Wenbo Jiang is currently an Associate Professor at the School of Computer Science and Engineering (School of Cyber Science and Engineering), University of Electronic Science and Technology of China (UESTC). He received his B.E., M.E., and Ph.D. degrees in Cybersecurity from the School of Computer Science and Engineering at UESTC. During his Master’s and Ph.D. studies, he was supervised by Prof. Hongwei Li (IEEE Fellow). From 2021 to 2022, he was funded by the China Scholarship Council (CSC) to pursue joint doctoral training at Nanyang Technological University (NTU), Singapore, where he worked with Prof. Tianwei Zhang. In recent years, he has been actively engaged in AI security research. He has published over 50 papers on AI security in top-tier international journals and conferences, including 18 CCF-A publications. His work has appeared in leading security conferences such as ACM CCS and USENIX Security, top AI conferences such as CVPR, ICML, NeurIPS, and AAAI, and premier security journals such as IEEE TDSC and IEEE TIFS. More information is available at: https://wenbo-jiang.github.io/
Guest Editor, Electronics (JCR Q2), Special Issue on Security and Privacy for AI
Area Chair / Senior Program Committee Member: ICLR 2026 (CCF-A), IJCAI 2026 (CCF-B), ICASSP 2026 (CCF-B), IJCNN 2025 (CCF-C), BMCV 2025 (CCF-C)
Workshop Chair: DLNN 2025, IEEE ICAIM 2026, MICCIS 2026, IEEE PRMVAI 2026
Program Committee Member / Reviewer for major conferences including ICML, KDD, ICCV, CVPR, ICLR, NeurIPS
Journal Reviewer for leading journals including IEEE TIFS, IEEE TDSC, IEEE TCSVT, IEEE TNNLS, IEEE TAI, IEEE TVT
Distinguished Paper Award, ACM CCS 2025 (Corresponding Author)
National Postdoctoral Innovative Talent Support Program Awardee (2023)
Provincial Gold & Silver Awards, International College Students’ Innovation Competition (Advisor), 2025
National Cybersecurity Scholarship, 2019
Multiple institutional honors including Outstanding Postdoctoral Fellow, Academic Rising Star, and Outstanding Doctoral Dissertation (UESTC)
[1] Wenbo Jiang, Hongwei Li, Jiaming He, Rui Zhang, Guowen Xu, Tianwei Zhang, Rongxing Lu. I2I Backdoor: Backdoor Attacks against Image-to-Image Tasks. IEEE Transactions on Dependable and Secure Computing(TDSC), 2025. (计算机安全领域顶级期刊,CCF-A)
[2] Wenbo Jiang, Hongwei Li, Guowen Xu, Tianwei Zhang, "Color backdoor: a robust poisoning attack in color space", IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June, 2023 (计算机视觉领域顶会,CCF-A)
[3] Wenbo Jiang, Hongwei Li, Guowen Xu, Hao Ren, Haomiao Yang, Tianwei Zhang, Shui Yu, “Rethinking the Design of Backdoor Triggers and Adversarial Perturbations: A Color Space Perspective” in IEEE Transactions on Dependable and Secure Computing, 2024(计算机安全领域顶级期刊,CCF-A)
[4] Wenbo Jiang, Hongwei Li, Guowen Xu, Tianwei Zhang and Rongxing Lu, "A comprehensive defense framework against model extraction attacks", in IEEE Transactions on Dependable and Secure Computing (TDSC), 2023(计算机安全领域顶级期刊,CCF-A)
[5] Wenbo Jiang, Tianwei Zhang, Han Qiu, Hongwei Li and Guowen Xu,"Incremental learning, incremental backdoor threats", in IEEE Transactions on Dependable and Secure Computing (TDSC), 2022. (计算机安全领域顶级期刊,CCF-A)
[6] Wenshu Fan, Minxing Zhang, Hongwei Li, Wenbo Jiang*, Hanxiao Chen, Xiangyu Yue, Michael Backes, Xiao Zhang, “DivTrackee versus DynTracker: Promoting Diversity in Anti-Facial Recognition against Dynamic FR Strategy”, in Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS), 2025(计算机安全领域顶级会议,CCF-A)
[7] Jiaming He, Wenbo Jiang*, Guanyu Hou, Wenshu Fan, Rui Zhang and Hongwei Li. " Watch Out for Your Guidance on Generation! Exploring Conditional Backdoor Attacks against Large Language Models." Proceedings of the AAAI Conference on Artificial Intelligence, Philadelphia, Pennsylvania, USA, February 25-March 4, 2025. (人工智能领域顶级会议,CCF-A)
[8] Wenshu Fan, Hongwei Li, Wenbo Jiang*, Meng Hao, Shui Yu, Xiao Zhang, "Stealthy Targeted Backdoor Attacks against Image Captioning", IEEE Transactions on Information Forensics and Security, vol. 19, pp. 5655-5667, 2024, doi: 10.1109/TIFS.2024.3402179. (计算机安全领域顶级期刊,CCF-A)
[9] Jiaming He, Guanyu Hou, Hongwei Li, Zhicong Huang, Kangjie Chen, Yi Yu, Wenbo Jiang*, Hongwei Li, Guowen Xu, Tianwei Zhang, "TEAR: Temporal-aware Automated Red-teaming for Text-to-Video Models", Conference on Computer Vision and Pattern Recognition (CVPR), 2026(计算机视觉领域顶会,CCF-A)
[10] Qiyang Song, Qihang Zhou, Xiaoqi Jia, Zhenyu Song, Wenbo Jiang, Heqing Huang, Yong Liu, Dan Meng. vCause: Efficient and Verifiable Causality Analysis for Cloud-based Endpoint Auditing. The 35th USENIX Security Symposium, 2026(计算机安全领域顶级会议,CCF-A)
[11] Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, et al. " Instruction backdoor attacks against customized LLMs", USENIX Security 2024(计算机安全领域顶级会议,CCF-A)
[12] Rui Zhang, Yun Shen, Hongwei Li, Wenbo Jiang, Hanxiao Chen, Yuan Zhang, Guowen Xu, Yang Zhang. The Ripple Effect: On Unforeseen Complications of Backdoor Attacks. International Conference on Machine Learning (ICML), 2025.(人工智能领域顶级会议,CCF-A)
[13] Shuai Yuan, Hongwei Li, Rui Zhang, Hangcheng Cao, Wenbo Jiang, Tao Ni, Wenshu Fan, Qingchuan Zhao, Guowen Xu. Omni-Angle Assault: An Invisible and Powerful Physical Adversarial Attack on Face Recognition. International Conference on Machine Learning (ICML), 2025. (人工智能领域顶级会议,CCF-A)
[14] Kunlan Xiang, Haomiao Yang, Meng Hao, Shaofeng Li, Haoxin Wang, Zikang Ding, Wenbo Jiang, Tianwei Zhang. The Gradient Puppeteer: Adversarial Domination in Gradient Leakage Attacks through Model Poisoning. IEEE Transactions on Information Forensics and Security (TIFS), 2025. (计算机安全领域顶级期刊,CCF-A)
[15] Shuai Yuan, Xingshuo Han, Hongwei Li, Guowen Xu, Wenbo Jiang, Tao Ni, Qingchuan Zhao, Yuguang Fang. The Fluorescent Veil: A Stealthy and Effective Physical Adversarial Patch Against Traffic Sign Recognition. The Thirty-Ninth Annual Conference on Neural Information Processing Systems, 2025. (人工智能领域顶级会议,CCF-A)
[16] Zihan Wang, Rui Zhang, Yu Liu, Wenshu Fan, Wenbo Jiang, Qingchuan Zhao, Hongwei Li, Guowen Xu*. MPMA: Preference Manipulation Attack Against Model Context Protocol. The Fortieth AAAI Conference on Artificial Intelligence (AAAI), 2026.(人工智能领域顶级会议,CCF-A)
[17] Zihan Wang, Rui Zhang, Hongwei Li, Wenshu Fan, Wenbo Jiang, Qingchuan Zhao, Guowen Xu*. ConfGuard: A Simple and Effective Backdoor Detection for Large Language Models. The Fortieth AAAI Conference on Artificial Intelligence (AAAI), 2026.(人工智能领域顶级会议,CCF-A)
[18] Hanxiao Chen, Hongwei Li, Meng Hao, Pengzhi Xing, Jia Hu, Wenbo Jiang, Tianwei Zhang, and Guowen Xu. Conan: Secure and Reliable Machine Learning Inference against Malicious Service Providers. IEEE Transactions on Information Forensics and Security (TIFS), 2025. (计算机安全领域顶级期刊,CCF-A)
[19] Xin Liu, Qiyang Song, Qihang Zhou, Haichao Du, Shaowen Xu, Wenbo Jiang, Weijuan Zhang, Xiaoqi Jia. Focusing on Language: Revealing and Exploiting Language Attention Heads in Multilingual Large Language Models. The Fortieth AAAI Conference on Artificial Intelligence (AAAI), 2026(人工智能领域顶级会议,CCF-A)
Full publication list: https://scholar.google.com/citations?user=OjHzvJkAAAAJ
Academic Titles : Associate Professor
Education Level : With Certificate of Graduation for Doctorate Study
Contact Information : 06eba278b1d65a10006a3440366971becfef30d48a77ac918feb787bf8f88d0200b566e2a3f18faaf95b160c73987d9585648930378818e54e2d421c034a1533aca0b4c8896811725d56f231cf195df49b33e9a68149c1c2d6990137f0299607f90c0a7e1f081967b1787904c17c5be6bfb29e65dd25156ba9824cf72be234e1
Email : 06eba278b1d65a10006a3440366971becfef30d48a77ac918feb787bf8f88d0200b566e2a3f18faaf95b160c73987d9585648930378818e54e2d421c034a1533aca0b4c8896811725d56f231cf195df49b33e9a68149c1c2d6990137f0299607f90c0a7e1f081967b1787904c17c5be6bfb29e65dd25156ba9824cf72be234e1
email : 06eba278b1d65a10006a3440366971becfef30d48a77ac918feb787bf8f88d0200b566e2a3f18faaf95b160c73987d9585648930378818e54e2d421c034a1533aca0b4c8896811725d56f231cf195df49b33e9a68149c1c2d6990137f0299607f90c0a7e1f081967b1787904c17c5be6bfb29e65dd25156ba9824cf72be234e1
The Last Update Time : ..