Luyao Niu

Orcid: 0000-0001-8591-5522

According to our database1, Luyao Niu authored at least 59 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Modeling and Designing Non-Pharmaceutical Interventions in Epidemics: A Submodular Approach.
IEEE Control. Syst. Lett., 2024

ChatBug: A Common Vulnerability of Aligned LLMs Induced by Chat Templates.
CoRR, 2024

Magpie: Alignment Data Synthesis from Scratch by Prompting Aligned LLMs with Nothing.
CoRR, 2024

PlanGPT: Enhancing Urban Planning with Tailored Language Model and Efficient Retrieval.
CoRR, 2024

Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors.
CoRR, 2024

Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning.
CoRR, 2024

ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024

Fault Tolerant Neural Control Barrier Functions for Robotic Systems under Sensor Faults and Attacks.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024

Who is Responsible? Explaining Safety Violations in Multi-Agent Cyber-Physical Systems.
Proceedings of the International Conference on Assured Autonomy, 2024

CleanGen: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

Poster: Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

POSTER: Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

POSTER: Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Risk-Aware Distributed Multi-Agent Reinforcement Learning.
Proceedings of the American Control Conference, 2024

SafeDecoding: Defending against Jailbreak Attacks via Safety-Aware Decoding.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

2023
A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint.
ACM Trans. Cyber Phys. Syst., July, 2023

LQG Reference Tracking With Safety and Reachability Guarantees Under Unknown False Data Injection Attacks.
IEEE Trans. Autom. Control., February, 2023

Robust Satisfaction of Metric Interval Temporal Logic Objectives in Adversarial Environments.
Games, 2023

Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications.
CoRR, 2023

A Hybrid Submodular Optimization Approach to Controlled Islanding with Post-Disturbance Stability Guarantees.
CoRR, 2023

FedGame: A Game-Theoretic Defense against Backdoor Attacks in Federated Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Learning Dissemination Strategies for External Sources in Opinion Dynamic Models with Cognitive Biases.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected Systems.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

Necessary and Sufficient Conditions for Satisfying Linear Temporal Logic Constraints Using Control Barrier Certificates.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

A Submodular Energy Function Approach to Controlled Islanding with Provable Stability.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

MDTD: A Multi-Domain Trojan Detector for Deep Neural Networks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Cognitive Bias-Aware Dissemination Strategies for Opinion Dynamics with External Information Sources.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

LDL: A Defense for Label-Based Membership Inference Attacks.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

POSTER: A Common Framework for Resilient and Safe Cyber-Physical System Design.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Game of Trojans: A Submodular Byzantine Approach.
CoRR, 2022

A Hybrid Submodular Optimization Approach to Controlled Islanding with Heterogeneous Loads.
Proceedings of the IEEE International Conference on Communications, 2022

Verifying Safety for Resilient Cyber-Physical Systems via Reactive Software Restart.
Proceedings of the 13th ACM/IEEE International Conference on Cyber-Physical Systems, 2022

Barrier Certificate based Safe Control for LiDAR-based Systems under Sensor Faults and Attacks.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

Abstraction-Free Control Synthesis to Satisfy Temporal Logic Constraints under Sensor Faults and Attacks.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

A Submodular Optimization Approach to Stable and Minimally Disruptive Controlled Islanding in Power Systems.
Proceedings of the American Control Conference, 2022

2021
A Differentially Private Incentive Design for Traffic Offload to Public Transportation.
ACM Trans. Cyber Phys. Syst., 2021

Secure Control in Partially Observable Environments to Satisfy LTL Specifications.
IEEE Trans. Autom. Control., 2021

Optimal Minimum Violation Control Synthesis of Cyber-Physical Systems Under Attacks.
IEEE Trans. Autom. Control., 2021

A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

Scalable Planning in Multi-Agent MDPs.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

Reinforcement Learning Beyond Expectation.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

Safety-Critical Control Synthesis for Unknown Sampled-Data Systems via Control Barrier Functions.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

2020
Optimal Secure Control With Linear Temporal Logic Constraints.
IEEE Trans. Autom. Control., 2020

Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks.
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020

Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

Control Barrier Functions for Abstraction-Free Control Synthesis under Temporal Logic Constraints.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

2019
Linear Temporal Logic Satisfaction in Adversarial Environments Using Secure Control Barrier Certificates.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

A Framework for Joint Attack Detection and Control Under False Data Injection.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

LQG Reference Tracking with Safety and Reachability Guarantees under False Data Injection Attacks.
Proceedings of the 2019 American Control Conference, 2019

2018
A Differentially Private and Truthful Incentive Mechanism for Traffic Offload to Public Transportation.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Minimum Violation Control Synthesis on Cyber-Physical Systems under Attacks.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Secure Control Under Linear Temporal Logic Constraints.
Proceedings of the 2018 Annual American Control Conference, 2018

Linear Quadratic Gaussian Control Under False Data Injection Attacks.
Proceedings of the 2018 Annual American Control Conference, 2018

2016
On the accuracy of Wi-Fi localization using robot and human collected signatures.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016

A Nash Bargaining Approach to Emergency Demand Response in Colocation Data Centers.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Enabling reliable data center demand response via aggregation.
Proceedings of the Seventh International Conference on Future Energy Systems, Waterloo, ON, Canada, June 21, 2016


  Loading...