Yixin Wu

Orcid: 0000-0002-3000-9423

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
  • Sichuan University, College of Cybersecurity, Chengdu, China (2017 - 2021)


According to our database1, Yixin Wu authored at least 21 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
The Challenge of Identifying the Origin of Black-Box Large Language Models.
CoRR, March, 2025

Peering Behind the Shield: Guardrail Identification in Large Language Models.
CoRR, February, 2025

Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications.
CoRR, February, 2025

HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns.
CoRR, January, 2025

On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts.
Dataset, January, 2025

On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts.
Dataset, January, 2025

HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns.
Dataset, January, 2025

HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns.
Dataset, January, 2025

2024
Link Stealing Attacks Against Inductive Graph Neural Networks.
Proc. Priv. Enhancing Technol., 2024

Voice Jailbreak Attacks Against GPT-4o.
CoRR, 2024

UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and AI-Generated Images.
CoRR, 2024

Quantifying Privacy Risks of Prompts in Visual Prompt Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024

The Death and Life of Great Prompts: Analyzing the Evolution of LLM Prompts from the Structural Perspective.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts.
CoRR, 2023

Vision-language models boost food composition compilation.
CoRR, 2023

2022
Membership Inference Attacks Against Text-to-image Generation Models.
CoRR, 2022

WAIN: Automatic Web Application Identification and Naming Method.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

2021
Node-Level Membership Inference Attacks Against Graph Neural Networks.
CoRR, 2021

2020
GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things.
Secur. Commun. Networks, 2020

2019
Session-Based Webshell Detection Using Machine Learning in Web Logs.
Secur. Commun. Networks, 2019


  Loading...