default search action
Kailong Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Pengcheng Xia, Yanhui Guo, Zhaowen Lin, Jun Wu, Pengbo Duan, Ningyu He, Kailong Wang, Tianming Liu, Yinliang Yue, Guoai Xu, Haoyu Wang:
WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets. Autom. Softw. Eng. 31(1): 32 (2024) - [j8]Ningke Li, Yuekang Li, Yi Liu, Ling Shi, Kailong Wang, Haoyu Wang:
Drowzee: Metamorphic Testing for Fact-Conflicting Hallucination Detection in Large Language Models. Proc. ACM Program. Lang. 8(OOPSLA2): 1843-1872 (2024) - [j7]Yuxi Li, Yi Liu, Gelei Deng, Ying Zhang, Wenjia Song, Ling Shi, Kailong Wang, Yuekang Li, Yang Liu, Haoyu Wang:
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection. Proc. ACM Softw. Eng. 1(FSE): 2075-2097 (2024) - [j6]Baijun Cheng, Shengming Zhao, Kailong Wang, Meizhen Wang, Guangdong Bai, Ruitao Feng, Yao Guo, Lei Ma, Haoyu Wang:
Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors. ACM Trans. Softw. Eng. Methodol. 33(5): 127:1-127:33 (2024) - [c23]Guanyu Wang, Yuekang Li, Yi Liu, Gelei Deng, Tianlin Li, Guosheng Xu, Yang Liu, Haoyu Wang, Kailong Wang:
MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation. FORGE 2024: 12-23 - [c22]Wuxia Bai, Kailong Wang, Kai Chen, Shenghui Li, Bingqian Li, Ning Zhang:
SC-WGAN: GAN-Based Oversampling Method for Network Intrusion Detection. ICECCS 2024: 23-42 - [c21]Liuhuo Wan, Chuan Yan, Mark Huasong Meng, Kailong Wang, Haoyu Wang:
Analyzing Excessive Permission Requests in Google Workspace Add-Ons. ICECCS 2024: 323-345 - [c20]Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu:
MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots. NDSS 2024 - [c19]Yi Liu, Gelei Deng, Zhengzi Xu, Yuekang Li, Yaowen Zheng, Ying Zhang, Lida Zhao, Tianwei Zhang, Kailong Wang:
A Hitchhiker's Guide to Jailbreaking ChatGPT via Prompt Engineering. SEA4DQ@SIGSOFT FSE 2024: 12-21 - [c18]Yuxi Ling, Yun Hao, Yuyan Wang, Kailong Wang, Guangdong Bai, Jin Song Dong:
Essential or Excessive? MINDAEXT: Measuring Data Minimization Practices among Browser Extensions. SANER 2024: 964-975 - [c17]Liuhuo Wan, Kailong Wang, Haoyu Wang, Guangdong Bai:
Is It Safe to Share Your Files? An Empirical Security Analysis of Google Workspace. WWW 2024: 1892-1901 - [c16]Liuhuo Wan, Kailong Wang, Kulani Mahadewa, Haoyu Wang, Guangdong Bai:
Don't Bite Off More than You Can Chew: Investigating Excessive Permission Requests in Trigger-Action Integrations. WWW 2024: 3106-3116 - [i28]Haodong Li, Gelei Deng, Yi Liu, Kailong Wang, Yuekang Li, Tianwei Zhang, Yang Liu, Guoai Xu, Guosheng Xu, Haoyu Wang:
Digger: Detecting Copyright Content Mis-usage in Large Language Model Training. CoRR abs/2401.00676 (2024) - [i27]Jiayi Hua, Kailong Wang, Meizhen Wang, Guangdong Bai, Xiapu Luo, Haoyu Wang:
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack. CoRR abs/2401.02659 (2024) - [i26]Baijun Cheng, Shengming Zhao, Kailong Wang, Meizhen Wang, Guangdong Bai, Ruitao Feng, Yao Guo, Lei Ma, Haoyu Wang:
Beyond Fidelity: Explaining Vulnerability Localization of Learning-based Detectors. CoRR abs/2401.02686 (2024) - [i25]Baijun Cheng, Kailong Wang, Cuiyun Gao, Xiapu Luo, Li Li, Yao Guo, Xiangqun Chen, Haoyu Wang:
The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors. CoRR abs/2401.02737 (2024) - [i24]Shenao Wang, Yuekang Li, Kailong Wang, Yi Liu, Hui Li, Yang Liu, Haoyu Wang:
MiniScope: Automated UI Exploration and Privacy Inconsistency Detection of MiniApps via Two-phase Iterative Hybrid Analysis. CoRR abs/2401.03218 (2024) - [i23]Pengcheng Xia, Zhou Yu, Kailong Wang, Kai Ma, Shuo Chen, Xiapu Luo, Yajin Zhou, Lei Wu, Guangdong Bai, Haoyu Wang:
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web. CoRR abs/2401.04662 (2024) - [i22]Gelei Deng, Yi Liu, Kailong Wang, Yuekang Li, Tianwei Zhang, Yang Liu:
Pandora: Jailbreak GPTs by Retrieval Augmented Generation Poisoning. CoRR abs/2402.08416 (2024) - [i21]Guanyu Wang, Yuekang Li, Yi Liu, Gelei Deng, Tianlin Li, Guosheng Xu, Yang Liu, Haoyu Wang, Kailong Wang:
MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation. CoRR abs/2402.14480 (2024) - [i20]Yuxi Li, Yi Liu, Gelei Deng, Ying Zhang, Wenjia Song, Ling Shi, Kailong Wang, Yuekang Li, Yang Liu, Haoyu Wang:
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection. CoRR abs/2404.09894 (2024) - [i19]Ningke Li, Yuekang Li, Yi Liu, Ling Shi, Kailong Wang, Haoyu Wang:
HalluVault: A Novel Logic Programming-aided Metamorphic Testing Framework for Detecting Fact-Conflicting Hallucinations in Large Language Models. CoRR abs/2405.00648 (2024) - [i18]Pengcheng Xia, Yanhui Guo, Zhaowen Lin, Jun Wu, Pengbo Duan, Ningyu He, Kailong Wang, Tianming Liu, Yinliang Yue, Guoai Xu, Haoyu Wang:
WALLETRADAR: Towards Automating the Detection of Vulnerabilities in Browser-based Cryptocurrency Wallets. CoRR abs/2405.04332 (2024) - [i17]Hanxiang Xu, Shenao Wang, Ningke Li, Kailong Wang, Yanjie Zhao, Kai Chen, Ting Yu, Yang Liu, Haoyu Wang:
Large Language Models for Cyber Security: A Systematic Literature Review. CoRR abs/2405.04760 (2024) - [i16]Yuxi Li, Yi Liu, Yuekang Li, Ling Shi, Gelei Deng, Shengquan Chen, Kailong Wang:
Lockpicking LLMs: A Logit-Based Jailbreak Using Token-level Manipulation. CoRR abs/2405.13068 (2024) - [i15]Zihao Xu, Yi Liu, Gelei Deng, Kailong Wang, Yuekang Li, Ling Shi, Stjepan Picek:
Continuous Embedding Attacks via Clipped Inputs in Jailbreaking Large Language Models. CoRR abs/2407.13796 (2024) - [i14]Yi Liu, Guanyu Wang, Xinyi Zheng, Gelei Deng, Kailong Wang, Yang Liu, Haoyu Wang:
SPOLRE: Semantic Preserving Object Layout Reconstruction for Image Captioning System Testing. CoRR abs/2407.18512 (2024) - [i13]Shide Zhou, Tianlin Li, Yihao Huang, Ling Shi, Kailong Wang, Yang Liu, Haoyu Wang:
NeuSemSlice: Towards Effective DNN Model Maintenance via Neuron-level Semantic Slicing. CoRR abs/2407.20281 (2024) - [i12]Baijun Cheng, Ce Zhang, Kailong Wang, Ling Shi, Yang Liu, Haoyu Wang, Yao Guo, Xiangqun Chen:
Semantic-Enhanced Indirect Call Analysis with Large Language Models. CoRR abs/2408.04344 (2024) - [i11]Zhibo Zhang, Wuxia Bai, Yuxi Li, Mark Huasong Meng, Kailong Wang, Ling Shi, Li Li, Jun Wang, Haoyu Wang:
GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models. CoRR abs/2408.04905 (2024) - [i10]Shide Zhou, Tianlin Li, Kailong Wang, Yihao Huang, Ling Shi, Yang Liu, Haoyu Wang:
Investigating Coverage Criteria in Large Language Models: An In-Depth Study Through Jailbreak Attacks. CoRR abs/2408.15207 (2024) - [i9]Xinyi Zheng, Chen Wei, Shenao Wang, Yanjie Zhao, Peiming Gao, Yuanchao Zhang, Kailong Wang, Haoyu Wang:
Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments. CoRR abs/2409.09356 (2024) - [i8]Jian Zhao, Shenao Wang, Yanjie Zhao, Xinyi Hou, Kailong Wang, Peiming Gao, Yuanchao Zhang, Chen Wei, Haoyu Wang:
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs. CoRR abs/2409.09368 (2024) - [i7]Mark Huasong Meng, Chuan Yan, Yun Hao, Qing Zhang, Zeyu Wang, Kailong Wang, Sin Gee Teo, Guangdong Bai, Jin Song Dong:
A Large-Scale Privacy Assessment of Android Third-Party SDKs. CoRR abs/2409.10411 (2024) - [i6]Yuqing Nie, Chong Wang, Kailong Wang, Guoai Xu, Guosheng Xu, Haoyu Wang:
Decoding Secret Memorization in Code LLMs Through Token-Level Characterization. CoRR abs/2410.08858 (2024) - [i5]Fan Yang, Yihao Huang, Kailong Wang, Ling Shi, Geguang Pu, Yang Liu, Haoyu Wang:
Efficient and Effective Universal Adversarial Attack against Vision-Language Pre-training Models. CoRR abs/2410.11639 (2024) - 2023
- [c15]Xu Nie, Ningke Li, Kailong Wang, Shangguang Wang, Xiapu Luo, Haoyu Wang:
Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper). ISSTA 2023: 52-63 - [c14]Shi Meng, Liu Wang, Shenao Wang, Kailong Wang, Xusheng Xiao, Guangdong Bai, Haoyu Wang:
Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs. ASE 2023: 1403-1415 - [c13]Ningke Li, Shenao Wang, Mingxi Feng, Kailong Wang, Meizhen Wang, Haoyu Wang:
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains. ASE 2023: 1993-2005 - [c12]Mark Huasong Meng, Sin G. Teo, Guangdong Bai, Kailong Wang, Jin Song Dong:
Enhancing Federated Learning Robustness Using Data-Agnostic Model Pruning. PAKDD (2) 2023: 441-453 - [c11]Shenao Wang, Yanjie Zhao, Kailong Wang, Haoyu Wang:
On the Usage-scenario-based Data Minimization in Mini Programs. SaTS@CCS 2023: 29-32 - [c10]Kailong Wang, Yuxi Ling, Yanjun Zhang, Zhou Yu, Haoyu Wang, Guangdong Bai, Beng Chin Ooi, Jin Song Dong:
Characterizing Cryptocurrency-themed Malicious Browser Extensions. SIGMETRICS (Abstracts) 2023: 91-92 - [i4]Yi Liu, Gelei Deng, Yuekang Li, Kailong Wang, Tianwei Zhang, Yepang Liu, Haoyu Wang, Yan Zheng, Yang Liu:
Prompt Injection attack against LLM-integrated Applications. CoRR abs/2306.05499 (2023) - [i3]Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu:
Jailbreaker: Automated Jailbreak Across Multiple Large Language Model Chatbots. CoRR abs/2307.08715 (2023) - [i2]Xinyi Hou, Yanjie Zhao, Yue Liu, Zhou Yang, Kailong Wang, Li Li, Xiapu Luo, David Lo, John C. Grundy, Haoyu Wang:
Large Language Models for Software Engineering: A Systematic Literature Review. CoRR abs/2308.10620 (2023) - [i1]Yan Xiao, Xinyue Zuo, Lei Xue, Kailong Wang, Jin Song Dong, Ivan Beschastnikh:
Empirical Study on Transformer-based Techniques for Software Engineering. CoRR abs/2310.00399 (2023) - 2022
- [c9]Yuxi Ling, Kailong Wang, Guangdong Bai, Haoyu Wang, Jin Song Dong:
Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions. ASE 2022: 10:1-10:12 - [c8]Kailong Wang, Yuwei Zheng, Qing Zhang, Guangdong Bai, Mingchuang Qin, Donghui Zhang, Jin Song Dong:
Assessing certificate validation user interfaces of WPA supplicants. MobiCom 2022: 501-513 - [c7]Kailong Wang, Cong Shi, Jerry Cheng, Yan Wang, Minge Xie, Yingying Chen:
Solving the WiFi Sensing Dilemma in Reality Leveraging Conformal Prediction. SenSys 2022: 407-420 - 2021
- [j5]Kailong Wang, Yuxi Ling, Yanjun Zhang, Zhou Yu, Haoyu Wang, Guangdong Bai, Beng Chin Ooi, Jin Song Dong:
Characterizing Cryptocurrency-themed Malicious Browser Extensions. Proc. ACM Meas. Anal. Comput. Syst. 6(3): 43:1-43:31 (2021) - [j4]Kulani Mahadewa, Kailong Wang, Guangdong Bai, Ling Shi, Yan Liu, Jin Song Dong, Zhenkai Liang:
Scrutinizing Implementations of Smart Home Integrations. IEEE Trans. Software Eng. 47(12): 2667-2683 (2021) - [c6]Kailong Wang, Junzhe Zhang, Guangdong Bai, Ryan K. L. Ko, Jin Song Dong:
It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts. WWW 2021: 2142-2153 - 2020
- [j3]Jing Lin, Peng Yang, Kailong Wang, Xuemei Jiang, Yongxiang Zhao, Dongming Lu, Wei Gan, Wenyan Liao, Qiaoming Mo, Zhenbao Gan, Zhangsong Nong, Mingchen Ma, Fengshi He, Jun Pang, Hongliang Tang:
Cloud Computing-Assisted Dose Verification System and Method for Tumor Pain Treatment. IEEE Access 8: 122529-122538 (2020) - [c5]Kailong Wang, Huixia Li, Hang Guo:
Research on Positioning Accuracy of Indoor and Outdoor Pedestrian Seamless Navigation. ICMTEL (2) 2020: 355-367
2010 – 2019
- 2018
- [c4]Kulani Tharaka Mahadewa, Kailong Wang, Guangdong Bai, Ling Shi, Jin Song Dong, Zhenkai Liang:
HOMESCAN: Scrutinizing Implementations of Smart Home Integrations. ICECCS 2018: 21-30 - [c3]Kailong Wang:
Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols. ICFEM 2018: 441-445 - 2017
- [c2]Kailong Wang, Guangdong Bai, Naipeng Dong, Jin Song Dong:
A Framework for Formal Analysis of Privacy on SSO Protocols. SecureComm 2017: 763-777 - 2016
- [j2]Jianchun Jiang, Kailong Wang, Yanmei Jing:
A parallel middleware framework for vehicular network applications. Int. J. High Perform. Syst. Archit. 6(2): 82-97 (2016) - 2015
- [j1]Jianchun Jiang, Suhua Zeng, Yanmei Jing, Kailong Wang:
A lightweight middleware framework for vehicle networking application. Concurr. Comput. Pract. Exp. 27(17): 4914-4937 (2015) - [c1]Quanqi Ye, Guangdong Bai, Kailong Wang, Jin Song Dong:
Formal Analysis of a Single Sign-On Protocol Implementation for Android. ICECCS 2015: 90-99
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint