Search

Your search keyword '"Niu, Luyao"' showing total 157 results

Search Constraints

Start Over You searched for: Author "Niu, Luyao" Remove constraint Author: "Niu, Luyao"
157 results on '"Niu, Luyao"'

Search Results

1. CleanGen: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models

2. ChatBug: A Common Vulnerability of Aligned LLMs Induced by Chat Templates

3. Magpie: Alignment Data Synthesis from Scratch by Prompting Aligned LLMs with Nothing

4. ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning

5. PlanGPT: Enhancing Urban Planning with Tailored Language Model and Efficient Retrieval

6. Fault Tolerant Neural Control Barrier Functions for Robotic Systems under Sensor Faults and Attacks

7. ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs

8. SafeDecoding: Defending against Jailbreak Attacks via Safety-Aware Decoding

9. Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors

10. Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning

11. MDTD: A Multi Domain Trojan Detector for Deep Neural Networks

12. A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected Systems

13. Risk-Aware Distributed Multi-Agent Reinforcement Learning

14. A Hybrid Submodular Optimization Approach to Controlled Islanding with Post-Disturbance Stability Guarantees

15. LDL: A Defense for Label-Based Membership Inference Attacks

16. A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint

17. Abstraction-Free Control Synthesis to Satisfy Temporal Logic Constraints under Sensor Faults and Attacks

18. Barrier Certificate based Safe Control for LiDAR-based Systems under Sensor Faults and Attacks

19. Game of Trojans: A Submodular Byzantine Approach

20. Practice and Reflection on Diabetes Community Management Model from the Perspective of Value Co-creation

21. An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee

22. A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics

24. Safety-Critical Control Synthesis for Unknown Sampled-Data Systems via Control Barrier Functions

25. A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries

26. Reinforcement Learning Beyond Expectation

27. Scalable Planning in Multi-Agent MDPs

29. LQG Reference Tracking with Safety and Reachability Guarantees under Unknown False Data Injection Attacks

30. Control Barrier Functions for Abstraction-Free Control Synthesis under Temporal Logic Constraints

31. Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries

32. Secure Control in Partially Observable Environments to Satisfy LTL Specifications

33. Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks

34. Linear Temporal Logic Satisfaction in Adversarial Environments using Secure Control Barrier Certificates

39. Optimal Secure Control with Linear Temporal Logic Constraints

40. A Differentially Private Incentive Design for Traffic Offload to Public Transportationx

44. Minimum Violation Control Synthesis on Cyber-Physical Systems under Attacks

Catalog

Books, media, physical & digital resources