Chunyi Zhou

Papers in Database (4)

defense arXiv Aug 30, 2025 · Aug 2025

FreeTalk:A plug-and-play and black-box defense against speech synthesis attacks

Yuwen Pu, Zhou Feng, Chunyi Zhou et al. · Chongqing University · Zhejiang University

Adds frequency-domain adversarial perturbations to audio in a black-box setting to prevent voice cloning by VC/TTS models

Input Manipulation Attack audio
PDF
defense arXiv Aug 21, 2025 · Aug 2025

IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents

Hengyu An, Jinghuai Zhang, Tianyu Du et al. · Zhejiang University · University of California +1 more

Defends LLM agents against indirect prompt injection by constraining tool calls via a planned dependency graph

Prompt Injection Insecure Plugin Design nlp
PDF Code
benchmark arXiv Mar 21, 2026 · 18d ago

Unveiling the Security Risks of Federated Learning in the Wild: From Research to Practice

Jiahao Chen, Zhiming Zhao, Yuwen Pu et al. · Zhejiang University · Chongqing University +1 more

Measurement study showing FL poisoning attacks are less effective in practice than research suggests due to heterogeneity and stability constraints

Data Poisoning Attack visionnlptabularfederated-learning
PDF Code
defense arXiv Aug 21, 2025 · Aug 2025

VideoEraser: Concept Erasure in Text-to-Video Diffusion Models

Naen Xu, Jinghuai Zhang, Changjiang Li et al. · Zhejiang University · University of California +2 more

Training-free concept erasure framework prevents T2V diffusion models from generating harmful, private, or copyrighted content despite adversarial prompts

Output Integrity Attack generativevision
PDF