Publications

You can find the full list of publications on my
Google Scholar.


Cloud and Infrastructure Security

WILD Attack: Stealthy Undermining of Wi-Fi-Based Geolocation Through Remote Crowdsourced Data Injection
Changjia Zhu, Xiao Han, Parush Gera, Zhuo Lu, Tempestt Neal, Yao Liu
USENIX Security 2026

Understanding and Mitigating Infrastructure-Level Disruption in Wi-Fi Positioning Systems
Changjia Zhu, Xiao Han, Parush Gera, Mingkui Wei, Zhuo Lu, Tempestt Neal, Yao Liu
Under Review, IEEE Transactions on Dependable and Secure Computing, 2026

Shadow Hunting in the Cloud: Unearthing and Undermining the Target Application in a Vast Ocean of Servers
Changjia Zhu, Junjie Xiong, Zhuo Lu, Yao Liu
Under Review, 2026

Patent: Mitigating Infrastructure-Level Disruption in Wi-Fi Positioning Systems Changjia Zhu, Xiao Han, Parush Gera, Mingkui Wei, Zhuo Lu, Tempestt Neal, Yao Liu U.S. Patent Application (Submitted), 2026


LLM Security and Workflow Evaluation

Invisible Prompts, Visible Threats: Malicious Font Injection in External Resources for Large Language Models
Changjia Zhu, Junjie Xiong, Chong Zhang, Yongfeng Zhang, Yao Liu, Lingyao Li
EMNLP 2025 Findings

When Your Reviewer is an LLM: Biases, Divergence, and Prompt Injection Risks
Changjia Zhu, Junjie Xiong, Renkai Ma, Zhicong Lu, Zhuo Lu, Yao Liu, Lingyao Li
Under Review, Computers in Human Behavior, 2025

COGNITION: From Evaluation to Defense against Multimodal LLM CAPTCHA Solvers
Junyu Wang, Changjia Zhu, Yuanbo Zhou, Lingyao Li, Xu He, Mingkui Wei, Junjie Xiong
Under Review, 2026

Guardians and Offenders: A Survey on Harmful Content Generation and Safety Mitigation
Changjia Zhu, Chi Zhang, Junjie Xiong, Xiaoran Xu, Lingyao Li, Yao Liu, Zhuo Lu
Under Review, ACM Transactions on Intelligent Systems and Technology

Large Language Models and Social Media Information Integrity: Opportunities, Challenges, and Research Directions
Junjie Xiong, Zhengyuan Jiang, Xiaoran Xu, Chi Zhang, Changjia Zhu, Ning Wang, Mingkui Wei, Zhuo Lu, Yao Liu, Lingyao Li
Under Revision, ACM Computing Surveys, 2025


Transformer Architecture and Guardrail Analysis

Prompt Overflow Attack: Bypassing LLM Safety Checkers via Overlength Prompting
Yuanbo Zhou, Changjia Zhu, Junyu Wang, Yan Zhai, Kun Sun, Xu He, Junjie Xiong
Under Review, 2026