Zhanhao Hu

Orcid: 0000-0002-3746-1447

According to our database1, Zhanhao Hu authored at least 16 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
JULI: Jailbreak Large Language Models by Self-Introspection.
CoRR, May, 2025

JailbreaksOverTime: Detecting Jailbreak Attacks Under Distribution Shift.
CoRR, April, 2025

PromptShield: Deployable Detection for Prompt Injection Attacks.
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, 2025

2024
On the Privacy Effect of Data Enhancement via the Lens of Memorization.
IEEE Trans. Inf. Forensics Secur., 2024

Perfect Gradient Inversion in Federated Learning: A New Paradigm from the Hidden Subset Sum Problem.
CoRR, 2024

Toxicity Detection for Free.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Full-Distance Evasion of Pedestrian Detectors in the Physical World.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Infrared Adversarial Car Stickers.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Language-Driven Anchors for Zero-Shot Adversarial Robustness.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Hiding from infrared detectors in real world with adversarial clothes.
Appl. Intell., December, 2023

Driving into Danger: Adversarial Patch Attack on End-to-End Autonomous Driving Systems Using Deep Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Physically Realizable Natural-Looking Clothing Textures Evade Person Detectors via 3D Modeling.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Amplification trojan network: Attack deep neural networks by amplifying their inherent weakness.
Neurocomputing, 2022

Infrared Invisible Clothing: Hiding from Infrared Detectors at Multiple Angles in Real World.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Adversarial Texture for Fooling Person Detectors in the Physical World.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2017
An STDP-Based Supervised Learning Algorithm for Spiking Neural Networks.
Proceedings of the Neural Information Processing - 24th International Conference, 2017


  Loading...