Postdoc, Institute of Software, Chinese Academy of Sciences
3 papers at NeurIPS 2025
We introduce provable and practical watermarking approaches for data poisoning attacks.
Use the memorization theorem to analyze the power of chain of thought.
A defense method against RAG corpus attacks that combines semantic of document.