Tianyu Du

h-index: 16 1,682 citations 47 papers (total)

Papers in Database (3)

attack arXiv Sep 25, 2025 · Sep 2025

Automatic Red Teaming LLM-based Agents with Model Context Protocol Tools

Ping He, Changjiang Li, Binbin Zhao et al. · Zhejiang University · Palo Alto Networks

Automates generation of malicious MCP tools that manipulate LLM agent behavior while evading current detection mechanisms

Insecure Plugin Design Prompt Injection nlp
6 citations PDF
attack arXiv Dec 11, 2025 · Dec 2025

The Eminence in Shadow: Exploiting Feature Boundary Ambiguity for Robust Backdoor Attacks

Zhou Feng, Jiahao Chen, Chunyi Zhou et al. · Zhejiang University · Chongqing University +1 more

Theoretically-grounded backdoor attack exploiting decision boundary ambiguity achieves >90% ASR at just 0.01% poison rate

Model Poisoning vision
PDF Code
defense arXiv Jan 30, 2026 · 9w ago

FraudShield: Knowledge Graph Empowered Defense for LLMs against Fraud Attacks

Naen Xu, Jinghuai Zhang, Ping He et al. · Zhejiang University · University of California +1 more

Knowledge graph defense framework that detects fraud tactics in LLM inputs and augments prompts with evidence to resist manipulation

Prompt Injection nlp
PDF