About me
Dr. Wenbo Jiang is currently a postdoctoral (associate researcher fellow) in the School of Computer Science and Engineering (School of Cyberspace Security) at the University of Electronic Science and Technology of China, under the supervision of Prof. Hongwei Li (IEEE Fellow). Dr. Jiang was awarded for the National Postdoctoral Innovative Talent Support Program in 2023, and obtained youth program of the National Natural Science Foundation of China in 2024. As the fitst/corrsponding author, he has published many papers in major conferences/journals, including IEEE CVPR, IEEE TDSC, IEEE TIFS, etc.
Email: wenbo_jiang@uestc.edu.cn
Google scholar: https://scholar.google.com/citations?user=OjHzvJkAAAAJ
Research interests
AI security and Privacy; Trustworthy AI; Backdoor attacks; Adversarial attacks; Data security
Education
2013-2017: Bachelor degree in Cyber Security, University of Electronic Science and Technology of China.
2017-2019: Master degree in Cyber Security, University of Electronic Science and Technology of China.
2021-2022: Visiting PhD in Cyber Security, Nanyang Technological University (supervised by Prof. Tianwei Zhang).
2019-2023: PhD degree in Cyber Security, University of Electronic Science and Technology of China (supervised by Prof. Hongwei Li).
Academic service
Reviewer for conference: CVPR 2025, ICLR 2025, ICME 2025, ICASSP 2025, IJCNN 2025 (Area Chair), IEEE ICC 2025 (TPC member), IEEE ICC 2024 (TPC member), IEEE ICCC 2024 (TPC member), etc.
Reviewer for journals: IEEE TIFS, IEEE TCSVT, IEEE IoTJ, IEEE TNNLS, IEEE TAI, IEEE TVT, ACM TOIT, etc.
Guest editor: A special issue of Electronics (Security and Privacy for AI) https://www.mdpi.com/journal/electronics/special_issues/F996X09SVU
Recent publications
- W. Jiang, Hongwei Li, Guowen Xu, Hao Ren, Haomiao Yang, Tianwei Zhang, Shui Yu, “Rethinking the Design of Backdoor Triggers and Adversarial Perturbations: A Color Space Perspective” in IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2024.3521942.
- Xue Yang, Tao Chen, lei guo, Wenbo Jiang, ji guo, Yongming Li, Jiaming He. “BadRefSR: Backdoor Attacks Against Reference-based Image Super Resolution” Proceedings of ICASSP 2025.
- Jiaming He, Cheng Liu, Guanyu Hou, Wenbo Jiang, Jiachen Li. “PRESS: Defending Privacy in Retrieval-Augmented Generation via Embedding Space Shifting” Proceedings of ICASSP 2025.
- Jiaming He, Wenbo Jiang, Guanyu Hou, Wenshu Fan, Rui Zhang and Hongwei Li. “ Watch Out for Your Guidance on Generation! Exploring Conditional Backdoor Attacks against Large Language Models.” Proceedings of the AAAI 2025.
- W. Jiang, H. Li, G. Xu, T. Zhang, “Color backdoor: A robust poisoning attack in color space” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023, pp. 8133-8142.
- W. Jiang, H. Li, G. Xu, T. Zhang and R. Lu, “A Comprehensive Defense Framework Against Model Extraction Attacks,” in IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 2, pp. 685-700, March-April 2024, doi: 10.1109/TDSC.2023.3261327.
- W. Fan, H. Li, W. Jiang*, M. Hao, S. Yu and X. Zhang, “Stealthy Targeted Backdoor Attacks Against Image Captioning,” in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 5655-5667, 2024, doi: 10.1109/TIFS.2024.3402179.
- R. Zhang, H. Li, R. Wen, W. Jiang, Y. Zhang, M. Backes, Y. Shen and Y. Zhang, “Instruction backdoor attacks against customized {LLMs},” In 33rd USENIX Security Symposium (USENIX Security 24) (pp. 1849-1866).
- W. Jiang, H. Li, G. Xu, T. Zhang and R. Lu, “Physical Black-Box Adversarial Attacks Through Transformations,” in IEEE Transactions on Big Data, vol. 9, no. 3, pp. 964-974, 1 June 2023, doi: 10.1109/TBDATA.2022.3227318.
- W. Jiang, T. Zhang, H. Qiu, H. Li and G. Xu, “Incremental Learning, Incremental Backdoor Threats,” in IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 2, pp. 559-572, March-April 2024, doi: 10.1109/TDSC.2022.3201234.
- Wenbo Jiang, Hongwei Li, Yuxin Lu, et al., “Adversarial Robustness Poisoning: Increasing Adversarial Vulnerability of the Model via Data Poisoning” in IEEE Globecom 2024.
- Ji Guo, Hongwei Li, Wenbo Jiang*, et al., “Backdoor Attack Against Vision Transformers via Attention Gradient-Based Image Erosion” in IEEE Globecom 2024.
- Rui Zhang, Hongwei Li, Wenbo Jiang*, et al., “BadTTS: Identifying Vulnerabilities in Neural Text-to-Speech Models” IEEE Globecom 2024.
- Ran Zhang, Hongwei Li, Xinyuan Qian, Xiaoyuan Liu and Wenbo Jiang, “QPFFL: Advancing Federated Learning with Quantum-Resistance, Privacy, and Fairness” IEEE Globecom 2024.
- R Zhang, H Li, X Qian, W Jiang*, X Zhang, “An Efficient and Secure Privacy-Preserving Federated Learning Via Lattice-Based Functional Encryption” in IEEE ICC 2024.
- J He, H Li, W Jiang*, Y Zhang, “Mtisa: Multi-Target Image-Scaling Attack” in IEEE ICC 2024.
Google scholar: https://scholar.google.com/citations?user=OjHzvJkAAAAJ