Changting Lin

Orcid: 0000-0002-8918-6299

According to our database1, Changting Lin authored at least 22 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A Survey of LLM-Driven AI Agent Communication: Protocols, Security Risks, and Defense Countermeasures.
CoRR, June, 2025

MIST: Jailbreaking Black-box Large Language Models via Iterative Semantic Tuning.
CoRR, June, 2025

Pushing the Limits of Safety: A Technical Report on the ATLAS Challenge 2025.
CoRR, June, 2025

NeuRel-Attack: Neuron Relearning for Safety Disalignment in Large Language Models.
CoRR, April, 2025

Active Learning-Based Backtracking Attack Against Source Location Privacy of Cyber-Physical System.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2025

NCDI-Diffusion: Neural Contextual and Directional Inversion for Novel View Synthesis through Diffusion Models.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

Direct Behavior Optimization: Unlocking the Potential of Lightweight LLMs.
Proceedings of the Findings of the Association for Computational Linguistics, 2025

2024
Towards understanding bogus traffic service in online social networks.
Frontiers Inf. Technol. Electron. Eng., March, 2024

One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware.
IEEE Trans. Dependable Secur. Comput., 2024

Figure it Out: Analyzing-based Jailbreak Attack on Large Language Models.
CoRR, 2024

A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective.
CoRR, 2024

2023
Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study.
IEEE Trans. Dependable Secur. Comput., 2023

iQuery: A Trustworthy and Scalable Blockchain Analytics Platform.
IEEE Trans. Dependable Secur. Comput., 2023

One4All: Manipulate one agent to poison the cooperative multi-agent reinforcement learning.
Comput. Secur., 2023

Adversarial Attacks on Skeleton-Based Sign Language Recognition.
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023

2022
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2022

A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy.
IEEE Trans. Dependable Secur. Comput., 2022

A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

2021
Multi-level Alignment Network for Domain Adaptive Cross-modal Retrieval.
Neurocomputing, 2021

MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Rapido: Scaling blockchain with multi-path payment channels.
Neurocomputing, 2020

2018
Learning to Classify Blockchain Peers According to Their Behavior Sequences.
IEEE Access, 2018


  Loading...