Yixin Wu

Orcid: 0000-0002-3000-9423

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
  • Sichuan University, College of Cybersecurity, Chengdu, China (2017 - 2021)


According to our database1, Yixin Wu authored at least 21 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
The Challenge of Identifying the Origin of Black-Box Large Language Models.
CoRR, March, 2025

Peering Behind the Shield: Guardrail Identification in Large Language Models.
CoRR, February, 2025

On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts.
Dataset, January, 2025

On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts.
Dataset, January, 2025

HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns.
Dataset, January, 2025

HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns.
Dataset, January, 2025

Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications.
Proceedings of the 34th USENIX Security Symposium, 2025

HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns.
Proceedings of the 34th USENIX Security Symposium, 2025

On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts.
Proceedings of the 34th USENIX Security Symposium, 2025

UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and AI-Generated Images.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Link Stealing Attacks Against Inductive Graph Neural Networks.
Proc. Priv. Enhancing Technol., 2024

Voice Jailbreak Attacks Against GPT-4o.
CoRR, 2024

Quantifying Privacy Risks of Prompts in Visual Prompt Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024

The Death and Life of Great Prompts: Analyzing the Evolution of LLM Prompts from the Structural Perspective.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Vision-language models boost food composition compilation.
CoRR, 2023

2022
Membership Inference Attacks Against Text-to-image Generation Models.
CoRR, 2022

WAIN: Automatic Web Application Identification and Naming Method.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

2021
Node-Level Membership Inference Attacks Against Graph Neural Networks.
CoRR, 2021

2020
GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things.
Secur. Commun. Networks, 2020

2019
Session-Based Webshell Detection Using Machine Learning in Web Logs.
Secur. Commun. Networks, 2019


  Loading...