Haibo Hu

h-index: 5 88 citations 26 papers (total)

Papers in Database (5)

attack arXiv Sep 27, 2025 · Sep 2025

Virus Infection Attack on LLMs: Your Poisoning Can Spread "VIA" Synthetic Data

Zi Liang, Qingqing Ye, Xuan Liu et al. · The Hong Kong Polytechnic University · University of California +2 more

Proposes VIA, an attack framework that spreads poisoning and backdoor payloads through LLM synthetic data by hijacking benign training samples

Data Poisoning Attack Model Poisoning Training Data Poisoning nlp
2 citations 1 influentialPDF
attack arXiv Oct 15, 2025 · Oct 2025

Toward Efficient Inference Attacks: Shadow Model Sharing via Mixture-of-Experts

Li Bai, Qingqing Ye, Xinwei Zhang et al. · The Hong Kong Polytechnic University · PolyU Research Centre for Privacy and Security Technologies in Future Smart Systems +1 more

Efficient shadow model pool via Mixture-of-Experts cuts computational cost of membership inference attacks while preserving attack effectiveness

Membership Inference Attack visionnlp
2 citations 1 influentialPDF
attack arXiv Jan 20, 2026 · 10w ago

LURE: Latent Space Unblocking for Multi-Concept Reawakening in Diffusion Models

Mengyu Sun, Ziyuan Yang, Andrew Beng Jin Teoh et al. · Sichuan University · The Hong Kong Polytechnic University +1 more

Attacks concept erasure defenses in diffusion models by reconstructing latent space to reawaken multiple suppressed concepts simultaneously

Input Manipulation Attack visiongenerative
PDF Code
attack arXiv Nov 12, 2025 · Nov 2025

SEBA: Sample-Efficient Black-Box Attacks on Visual Reinforcement Learning

Tairan Huang, Yulin Jin, Junxu Liu et al. · The Hong Kong Polytechnic University

Black-box adversarial attack on visual RL agents using GAN and shadow Q-model to minimize environment queries

Input Manipulation Attack visionreinforcement-learning
PDF
defense arXiv Nov 11, 2025 · Nov 2025

Class-feature Watermark: A Resilient Black-box Watermark Against Model Extraction Attacks

Yaxin Xiao, Qingqing Ye, Zi Liang et al. · The Hong Kong Polytechnic University · Huawei Technologies +1 more

Proposes WRK to break existing black-box model watermarks, then introduces CFW watermarking resilient to combined extraction and removal attacks

Model Theft vision
PDF Code