# and * indicate student authors and faculty authors, respectively.
Auditing Data Provenance in LLM Fine-tuning via Intrinsic Distributional Fingerprints
In Proceedings of the 33rd ACM Conference on Computer and Communications Security (CCS), 2026
Zirui Huang#, Yunlong Mao*, Wei Tong*, Tingting Wu, Xin Ge, and Sheng Zhong*
Fend for Yourself! Backdoor Purification in Federated Graph Learning with an Evolving Knowledge Anchor
In Proceedings of the 35th USENIX Security Symposium (Security), 2026
Chengcheng Zhu#, Yunlong Mao*, Jiale Zhang, Bosen Rao and Sheng Zhong*