Gelei Deng

Orcid: 0000-0002-0046-6674

According to our database1, Gelei Deng authored at least 28 papers between 2019 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Distributed Motion Control for Multiple Mobile Robots Using Discrete-Event Systems and Model Predictive Control.
IEEE Trans. Syst. Man Cybern. Syst., February, 2024

MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation.
CoRR, 2024

LLM Jailbreak Attack versus Defense Techniques - A Comprehensive Study.
CoRR, 2024

Groot: Adversarial Testing for Generative Text-to-Image Models with Tree-based Semantic Transformation.
CoRR, 2024

Pandora: Jailbreak GPTs by Retrieval Augmented Generation Poisoning.
CoRR, 2024

Digger: Detecting Copyright Content Mis-usage in Large Language Model Training.
CoRR, 2024

PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
PentestGPT: An LLM-empowered Automatic Penetration Testing Tool.
CoRR, 2023

ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics.
CoRR, 2023

Jailbreaker: Automated Jailbreak Across Multiple Large Language Model Chatbots.
CoRR, 2023

Prompt Injection attack against LLM-integrated Applications.
CoRR, 2023

Jailbreaking ChatGPT via Prompt Engineering: An Empirical Study.
CoRR, 2023

Automatic Code Summarization via ChatGPT: How Far Are We?
CoRR, 2023

The Threat of Offensive AI to Organizations.
Comput. Secur., 2023

NAUTILUS: Automated RESTful API Vulnerability Detection.
Proceedings of the 32nd USENIX Security Symposium, 2023

ASTER: Automatic Speech Recognition System Accessibility Testing for Stutterers.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder.
CoRR, 2022

SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View.
CoRR, 2022

Morest: Model-based RESTful API Testing with Execution Feedback.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

On the (In)Security of Secure ROS2.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Novel denial-of-service attacks against cloud-based multi-robot systems.
Inf. Sci., 2021

The Threat of Offensive AI to Organizations.
CoRR, 2021

An Investigation of Byzantine Threats in Multi-Robot Systems.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

2019
A fog computing based approach to DDoS mitigation in IIoT systems.
Comput. Secur., 2019

Area- and Power-Efficient Nearly-Linear Phase Response IIR Filter by Iterative Convex Optimization.
IEEE Access, 2019

Hardware Efficient Integer Discrete Cosine Transform for Efficient Image/Video Compression.
IEEE Access, 2019

Efficient Password Guessing Based on a Password Segmentation Approach.
Proceedings of the 2019 IEEE Global Communications Conference, 2019


  Loading...