Fingerprint
Dive into the research topics where Jinyuan Jia is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
- 1 Similar Profiles
Collaborations and top research areas from the last five years
Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
Projects
- 3 Active
-
Collaborative Research: SaTC: CORE: Medium: Securing LLMs against Prompt Injection Attacks
Jia, J. (PI)
10/1/25 → 9/30/29
Project: Research project
-
Collaborative Research: CyberTraining: Implementation: Small: Cybersecurity Training and Curriculum Design for Large Language Model Research Workforce
Jia, J. (PI)
8/1/25 → 7/31/28
Project: Research project
-
Collaborative Research: SaTC: EDU: A Lab-based Curriculum for Watermarking AI-Generated Content: Theory, Algorithms, and Robustness Testing
Jia, J. (PI)
8/15/24 → 7/31/27
Project: Research project
-
An adaptive multimodal fusion framework for smartphone-based medication adherence monitoring of Parkinson's disease
Zhong, C., Jia, J. & Li, H., Jun 2025, In: Smart Health. 36, 100561.Research output: Contribution to journal › Review article › peer-review
Open Access1 Link opens in a new tab Scopus citations -
DataSentinel: A Game-Theoretic Detection of Prompt Injection Attacks
Liu, Y., Jia, Y., Jia, J., Song, D. & Gong, N. Z., 2025, Proceedings - 46th IEEE Symposium on Security and Privacy, SP 2025. Blanton, M., Enck, W. & Nita-Rotaru, C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2190-2208 19 p. (Proceedings - IEEE Symposium on Security and Privacy).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
9 Link opens in a new tab Scopus citations -
Evaluating LLM-based Personal Information Extraction and Countermeasures
Liu, Y., Jia, Y., Jia, J. & Gong, N. Z., 2025, Proceedings of the 34th USENIX Security Symposium. USENIX Association, p. 1669-1688 20 p. (Proceedings of the 34th USENIX Security Symposium).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models
Zou, W., Geng, R., Wang, B. & Jia, J., 2025, Proceedings of the 34th USENIX Security Symposium. USENIX Association, p. 3827-3844 18 p. (Proceedings of the 34th USENIX Security Symposium).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
14 Link opens in a new tab Scopus citations -
PROVABLY ROBUST EXPLAINABLE GRAPH NEURAL NETWORKS AGAINST GRAPH PERTURBATION ATTACKS
Li, J., Pang, M., Dong, Y., Jia, J. & Wang, B., 2025, 13th International Conference on Learning Representations, ICLR 2025. International Conference on Learning Representations, ICLR, p. 45172-45191 20 p. (13th International Conference on Learning Representations, ICLR 2025).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Link opens in a new tab Scopus citations