Dacheng Tao

h-index: 1 1 citations 2 papers (total)

Papers in Database (2)

attack arXiv Dec 23, 2025 · Dec 2025

Odysseus: Jailbreaking Commercial Multimodal LLM-integrated Systems via Dual Steganography

Songze Li, Jiameng Cheng, Yiming Li et al. · Southeast University · Nanyang Technological University

Dual steganography hides malicious prompts and harmful responses inside images to jailbreak GPT-4o, Gemini, and Grok-3 at 99% success rate

Input Manipulation Attack Prompt Injection visionnlpmultimodal
3 citations PDF Code
survey arXiv Sep 25, 2025 · Sep 2025

Responsible Diffusion: A Comprehensive Survey on Safety, Ethics, and Trust in Diffusion Models

Kang Wei, Xin Yuan, Fushuo Huo et al. · Southeast University · CSIRO +3 more

Comprehensive survey of security threats and countermeasures for diffusion models spanning robustness, privacy, backdoors, and content integrity

Input Manipulation Attack Output Integrity Attack Model Poisoning visiongenerativemultimodal
1 citations PDF