フォロー
Zhilong Wang
Zhilong Wang
確認したメール アドレス: psu.edu - ホームページ
タイトル
引用先
引用先
Using deep learning to solve computer security challenges: a survey
YH Choi, P Liu, Z Shang, H Wang, Z Wang, L Zhang, J Zhou, Q Zou
Cybersecurity 3 (1), 1-32, 2020
572020
To detect stack buffer overflow with polymorphic canaries
Z Wang, X Ding, C Pang, J Guo, J Zhu, B Mao
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
272018
ROPOB: Obfuscating Binary Code via Return Oriented Programming
D Mu, J Guo, W Ding, Z Wang, B Mao, L Shi
International Conference on Security and Privacy in Communication Systems …, 2017
182017
HART: Hardware-Assisted Kernel Module Tracing on Arm
Y Du, Z Ning, J Xu, Z Wang, YH Lin, F Zhang, X Xing, B Mao
European Symposium on Research in Computer Security, 316-337, 2020
142020
How Does Naming Affect Language Models on Code Analysis Tasks?
Z Wang, L Zhang, C Cao, N Luo, X Luo, P Liu
Journal of Software Engineering and Applications 17 (11), 803-816, 2024
13*2024
Diffguard: Obscuring sensitive information in canary based protections
J Zhu, W Zhou, Z Wang, D Mu, B Mao
Security and Privacy in Communication Networks: 13th International …, 2018
72018
Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model
Z Wang, H Wang, H Hu, P Liu
arXiv preprint arXiv:2108.12071, 2021
62021
Spotting Silent Buffer Overflows in Execution Trace through Graph Neural Network Assisted Data Flow Analysis
Z Wang, L Yu, S Wang, P Liu
arXiv preprint arXiv:2102.10452, 2021
52021
Hide Your Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Neural Carrier Articles
Z Wang, H Wang, N Luo, L Zhang, X Sun, Y Cao, P Liu
arXiv preprint arXiv:2408.11182, 2024
3*2024
Which Features are Learned by CodeBert: An Empirical Study of the BERT-based Source Code Representation Learning
L Zhang, C Cao, Z Wang, P Liu
arXiv preprint arXiv:2301.08427v2, 2023
22023
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity
Z Wang, P Liu
Cybersecurity 4 (1), 1-9, 2021
22021
AI for Cybersecurity: A Handbook of Use Cases. Amazon
P Liu, T Liu, N Luo, Z Shang, H Wang, Z Wang, L Zhang, Q Zou
1*2022
A hybrid LLM workflow can help identify user privilege related variables in programs of any size
H Wang, Z Wang, P Liu
arXiv preprint arXiv:2403.15723, 2024
2024
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–13