Chunyi Zhou

h-index: 5 106 citations 25 papers (total)

Papers in Database (3)

attack arXiv Dec 11, 2025 · Dec 2025

The Eminence in Shadow: Exploiting Feature Boundary Ambiguity for Robust Backdoor Attacks

Zhou Feng, Jiahao Chen, Chunyi Zhou et al. · Zhejiang University · Chongqing University +1 more

Theoretically-grounded backdoor attack exploiting decision boundary ambiguity achieves >90% ASR at just 0.01% poison rate

Model Poisoning vision
PDF Code
defense arXiv Jan 30, 2026 · 9w ago

FraudShield: Knowledge Graph Empowered Defense for LLMs against Fraud Attacks

Naen Xu, Jinghuai Zhang, Ping He et al. · Zhejiang University · University of California +1 more

Knowledge graph defense framework that detects fraud tactics in LLM inputs and augments prompts with evidence to resist manipulation

Prompt Injection nlp
PDF
defense arXiv Nov 13, 2025 · Nov 2025

DP-GENG : Differentially Private Dataset Distillation Guided by DP-Generated Data

Shuo Shi, Jinghuai Zhang, Shijie Jiang et al. · Zhejiang University · University of California +2 more

Defends dataset distillation against membership inference attacks using DP-generated data initialization and DP-feature matching with formal privacy guarantees.

Membership Inference Attack vision
PDF