Search Results for author: Zhenyuan Guo

Found 4 papers, 3 papers with code

Optimal Parameter Adaptation for Safety-Critical Control via Safe Barrier Bayesian Optimization

no code implementations25 Mar 2025 Shengbo Wang, Ke Li, Zheng Yan, Zhenyuan Guo, Song Zhu, Guanghui Wen, Shiping Wen

In this work, we shed light on the crucial role of configurable parameters in the CBF method for performance enhancement with a systematical categorization.

Bayesian Optimization

Dialogue Injection Attack: Jailbreaking LLMs through Context Manipulation

1 code implementation11 Mar 2025 Wenlong Meng, Fan Zhang, Wendao Yao, Zhenyuan Guo, Yuwei Li, Chengkun Wei, Wenzhi Chen

Our experiments show that DIA achieves state-of-the-art attack success rates on recent LLMs, including Llama-3. 1 and GPT-4o.

Be Cautious When Merging Unfamiliar LLMs: A Phishing Model Capable of Stealing Privacy

1 code implementation17 Feb 2025 Zhenyuan Guo, Yi Shi, Wenlong Meng, Chen Gong, Chengkun Wei, Wenzhi Chen

Specifically, we propose PhiMM, a privacy attack approach that trains a phishing model capable of stealing privacy using a crafted privacy phishing instruction dataset.

Cannot find the paper you are looking for? You can Submit a new open access paper.