Using deep learning to solve computer security challenges: a survey YH Choi, P Liu, Z Shang, H Wang, Z Wang, L Zhang, J Zhou, Q Zou Cybersecurity 3 (1), 1-32, 2020 | 57 | 2020 |
To detect stack buffer overflow with polymorphic canaries Z Wang, X Ding, C Pang, J Guo, J Zhu, B Mao 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018 | 27 | 2018 |
ROPOB: Obfuscating Binary Code via Return Oriented Programming D Mu, J Guo, W Ding, Z Wang, B Mao, L Shi International Conference on Security and Privacy in Communication Systems …, 2017 | 18 | 2017 |
HART: Hardware-Assisted Kernel Module Tracing on Arm Y Du, Z Ning, J Xu, Z Wang, YH Lin, F Zhang, X Xing, B Mao European Symposium on Research in Computer Security, 316-337, 2020 | 14 | 2020 |
How Does Naming Affect Language Models on Code Analysis Tasks? Z Wang, L Zhang, C Cao, N Luo, X Luo, P Liu Journal of Software Engineering and Applications 17 (11), 803-816, 2024 | 13* | 2024 |
Diffguard: Obscuring sensitive information in canary based protections J Zhu, W Zhou, Z Wang, D Mu, B Mao Security and Privacy in Communication Networks: 13th International …, 2018 | 7 | 2018 |
Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model Z Wang, H Wang, H Hu, P Liu arXiv preprint arXiv:2108.12071, 2021 | 6 | 2021 |
Spotting Silent Buffer Overflows in Execution Trace through Graph Neural Network Assisted Data Flow Analysis Z Wang, L Yu, S Wang, P Liu arXiv preprint arXiv:2102.10452, 2021 | 5 | 2021 |
Hide Your Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Neural Carrier Articles Z Wang, H Wang, N Luo, L Zhang, X Sun, Y Cao, P Liu arXiv preprint arXiv:2408.11182, 2024 | 3* | 2024 |
Which Features are Learned by CodeBert: An Empirical Study of the BERT-based Source Code Representation Learning L Zhang, C Cao, Z Wang, P Liu arXiv preprint arXiv:2301.08427v2, 2023 | 2 | 2023 |
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity Z Wang, P Liu Cybersecurity 4 (1), 1-9, 2021 | 2 | 2021 |
AI for Cybersecurity: A Handbook of Use Cases. Amazon P Liu, T Liu, N Luo, Z Shang, H Wang, Z Wang, L Zhang, Q Zou | 1* | 2022 |
A hybrid LLM workflow can help identify user privilege related variables in programs of any size H Wang, Z Wang, P Liu arXiv preprint arXiv:2403.15723, 2024 | | 2024 |