Shengfang Zhai

Orcid: 0000-0001-6820-6361

According to our database1, Shengfang Zhai authored at least 16 papers between 2022 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
AdvAudio: A New Information Hiding Method via Fooling Automatic Speech Recognition Model.
ACM Trans. Asian Low Resour. Lang. Inf. Process., August, 2025

Silent Leaks: Implicit Knowledge Extraction Attack on RAG Systems through Benign Queries.
CoRR, May, 2025

GuardReasoner-VL: Safeguarding VLMs via Reinforced Reasoning.
CoRR, May, 2025

Sparse Autoencoder as a Zero-Shot Classifier for Concept Erasing in Text-to-Image Diffusion Models.
CoRR, March, 2025

Life-Cycle Routing Vulnerabilities of LLM Router.
CoRR, March, 2025

NaviDet: Efficient Input-level Backdoor Detection on Text-to-Image Synthesis via Neuron Activation Variation.
CoRR, March, 2025

GuardReasoner: Towards Reasoning-based LLM Safeguards.
CoRR, January, 2025

2024
Discovering Universal Semantic Triggers for Text-to-Image Synthesis.
CoRR, 2024

Membership Inference on Text-to-Image Diffusion Models via Conditional Likelihood Discrepancy.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

TRLS: A Time Series Representation Learning Framework Via Spectrogram for Medical Signal Processing.
Proceedings of the IEEE International Conference on Acoustics, 2024

Security Equivalence Assessment between Cloud Standards by Mapping of Control Items.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
Text-to-Image Diffusion Models can be Easily Backdoored through Multimodal Data Poisoning.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

NCL: Textual Backdoor Defense Using Noise-Augmented Contrastive Learning.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
Apple of Sodom: Hidden Backdoors in Superior Sentence Embeddings via Contrastive Learning.
CoRR, 2022

Kallima: A Clean-Label Framework for Textual Backdoor Attacks.
Proceedings of the Computer Security - ESORICS 2022, 2022

Automated Extraction of ABAC Policies from Natural-Language Documents in Healthcare Systems.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022


  Loading...