Jialiang Dong
  • Bio
  • Papers
  • Talks
  • News
  • Experience
  • Teaching
  • Blog
    • Our paper "Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes" got accepted in DSPP 2025!
    • My study "From Surface to Semantics: Semantic Structure Parsing for Table-Centric Document Analysis" got accepted in ECAI 2025!
    • Our paper "What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software" got accepted in DSN 2025!
    • Our paper "Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis" got accepted in NDSS 2025!
    • My study "WEDA: Exploring Copyright Protection for Large Language Model Downstream Alignment" got accepted in TASLP!
  • Publications
    • Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes
    • From Surface to Semantics: Semantic Structure Parsing for Table-Centric Document Analysis
    • What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software
    • Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis
    • WEDA: Exploring Copyright Protection for Large Language Model Downstream Alignment
    • Transferable Adversarial Distribution Learning: Query-Efficient Adversarial Attack against Large Language Models
    • A Textual Adversarial Attack Scheme for Domain-Specific Models
    • Adversarial Attack and Defense on Natural Language Processing in Deep Learning: A Survey and Perspective
    • A Sentence-Level Text Adversarial Attack Algorithm against IIoT based Smart Grid
  • Recent & Upcoming Talks
    • DSN'25
    • ACM MMAsia'24 PhD School
  • Teaching
    • Software Architecture (UTS)
    • Cyber Resilience (UNSW)
  • Experience

Transferable Adversarial Distribution Learning: Query-Efficient Adversarial Attack against Large Language Models

Jan 1, 2023·
Huoyuan Dong
,
Jialiang Dong
,
Shaohua Wan
,
Shuai Yuan
,
Zhitao Guan
· 0 min read
Cite
Type
Journal article
Publication
Computers & Security (COSE)
Last updated on Jan 1, 2023

← WEDA: Exploring Copyright Protection for Large Language Model Downstream Alignment Jan 1, 2024
A Textual Adversarial Attack Scheme for Domain-Specific Models Jan 1, 2022 →

© 2025 Me. This work is licensed under CC BY NC ND 4.0

Published with Hugo Blox Builder — the free, open source website builder that empowers creators.