Ning Zhenhu, Ning Zhenhu
Cryptography is the cornerstone of trusted computing. Currently, classical cryptographic systems are facing severe challenges from quantum computing. While post-quantum cryptography (PQC) can resist known quantum attacks, with the continuous development and maturation of quantum computing, the emerg…
Wei Zixuan
In large-scale Internet of Things (IoT) deployments, terminal nodes are often constrained by factors such as power consumption, cost, and installation location, preventing them from accessing the Internet directly and forcing them to rely on nearby devices to forward data. If the forwarding path lac…
Zeng Haixiang
This study proposes and validates a novel psycho-judicial attack paradigm termed "Cognitive Trial." Unlike traditional prompt injection, this paradigm is completed through a multi-stage game, exploiting core architectural vulnerabilities in Large Language Models (LLMs) that arise from their pursuit …
Wang Zhi
In recent years, alongside the continuous improvement in computer performance, artificial intelligence (Artificial Intelligence, AI) technology has experienced rapid development. AI technology, represented by deep neural networks, has achieved tremendous breakthroughs in numerous domains including a…