


default search action
Zenghui Yuan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[c5]Zenghui Yuan, Yangming Xu, Jiawen Shi, Pan Zhou, Lichao Sun:
Merge Hijacking: Backdoor Attacks to Model Merging of Large Language Models. ACL (1) 2025: 32688-32703
[c4]Zenghui Yuan, Jiawen Shi, Pan Zhou, Neil Zhenqiang Gong, Lichao Sun:
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language Models. CVPR 2025: 29927-29936
[i10]Yinuo Liu, Zenghui Yuan, Guiyao Tie, Jiawen Shi, Pan Zhou, Lichao Sun, Neil Zhenqiang Gong:
Poisoned-MRAG: Knowledge Poisoning Attacks to Multimodal Retrieval Augmented Generation. CoRR abs/2503.06254 (2025)
[i9]Zenghui Yuan, Jiawen Shi, Pan Zhou, Neil Zhenqiang Gong, Lichao Sun:
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language Models. CoRR abs/2503.16023 (2025)
[i8]Jiawen Shi, Zenghui Yuan, Guiyao Tie, Pan Zhou, Neil Zhenqiang Gong, Lichao Sun:
Prompt Injection Attack to Tool Selection in LLM Agents. CoRR abs/2504.19793 (2025)
[i7]Zenghui Yuan, Yangming Xu, Jiawen Shi, Pan Zhou, Lichao Sun:
Merge Hijacking: Backdoor Attacks to Model Merging of Large Language Models. CoRR abs/2505.23561 (2025)
[i6]Guiyao Tie, Zenghui Yuan, Zeli Zhao, Chaoran Hu, Tianhe Gu, Ruihang Zhang, Sizhe Zhang, Junran Wu, Xiaoyue Tu, Ming Jin, Qingsong Wen, Lixing Chen, Pan Zhou, Lichao Sun:
Can LLMs Correct Themselves? A Benchmark of Self-Correction in LLMs. CoRR abs/2510.16062 (2025)
[i5]Zhi Luo, Zenghui Yuan, Wenqi Wei, Daizong Liu, Pan Zhou:
An Image Is Worth Ten Thousand Words: Verbose-Text Induction Attacks on VLMs. CoRR abs/2511.16163 (2025)- 2024
[c3]Jiawen Shi
, Zenghui Yuan
, Yinuo Liu
, Yue Huang
, Pan Zhou
, Lichao Sun
, Neil Zhenqiang Gong
:
Optimization-based Prompt Injection Attack to LLM-as-a-Judge. CCS 2024: 660-674
[i4]Cheng Wang, Zenghui Yuan, Pan Zhou, Zichuan Xu, Ruixuan Li, Dapeng Oliver Wu:
The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective. CoRR abs/2401.01589 (2024)
[i3]Jiawen Shi, Zenghui Yuan, Yinuo Liu, Yue Huang, Pan Zhou, Lichao Sun, Neil Zhenqiang Gong:
Optimization-based Prompt Injection Attack to LLM-as-a-Judge. CoRR abs/2403.17710 (2024)
[i2]Lin Lu, Hai Yan, Zenghui Yuan, Jiawen Shi, Wenqi Wei, Pin-Yu Chen, Pan Zhou:
AutoJailbreak: Exploring Jailbreak Attacks and Defenses through a Dependency Lens. CoRR abs/2406.03805 (2024)- 2023
[j3]Cheng Wang
, Zenghui Yuan, Pan Zhou
, Zichuan Xu
, Ruixuan Li
, Dapeng Oliver Wu
:
The Security and Privacy of Mobile-Edge Computing: An Artificial Intelligence Perspective. IEEE Internet Things J. 10(24): 22008-22032 (2023)
[c2]Zenghui Yuan, Pan Zhou, Kai Zou, Yu Cheng:
You Are Catching My Attention: Are Vision Transformers Bad Learners under Backdoor Attacks? CVPR 2023: 24605-24615
[i1]Zenghui Yuan, Yixin Liu, Kai Zhang, Pan Zhou, Lichao Sun:
Backdoor Attacks to Pre-trained Unified Foundation Models. CoRR abs/2302.09360 (2023)- 2021
[j2]Jing Wu
, Juzhen Wang
, Qimei Chen
, Zenghui Yuan, Pan Zhou
, Xiumin Wang
, Cai Fu:
Resource Allocation for Delay-Sensitive Vehicle-to-Multi-Edges (V2Es) Communications in Vehicular Networks: A Multi-Agent Deep Reinforcement Learning Approach. IEEE Trans. Netw. Sci. Eng. 8(2): 1873-1886 (2021)
2010 – 2019
- 2017
[j1]Ying Yi Li, Ying Chen, Zenghui Yuan, Ning Tang, Rui Kang:
Reliability analysis of multi-state systems subject to failure mechanism dependence based on a combination method. Reliab. Eng. Syst. Saf. 166: 109-123 (2017)- 2015
[c1]Zenghui Yuan, Ying Chen, Lei Gao:
A simulation-based method for EMR assessment of aviation electronic products. IEEM 2015: 1017-1021
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-15 23:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







