Остановите войну!
for scientists:
default search action
Kailong Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Pengcheng Xia, Yanhui Guo, Zhaowen Lin, Jun Wu, Pengbo Duan, Ningyu He, Kailong Wang, Tianming Liu, Yinliang Yue, Guoai Xu, Haoyu Wang:
WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets. Autom. Softw. Eng. 31(1): 32 (2024) - [j6]Baijun Cheng, Shengming Zhao, Kailong Wang, Meizhen Wang, Guangdong Bai, Ruitao Feng, Yao Guo, Lei Ma, Haoyu Wang:
Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors. ACM Trans. Softw. Eng. Methodol. 33(5): 127:1-127:33 (2024) - [c18]Guanyu Wang, Yuekang Li, Yi Liu, Gelei Deng, Tianlin Li, Guosheng Xu, Yang Liu, Haoyu Wang, Kailong Wang:
MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation. FORGE 2024: 12-23 - [c17]Liuhuo Wan, Kailong Wang, Haoyu Wang, Guangdong Bai:
Is It Safe to Share Your Files? An Empirical Security Analysis of Google Workspace. WWW 2024: 1892-1901 - [c16]Liuhuo Wan, Kailong Wang, Kulani Mahadewa, Haoyu Wang, Guangdong Bai:
Don't Bite Off More than You Can Chew: Investigating Excessive Permission Requests in Trigger-Action Integrations. WWW 2024: 3106-3116 - [i17]Haodong Li, Gelei Deng, Yi Liu, Kailong Wang, Yuekang Li, Tianwei Zhang, Yang Liu, Guoai Xu, Guosheng Xu, Haoyu Wang:
Digger: Detecting Copyright Content Mis-usage in Large Language Model Training. CoRR abs/2401.00676 (2024) - [i16]Jiayi Hua, Kailong Wang, Meizhen Wang, Guangdong Bai, Xiapu Luo, Haoyu Wang:
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack. CoRR abs/2401.02659 (2024) - [i15]Baijun Cheng, Shengming Zhao, Kailong Wang, Meizhen Wang, Guangdong Bai, Ruitao Feng, Yao Guo, Lei Ma, Haoyu Wang:
Beyond Fidelity: Explaining Vulnerability Localization of Learning-based Detectors. CoRR abs/2401.02686 (2024) - [i14]Baijun Cheng, Kailong Wang, Cuiyun Gao, Xiapu Luo, Yulei Sui, Li Li, Yao Guo, Xiangqun Chen, Haoyu Wang:
The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors. CoRR abs/2401.02737 (2024) - [i13]Shenao Wang, Yuekang Li, Kailong Wang, Yi Liu, Hui Li, Yang Liu, Haoyu Wang:
MiniScope: Automated UI Exploration and Privacy Inconsistency Detection of MiniApps via Two-phase Iterative Hybrid Analysis. CoRR abs/2401.03218 (2024) - [i12]Pengcheng Xia, Zhou Yu, Kailong Wang, Kai Ma, Shuo Chen, Xiapu Luo, Yajin Zhou, Lei Wu, Guangdong Bai, Haoyu Wang:
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web. CoRR abs/2401.04662 (2024) - [i11]Gelei Deng, Yi Liu, Kailong Wang, Yuekang Li, Tianwei Zhang, Yang Liu:
Pandora: Jailbreak GPTs by Retrieval Augmented Generation Poisoning. CoRR abs/2402.08416 (2024) - [i10]Guanyu Wang, Yuekang Li, Yi Liu, Gelei Deng, Tianlin Li, Guosheng Xu, Yang Liu, Haoyu Wang, Kailong Wang:
MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation. CoRR abs/2402.14480 (2024) - [i9]Yuxi Li, Yi Liu, Gelei Deng, Ying Zhang, Wenjia Song, Ling Shi, Kailong Wang, Yuekang Li, Yang Liu, Haoyu Wang:
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection. CoRR abs/2404.09894 (2024) - [i8]Ningke Li, Yuekang Li, Yi Liu, Ling Shi, Kailong Wang, Haoyu Wang:
HalluVault: A Novel Logic Programming-aided Metamorphic Testing Framework for Detecting Fact-Conflicting Hallucinations in Large Language Models. CoRR abs/2405.00648 (2024) - [i7]Pengcheng Xia, Yanhui Guo, Zhaowen Lin, Jun Wu, Pengbo Duan, Ningyu He, Kailong Wang, Tianming Liu, Yinliang Yue, Guoai Xu, Haoyu Wang:
WALLETRADAR: Towards Automating the Detection of Vulnerabilities in Browser-based Cryptocurrency Wallets. CoRR abs/2405.04332 (2024) - [i6]Hanxiang Xu, Shenao Wang, Ningke Li, Kailong Wang, Yanjie Zhao, Kai Chen, Ting Yu, Yang Liu, Haoyu Wang:
Large Language Models for Cyber Security: A Systematic Literature Review. CoRR abs/2405.04760 (2024) - [i5]Yuxi Li, Yi Liu, Yuekang Li, Ling Shi, Gelei Deng, Shengquan Chen, Kailong Wang:
Lockpicking LLMs: A Logit-Based Jailbreak Using Token-level Manipulation. CoRR abs/2405.13068 (2024) - 2023
- [c15]Xu Nie, Ningke Li, Kailong Wang, Shangguang Wang, Xiapu Luo, Haoyu Wang:
Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper). ISSTA 2023: 52-63 - [c14]Shi Meng, Liu Wang, Shenao Wang, Kailong Wang, Xusheng Xiao, Guangdong Bai, Haoyu Wang:
Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs. ASE 2023: 1403-1415 - [c13]Ningke Li, Shenao Wang, Mingxi Feng, Kailong Wang, Meizhen Wang, Haoyu Wang:
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains. ASE 2023: 1993-2005 - [c12]Mark Huasong Meng, Sin G. Teo, Guangdong Bai, Kailong Wang, Jin Song Dong:
Enhancing Federated Learning Robustness Using Data-Agnostic Model Pruning. PAKDD (2) 2023: 441-453 - [c11]Shenao Wang, Yanjie Zhao, Kailong Wang, Haoyu Wang:
On the Usage-scenario-based Data Minimization in Mini Programs. SaTS@CCS 2023: 29-32 - [c10]Kailong Wang, Yuxi Ling, Yanjun Zhang, Zhou Yu, Haoyu Wang, Guangdong Bai, Beng Chin Ooi, Jin Song Dong:
Characterizing Cryptocurrency-themed Malicious Browser Extensions. SIGMETRICS (Abstracts) 2023: 91-92 - [i4]Yi Liu, Gelei Deng, Yuekang Li, Kailong Wang, Tianwei Zhang, Yepang Liu, Haoyu Wang, Yan Zheng, Yang Liu:
Prompt Injection attack against LLM-integrated Applications. CoRR abs/2306.05499 (2023) - [i3]Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu:
Jailbreaker: Automated Jailbreak Across Multiple Large Language Model Chatbots. CoRR abs/2307.08715 (2023) - [i2]Xinyi Hou, Yanjie Zhao, Yue Liu, Zhou Yang, Kailong Wang, Li Li, Xiapu Luo, David Lo, John C. Grundy, Haoyu Wang:
Large Language Models for Software Engineering: A Systematic Literature Review. CoRR abs/2308.10620 (2023) - [i1]Yan Xiao, Xinyue Zuo, Lei Xue, Kailong Wang, Jin Song Dong, Ivan Beschastnikh:
Empirical Study on Transformer-based Techniques for Software Engineering. CoRR abs/2310.00399 (2023) - 2022
- [c9]Yuxi Ling, Kailong Wang, Guangdong Bai, Haoyu Wang, Jin Song Dong:
Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions. ASE 2022: 10:1-10:12 - [c8]Kailong Wang, Yuwei Zheng, Qing Zhang, Guangdong Bai, Mingchuang Qin, Donghui Zhang, Jin Song Dong:
Assessing certificate validation user interfaces of WPA supplicants. MobiCom 2022: 501-513 - [c7]Kailong Wang, Cong Shi, Jerry Cheng, Yan Wang, Minge Xie, Yingying Chen:
Solving the WiFi Sensing Dilemma in Reality Leveraging Conformal Prediction. SenSys 2022: 407-420 - 2021
- [j5]Kailong Wang, Yuxi Ling, Yanjun Zhang, Zhou Yu, Haoyu Wang, Guangdong Bai, Beng Chin Ooi, Jin Song Dong:
Characterizing Cryptocurrency-themed Malicious Browser Extensions. Proc. ACM Meas. Anal. Comput. Syst. 6(3): 43:1-43:31 (2021) - [j4]Kulani Mahadewa, Kailong Wang, Guangdong Bai, Ling Shi, Yan Liu, Jin Song Dong, Zhenkai Liang:
Scrutinizing Implementations of Smart Home Integrations. IEEE Trans. Software Eng. 47(12): 2667-2683 (2021) - [c6]Kailong Wang, Junzhe Zhang, Guangdong Bai, Ryan K. L. Ko, Jin Song Dong:
It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts. WWW 2021: 2142-2153 - 2020
- [j3]Jing Lin, Peng Yang, Kailong Wang, Xuemei Jiang, Yongxiang Zhao, Dongming Lu, Wei Gan, Wenyan Liao, Qiaoming Mo, Zhenbao Gan, Zhangsong Nong, Mingchen Ma, Fengshi He, Jun Pang, Hongliang Tang:
Cloud Computing-Assisted Dose Verification System and Method for Tumor Pain Treatment. IEEE Access 8: 122529-122538 (2020) - [c5]Kailong Wang, Huixia Li, Hang Guo:
Research on Positioning Accuracy of Indoor and Outdoor Pedestrian Seamless Navigation. ICMTEL (2) 2020: 355-367
2010 – 2019
- 2018
- [c4]Kulani Tharaka Mahadewa, Kailong Wang, Guangdong Bai, Ling Shi, Jin Song Dong, Zhenkai Liang:
HOMESCAN: Scrutinizing Implementations of Smart Home Integrations. ICECCS 2018: 21-30 - [c3]Kailong Wang:
Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols. ICFEM 2018: 441-445 - 2017
- [c2]Kailong Wang, Guangdong Bai, Naipeng Dong, Jin Song Dong:
A Framework for Formal Analysis of Privacy on SSO Protocols. SecureComm 2017: 763-777 - 2016
- [j2]Jianchun Jiang, Kailong Wang, Yanmei Jing:
A parallel middleware framework for vehicular network applications. Int. J. High Perform. Syst. Archit. 6(2): 82-97 (2016) - 2015
- [j1]Jianchun Jiang, Suhua Zeng, Yanmei Jing, Kailong Wang:
A lightweight middleware framework for vehicle networking application. Concurr. Comput. Pract. Exp. 27(17): 4914-4937 (2015) - [c1]Quanqi Ye, Guangdong Bai, Kailong Wang, Jin Song Dong:
Formal Analysis of a Single Sign-On Protocol Implementation for Android. ICECCS 2015: 90-99
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-25 00:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint