Using deep learning to solve computer security challenges: a survey YH Choi, P Liu, Z Shang, H Wang, Z Wang, L Zhang, J Zhou, Q Zou Cybersecurity 3 (1), 1-32, 2020 | 52 | 2020 |
To detect stack buffer overflow with polymorphic canaries Z Wang, X Ding, C Pang, J Guo, J Zhu, B Mao 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018 | 28 | 2018 |
ROPOB: Obfuscating Binary Code via Return Oriented Programming D Mu, J Guo, W Ding, Z Wang, B Mao, L Shi International Conference on Security and Privacy in Communication Systems …, 2017 | 18 | 2017 |
HART: Hardware-Assisted Kernel Module Tracing on Arm Y Du, Z Ning, J Xu, Z Wang, YH Lin, F Zhang, X Xing, B Mao European Symposium on Research in Computer Security, 316-337, 2020 | 14 | 2020 |
The Effectiveness of Large Language Models (Chatgpt and Codebert) for Security-Oriented Code Analysis Z Wang, L Zhang, C Cao, P Liu Available at SSRN 4567887, 0 | 10* | |
Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model Z Wang, H Wang, H Hu, P Liu arXiv preprint arXiv:2108.12071, 2021 | 7 | 2021 |
Spotting Silent Buffer Overflows in Execution Trace through Graph Neural Network Assisted Data Flow Analysis Z Wang, L Yu, S Wang, P Liu arXiv preprint arXiv:2102.10452, 2021 | 7 | 2021 |
Diffguard: Obscuring sensitive information in canary based protections J Zhu, W Zhou, Z Wang, D Mu, B Mao Security and Privacy in Communication Networks: 13th International …, 2018 | 7 | 2018 |
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity Z Wang, P Liu Cybersecurity 4 (1), 1-9, 2021 | 2 | 2021 |
Hide Your Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Neural Carrier Articles Z Wang, H Wang, N Luo, L Zhang, X Sun, Y Cao, P Liu arXiv preprint arXiv:2408.11182, 2024 | 1* | 2024 |
Which Features are Learned by CodeBert: An Empirical Study of the BERT-based Source Code Representation Learning L Zhang, C Cao, Z Wang, P Liu arXiv preprint arXiv:2301.08427v2, 2023 | 1 | 2023 |
A hybrid LLM workflow can help identify user privilege related variables in programs of any size H Wang, Z Wang, P Liu arXiv preprint arXiv:2403.15723, 2024 | | 2024 |
AI for Cybersecurity: A Handbook of Use Case LZ Nanqing Luo, Qingtian Zou, Peng Liu, Tao Liu, Nanqing Luo, Zitong Shang ... https://psucybersecuritylab.github.io/book.pdf, 96, 2022 | | 2022 |
基于多态 Canary 的栈保护技术研究 王之隆 南京大学, 2019 | | 2019 |