code