


default search action
Zhen Sun 0001
Person information
- affiliation: Hong Kong University of Science and Technology Guangzhou (HKUST-HZ), Guangzhou, China
Other persons with the same name
- Zhen Sun — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[c8]Jihui Guo, Zongmin Zhang, Zhen Sun, Yuhao Yang, Jinlin Wu, Fu Zhang, Xinlei He:
6DAttack: Backdoor Attacks in the 6DoF Pose Estimation. AAAI 2026: 35455-35463- 2025
[c7]Zhen Sun, Zongmin Zhang, Xinyue Shen, Ziyi Zhang, Yule Liu, Michael Backes, Yang Zhang, Xinlei He:
Are We in the AI-Generated Text World Already? Quantifying and Monitoring AIGT on Social Media. ACL (1) 2025: 22975-23005
[c6]Ziyi Zhang, Zhen Sun, Zongmin Zhang, Jihui Guo, Xinlei He:
FC-Attack: Jailbreaking Multimodal Large Language Models via Auto-Generated Flowcharts. EMNLP (Findings) 2025: 9299-9316
[c5]Yule Liu, Zhiyuan Zhong
, Yifan Liao
, Zhen Sun, Jingyi Zheng, Jiaheng Wei, Qingyuan Gong
, Fenghua Tong
, Yang Chen, Yang Zhang
, Xinlei He:
On the Generalization and Adaptation Ability of Machine-Generated Text Detectors in Academic Writing. KDD (2) 2025: 5674-5685
[c4]Jingyi Zheng, Junfeng Wang
, Zhen Sun, Wenhan Dong, Yule Liu, Xinlei He:
TH-Bench: Evaluating Evading Attacks via Humanizing AI Text on Machine-Generated Text Detectors. KDD (2) 2025: 5948-5959
[c3]Zhen Sun, Tianshuo Cong, Yule Liu, Chenhao Lin, Xinlei He, Rongmao Chen, Xingshuo Han, Xinyi Huang:
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning. SP 2025: 1713-1731
[c2]Zeren Luo, Zifan Peng, Yule Liu, Zhen Sun, Mingchen Li, Jingyi Zheng, Xinlei He:
Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety Risks in AI Web Search. USENIX Security Symposium 2025: 8055-8074
[i22]Zeren Luo, Zifan Peng, Yule Liu, Zhen Sun, Mingchen Li, Jingyi Zheng, Xinlei He:
The Rising Threat to Emerging AI-Powered Search Engines. CoRR abs/2502.04951 (2025)
[i21]Ziyi Zhang, Zhen Sun, Zongmin Zhang, Jihui Guo, Xinlei He:
FC-Attack: Jailbreaking Large Vision-Language Models via Auto-Generated Flowcharts. CoRR abs/2502.21059 (2025)
[i20]Jingyi Zheng, Junfeng Wang, Zhen Sun, Wenhan Dong, Yule Liu, Xinlei He:
TH-Bench: Evaluating Evading Attacks via Humanizing AI Text on Machine-Generated Text Detectors. CoRR abs/2503.08708 (2025)
[i19]Yule Liu, Jingyi Zheng, Zhen Sun, Zifan Peng, Wenhan Dong, Zeyang Sha, Shiwen Cui, Weiqiang Wang, Xinlei He:
Thought Manipulation: External Thought Can Be Efficient for Large Reasoning Models. CoRR abs/2504.13626 (2025)
[i18]Wenhan Dong, Yuemeng Zhao, Zhen Sun, Yule Liu, Zifan Peng, Jingyi Zheng, Zongmin Zhang, Ziyi Zhang, Jun Wu, Ruiming Wang, Shengmin Xu, Xinyi Huang, Xinlei He:
Humanizing LLMs: A Survey of Psychological Measurements with Tools, Datasets, and Human-Agent Applications. CoRR abs/2505.00049 (2025)
[i17]Ziyi Zhang, Zhen Sun, Zongmin Zhang, Zifan Peng, Yuemeng Zhao, Zichun Wang, Zeren Luo, Ruiting Zuo, Xinlei He:
"I Can See Forever!": Evaluating Real-time VideoLLMs for Assisting Individuals with Visual Impairments. CoRR abs/2505.04488 (2025)
[i16]Zhen Sun, Ziyi Zhang, Zeren Luo, Zeyang Sha, Tianshuo Cong, Zheng Li, Shiwen Cui, Weiqiang Wang, Jiaheng Wei, Xinlei He, Qi Li, Qian Wang:
FragFake: A Dataset for Fine-Grained Detection of Edited Images with Vision Language Models. CoRR abs/2505.15644 (2025)
[i15]Zifan Peng, Yule Liu, Zhen Sun, Mingchen Li, Zeren Luo, Jingyi Zheng, Wenhan Dong, Xinlei He, Xuechao Wang, Yingjie Xue, Shengmin Xu, Xinyi Huang:
JALMBench: Benchmarking Jailbreak Vulnerabilities in Audio Language Models. CoRR abs/2505.17568 (2025)
[i14]Wenhan Dong, Tianyi Hu, Jingyi Zheng, Zhen Sun, Yuemeng Zhao, Yule Liu, Xinlei He, Xinyi Huang:
Evaluation Hallucination in Multi-Round Incomplete Information Lateral-Driven Reasoning Tasks. CoRR abs/2505.23843 (2025)
[i13]Zhiyuan Zhong, Zhen Sun, Yepang Liu, Xinlei He, Guanhong Tao:
Backdoor Attack on Vision Language Models with Stealthy Semantic Manipulation. CoRR abs/2506.07214 (2025)
[i12]Wenhan Dong, Zhen Sun, Yuemeng Zhao, Zifan Peng, Jun Wu, Jingyi Zheng, Yule Liu, Xinlei He, Yu Wang, Ruiming Wang, Xinyi Huang, Lei Mo:
ZPD-SCA: Unveiling the Blind Spots of LLMs in Assessing Students' Cognitive Abilities. CoRR abs/2508.14377 (2025)
[i11]Yifan Liao, Zhen Sun, Xiaoyun Qiu, Zixiao Zhao, Wenbing Tang, Xinlei He, Xinhu Zheng, Tianwei Zhang, Xinyi Huang, Xingshuo Han:
Work Zones challenge VLM Trajectory Planning: Toward Mitigation and Robust Autonomous Driving. CoRR abs/2510.02803 (2025)
[i10]Yule Liu, Heyi Zhang, Jinyi Zheng, Zhen Sun, Zifan Peng, Tianshuo Cong, Yilong Yang, Xinlei He, Zhuo Ma:
GRPO Privacy Is at Risk: A Membership Inference Attack Against Reinforcement Learning With Verifiable Rewards. CoRR abs/2511.14045 (2025)
[i9]Zhen Sun, Zongmin Zhang, Deqi Liang, Han Sun, Yule Liu, Yun Shen, Xiangshan Gao, Yilong Yang, Shuai Liu, Yutao Yue, Xinlei He:
"To Survive, I Must Defect": Jailbreaking LLMs via the Game-Theory Scenarios. CoRR abs/2511.16278 (2025)
[i8]Jihui Guo, Zongmin Zhang, Zhen Sun, Yuhao Yang, Jinlin Wu, Fu Zhang, Xinlei He:
6DAttack: Backdoor Attacks in the 6DoF Pose Estimation. CoRR abs/2512.19058 (2025)
[i7]Zongmin Zhang, Zhen Sun, Yifan Liao, Wenhan Dong, Xinlei He, Xingshuo Han, Shengmin Xu, Xinyi Huang:
Backdoor Attacks on Prompt-Driven Video Segmentation Foundation Models. CoRR abs/2512.22046 (2025)- 2024
[c1]Zhen Sun, Huan Xu, Jinlin Wu, Zhen Chen
, Hongbin Liu, Zhen Lei:
PWISeg: Weakly-Supervised Surgical Instrument Instance Segmentation. ICIP 2024: 3144-3150
[i6]Sibo Yi, Yule Liu, Zhen Sun, Tianshuo Cong, Xinlei He, Jiaxing Song, Ke Xu, Qi Li
:
Jailbreak Attacks and Defenses Against Large Language Models: A Survey. CoRR abs/2407.04295 (2024)
[i5]Zhen Sun, Tianshuo Cong, Yule Liu, Chenhao Lin, Xinlei He, Rongmao Chen, Xingshuo Han, Xinyi Huang:
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning. CoRR abs/2411.17453 (2024)
[i4]Yule Liu, Zhen Sun, Xinlei He, Xinyi Huang:
Quantized Delta Weight Is Safety Keeper. CoRR abs/2411.19530 (2024)
[i3]Yule Liu, Zhiyuan Zhong, Yifan Liao
, Zhen Sun, Jingyi Zheng, Jiaheng Wei, Qingyuan Gong, Fenghua Tong, Yang Chen, Yang Zhang, Xinlei He:
On the Generalization Ability of Machine-Generated Text Detectors. CoRR abs/2412.17242 (2024)
[i2]Zhen Sun, Zongmin Zhang, Xinyue Shen, Ziyi Zhang, Yule Liu, Michael Backes, Yang Zhang, Xinlei He:
Are We in the AI-Generated Text World Already? Quantifying and Monitoring AIGT on Social Media. CoRR abs/2412.18148 (2024)- 2023
[i1]Zhen Sun, Huan Xu
, Jinlin Wu, Zhen Chen
, Zhen Lei, Hongbin Liu:
PWISeg: Point-based Weakly-supervised Instance Segmentation for Surgical Instruments. CoRR abs/2311.09819 (2023)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-21 01:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







