Zongjie Li

h-index: 19 942 citations 57 papers (total)

Papers in Database (5)

defense arXiv Jan 17, 2026 · 11w ago

Taming Various Privilege Escalation in LLM-Based Agent Systems: A Mandatory Access Control Framework

Zimo Ji, Daoyuan Wu, Wenyuan Jiang et al. · Hong Kong University of Science and Technology · Lingnan University +3 more

Proposes SEAgent, a mandatory access control framework that blocks privilege escalation attacks in LLM agent tool use via information flow monitoring and ABAC policies

Prompt Injection Excessive Agency nlp
1 citations PDF
attack arXiv Oct 27, 2025 · Oct 2025

QueryIPI: Query-agnostic Indirect Prompt Injection on Coding Agents

Yuchong Xie, Zesen Liu, Mingyu Luo et al. · The Hong Kong University of Science and Technology · Fudan University +1 more

Query-agnostic indirect prompt injection on coding agents via optimized malicious tool descriptions, achieving 87% attack success rate

Prompt Injection Insecure Plugin Design nlp
1 citations PDF Code
defense arXiv Nov 14, 2025 · Nov 2025

SEAL: Subspace-Anchored Watermarks for LLM Ownership

Yanbo Dai, Zongjie Li, Zhenlan Ji et al. · The Hong Kong University of Science and Technology

Embeds multi-bit ownership watermarks into LLM latent representations, surviving fine-tuning and resisting knowledgeable removal attacks

Model Theft Model Theft nlp
PDF
defense arXiv Feb 9, 2026 · 8w ago

On Protecting Agentic Systems' Intellectual Property via Watermarking

Liwen Wang, Zongjie Li, Yuchong Xie et al. · The Hong Kong University of Science and Technology · HSBC

Watermarks agentic LLM systems by biasing tool execution paths, so stolen imitation models inherit detectable signatures

Model Theft Model Theft nlp
PDF
survey arXiv Nov 19, 2025 · Nov 2025

Taxonomy, Evaluation and Exploitation of IPI-Centric LLM Agent Defense Frameworks

Zimo Ji, Xunguang Wang, Zongjie Li et al. · The Hong Kong University of Science and Technology · Zhejiang University of Technology +3 more

SoK paper taxonomizes IPI defenses for LLM agents, identifies six bypass root causes, and proposes three novel adaptive attacks

Prompt Injection nlp
PDF