Weifei Jin
I’m an undergraduate student majoring in Cyberspace Security (Experimental Class) at Beijing University of Posts and Telecommunications (BUPT). My research interests lie in Trustworthy AI, Adversarial Machine Learning, and Speech Security. I have been working under the supervision of Prof. Jie Hao in the National Engineering Research Center of Disaster Backup and Recovery. I also collaborate closely with Dr. Yuxin Cao (from NUS).
If you would like to learn more about my work, feel free to check out my recent publications below or contact me directly.
Publications
ALMGuard: Safety Shortcuts and Where to Find Them as Guardrails for Audio–Language Models
Weifei Jin, Yuxin Cao, Junjie Su, Minhui Xue, Jie Hao, Ke Xu, Jin Song Dong, Derui Wang.
To appear in the Thirty-ninth Annual Conference on Neural Information Processing Systems (NeurIPS), 2025.MALSIGHT: Exploring Malicious Source Code and Benign Pseudocode for Iterative Binary Malware Summarization
Haolang Lu, Hongrui Peng, Guoshun Nan, Jiaoyang Cui, Cheng Wang, Weifei Jin, Songtao Wang, Shengli Pan, Xiaofeng Tao.
In IEEE Transactions on Information Forensics and Security (TIFS), 2025.Boosting the Transferability of Audio Adversarial Examples with Acoustic Representation Optimization
Weifei Jin, Junjie Su, Hejia Wang, Yulin Ye, Jie Hao.
In IEEE International Conference on Multimedia & Expo (ICME), 2025.Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Weifei Jin, Yuxin Cao, Junjie Su, Derui Wang, Yedi Zhang, Minhui Xue, Jie Hao, Jin Song Dong, Yixian Yang.
In the 34th USENIX Security Symposium (USENIX Security), 2025.Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer
Weifei Jin, Yuxin Cao, Junjie Su, Qi Shen, Kai Ye, Derui Wang, Jie Hao, Ziyao Liu.
In the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems (SecTL, AsiaCCS Workshop), 2024, pp. 47–55.
News
- 09/2025: One first-author paper on protecting audio-language models against jailbreaks was accepted to NeurIPS 2025.
- 06/2025: One co-authored paper on iterative binary malware summarization was accepted to IEEE Transactions on Information Forensics and Security (TIFS).
- 03/2025: One first-author paper on boosting the transferability of audio adversarial examples was accepted to ICME 2025.
- 01/2025: One first-author paper on speech privacy protection against eavesdroppers was accepted to USENIX Security 2025.
- 09/2024: We successfully received funding from the Beijing Natural Science Foundation Undergraduate “QiYan” Program.
- 04/2024: One first-author paper on audio adversarial attacks was accepted to SecTL 2024 (AsiaCCS Workshop).
Projects
Beijing Natural Science Foundation Undergraduate “QiYan” Program (2024–2026, expected)
- Principal Investigator
- Focused on leveraging latent space features for adversarial perturbations on automatic speech recognition (ASR) systems
- Aim to enhance the security and robustness of ASR through novel defense and attack methodologies
National Undergraduate Innovation and Entrepreneurship Training Program (Jun 2023 – May 2024)
- Core Member in a national-level research project
- Focused on adversarial attacks and defenses in speech recognition based on style transfer
- Led the publication of an adversarial attack paper at SecTL 2024
Awards
- Individual Award Representative, 2024-2025 BUPT Student Commendation Conference, BUPT (Top 0.1%, 2025)
- Second-Class Scholarship, Beijing University of Posts and Telecommunications (2024)
- “Merit Student”, Beijing University of Posts and Telecommunications (2024)
- Second Prize, 9th National Cryptography Technology Competition (2024)
- Rank 1st in GPA in the major for three consecutive academic years
Services
- Academic Reviewing: Served as a reviewer for TDSC, ICME 2025.
- Mentoring: Guided junior students in Cyberspace Security projects focusing on adversarial attacks.