Kanghua Mo

Orcid: 0000-0002-3762-674X

According to our database1, Kanghua Mo authored at least 17 papers between 2020 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
TransLock: Securing LLM deployment for software applications via self-locking watermarks.
Empir. Softw. Eng., April, 2026

Your Non-Transferable Learning is Fragile: Practical Breach of Protected Models.
IEEE Trans. Inf. Forensics Secur., 2026

HPA: Manipulating deep reinforcement learning via adversarial interaction.
J. Syst. Archit., 2026

2025
Attractive Metadata Attack: Inducing LLM Agents to Invoke Malicious Tools.
CoRR, August, 2025

Inverse correction-optimized vertical federated unlearning.
J. Supercomput., May, 2025

Enhancing Model Intellectual Property Protection With Robustness Fingerprint Technology.
IEEE Trans. Inf. Forensics Secur., 2025

Distraction is All You Need for Multimodal Large Language Model Jailbreaking.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

2024
Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures.
ACM Comput. Surv., June, 2024

Exploring the vulnerability of self-supervised monocular depth estimation models.
Inf. Sci., 2024

2023
Empirical study of privacy inference attack against deep reinforcement learning models.
Connect. Sci., December, 2023

Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy.
IEEE Trans. Dependable Secur. Comput., 2023

Decision Poisson: From Universal Gravitation to Offline Reinforcement Learning.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough.
Inf. Sci., 2022

ESM: Selfish mining under ecological footprint.
Inf. Sci., 2022

An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient.
Comput. Stand. Interfaces, 2022

2021
Querying little is enough: Model inversion attack via latent information.
Int. J. Intell. Syst., 2021

2020
Querying Little Is Enough: Model Inversion Attack via Latent Information.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020


  Loading...