Picture for Pengzhou Cheng

Pengzhou Cheng

Atomic-to-Compositional Generalization for Mobile Agents with A New Benchmark and Scheduling System

Add code
Jun 10, 2025
Viaarxiv icon

On the Adaptive Psychological Persuasion of Large Language Models

Add code
Jun 07, 2025
Viaarxiv icon

Hidden Ghost Hand: Unveiling Backdoor Vulnerabilities in MLLM-Powered Mobile GUI Agents

Add code
May 20, 2025
Viaarxiv icon

GEM: Gaussian Embedding Modeling for Out-of-Distribution Detection in GUI Agents

Add code
May 19, 2025
Viaarxiv icon

Investigating the Adaptive Robustness with Knowledge Conflicts in LLM-based Multi-Agent Systems

Add code
Feb 21, 2025
Viaarxiv icon

Gracefully Filtering Backdoor Samples for Generative Large Language Models without Retraining

Add code
Dec 03, 2024
Figure 1 for Gracefully Filtering Backdoor Samples for Generative Large Language Models without Retraining
Figure 2 for Gracefully Filtering Backdoor Samples for Generative Large Language Models without Retraining
Figure 3 for Gracefully Filtering Backdoor Samples for Generative Large Language Models without Retraining
Figure 4 for Gracefully Filtering Backdoor Samples for Generative Large Language Models without Retraining
Viaarxiv icon

Flooding Spread of Manipulated Knowledge in LLM-Based Multi-Agent Communities

Add code
Jul 10, 2024
Figure 1 for Flooding Spread of Manipulated Knowledge in LLM-Based Multi-Agent Communities
Figure 2 for Flooding Spread of Manipulated Knowledge in LLM-Based Multi-Agent Communities
Figure 3 for Flooding Spread of Manipulated Knowledge in LLM-Based Multi-Agent Communities
Figure 4 for Flooding Spread of Manipulated Knowledge in LLM-Based Multi-Agent Communities
Viaarxiv icon

TrojanRAG: Retrieval-Augmented Generation Can Be Backdoor Driver in Large Language Models

Add code
May 22, 2024
Figure 1 for TrojanRAG: Retrieval-Augmented Generation Can Be Backdoor Driver in Large Language Models
Figure 2 for TrojanRAG: Retrieval-Augmented Generation Can Be Backdoor Driver in Large Language Models
Figure 3 for TrojanRAG: Retrieval-Augmented Generation Can Be Backdoor Driver in Large Language Models
Figure 4 for TrojanRAG: Retrieval-Augmented Generation Can Be Backdoor Driver in Large Language Models
Viaarxiv icon

MKF-ADS: Multi-Knowledge Fusion Based Self-supervised Anomaly Detection System for Control Area Network

Add code
Mar 15, 2024
Figure 1 for MKF-ADS: Multi-Knowledge Fusion Based Self-supervised Anomaly Detection System for Control Area Network
Figure 2 for MKF-ADS: Multi-Knowledge Fusion Based Self-supervised Anomaly Detection System for Control Area Network
Figure 3 for MKF-ADS: Multi-Knowledge Fusion Based Self-supervised Anomaly Detection System for Control Area Network
Figure 4 for MKF-ADS: Multi-Knowledge Fusion Based Self-supervised Anomaly Detection System for Control Area Network
Viaarxiv icon

Syntactic Ghost: An Imperceptible General-purpose Backdoor Attacks on Pre-trained Language Models

Add code
Feb 29, 2024
Figure 1 for Syntactic Ghost: An Imperceptible General-purpose Backdoor Attacks on Pre-trained Language Models
Figure 2 for Syntactic Ghost: An Imperceptible General-purpose Backdoor Attacks on Pre-trained Language Models
Figure 3 for Syntactic Ghost: An Imperceptible General-purpose Backdoor Attacks on Pre-trained Language Models
Figure 4 for Syntactic Ghost: An Imperceptible General-purpose Backdoor Attacks on Pre-trained Language Models
Viaarxiv icon