Jiawen Shi

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
Automating Safety Enhancement for LLM-based Agents with Synthetic Risk Scenarios.
CoRR, May, 2025

Prompt Injection Attack to Tool Selection in LLM Agents.
CoRR, April, 2025

A Privacy-Preserving Billing Computation and Leakage Detection Framework for Smart Grid.
IEEE Internet Things J., March, 2025

Poisoned-MRAG: Knowledge Poisoning Attacks to Multimodal Retrieval Augmented Generation.
CoRR, March, 2025

Approximate homomorphic encryption based privacy-preserving machine learning: a survey.
Artif. Intell. Rev., March, 2025

A location-updating based self-healing group key management scheme for VANETs.
Int. J. Inf. Sec., February, 2025

On the Trustworthiness of Generative Foundation Models: Guideline, Assessment, and Perspective.
CoRR, February, 2025

Coordinate plane based authentication method for detecting clone node in wireless sensor networks.
J. Inf. Secur. Appl., 2025

From accuracy to approximation: A survey on approximate homomorphic encryption and its applications.
Comput. Sci. Rev., 2025

BadToken: Token-level Backdoor Attacks to Multi-modal Large Language Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

Merge Hijacking: Backdoor Attacks to Model Merging of Large Language Models.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025

2024
Data augmentation using virtual word insertion techniques in text classification tasks.
Expert Syst. J. Knowl. Eng., April, 2024

Self-Cognition in Large Language Models: An Exploratory Study.
CoRR, 2024

AutoJailbreak: Exploring Jailbreak Attacks and Defenses through a Dependency Lens.
CoRR, 2024

MetaTool Benchmark for Large Language Models: Deciding Whether to Use Tools and Which to Use.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Optimization-based Prompt Injection Attack to LLM-as-a-Judge.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Application and Performance Evaluation of Object Detection Technology Based on Computer Vision.
Proceedings of the 14th Asian Control Conference, 2024

2023
A Machine Learning Based Method to Evaluate Learning in Gamification Practices.
Int. J. Emerg. Technol. Learn., November, 2023

Importance-aware contrastive learning via semantically augmented instances for unsupervised sentence embeddings.
Int. J. Mach. Learn. Cybern., September, 2023

BadGPT: Exploring Security Vulnerabilities of ChatGPT via Backdoor Attacks to InstructGPT.
CoRR, 2023

2022
Optimizing emotion-cause pair extraction task by using mutual assistance single-task model, clause position information and semantic features.
J. Supercomput., 2022

A Low Temperature Coefficient Time-to-Digital Converter with 1.3 ps Resolution Implemented in a 28 nm FPGA.
Sensors, 2022

Research on the construction of an E-commerce Valley industry-education integration platform.
Int. J. Comput. Sci. Math., 2022

2021
Pseudo-siamese networks with lexicon for Chinese short text matching.
J. Intell. Fuzzy Syst., 2021

A two-stage balancing strategy based on data augmentation for imbalanced text sentiment classification.
J. Intell. Fuzzy Syst., 2021

Efficient data management for urban logistics distribution.
Int. J. Wirel. Mob. Comput., 2021

Mechanism and empirical study of synchronous buying behaviour under public security emergencies.
Int. J. Wirel. Mob. Comput., 2021

An efficient framework for data aggregation in smart agriculture.
Concurr. Comput. Pract. Exp., 2021

A Cascading Failure Model Considering Operation Characteristics of the Communication Layer.
IEEE Access, 2021

2020
Optimizing unbalanced text classification tasks by integrating critical data mining and restricted rewriting techniques.
Concurr. Comput. Pract. Exp., 2020

Agent-based modeling approach for group polarization behavior considering conformity and network relationship strength.
Concurr. Comput. Pract. Exp., 2020

Modeling and simulation analysis of public opinion polarization in a dynamic network environment.
Concurr. Comput. Pract. Exp., 2020

Modeling Public Opinion Polarization in Group Behavior by Integrating SIRS-Based Information Diffusion Process.
Complex., 2020

2019
Enhancing network cluster synchronization capability based on artificial immune algorithm.
Hum. centric Comput. Inf. Sci., 2019


  Loading...