关注
Zhilong Wang
Zhilong Wang
在 psu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Using deep learning to solve computer security challenges: a survey
YH Choi, P Liu, Z Shang, H Wang, Z Wang, L Zhang, J Zhou, Q Zou
Cybersecurity 3 (1), 1-32, 2020
452020
To detect stack buffer overflow with polymorphic canaries
Z Wang, X Ding, C Pang, J Guo, J Zhu, B Mao
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
272018
ROPOB: Obfuscating Binary Code via Return Oriented Programming
D Mu, J Guo, W Ding, Z Wang, B Mao, L Shi
International Conference on Security and Privacy in Communication Systems …, 2017
182017
HART: Hardware-Assisted Kernel Module Tracing on Arm
Y Du, Z Ning, J Xu, Z Wang, YH Lin, F Zhang, X Xing, B Mao
European Symposium on Research in Computer Security, 316-337, 2020
102020
Diffguard: Obscuring sensitive information in canary based protections
J Zhu, W Zhou, Z Wang, D Mu, B Mao
Security and Privacy in Communication Networks: 13th International …, 2018
72018
Spotting Silent Buffer Overflows in Execution Trace through Graph Neural Network Assisted Data Flow Analysis
Z Wang, L Yu, S Wang, P Liu
arXiv preprint arXiv:2102.10452, 2021
52021
The Effectiveness of Large Language Models (Chatgpt and Codebert) for Security-Oriented Code Analysis
Z Wang, L Zhang, C Cao, P Liu
Available at SSRN 4567887, 0
5*
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity
Z Wang, P Liu
Cybersecurity 4 (1), 1-9, 2021
3*2021
Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model
Z Wang, H Wang, H Hu, P Liu
arXiv preprint arXiv:2108.12071, 2021
32021
Which Features are Learned by CodeBert: An Empirical Study of the BERT-based Source Code Representation Learning
L Zhang, C Cao, Z Wang, P Liu
arXiv preprint arXiv:2301.08427v2, 2023
12023
Hidden You Malicious Goal Into Benigh Narratives: Jailbreak Large Language Models through Logic Chain Injection
Z Wang, Y Cao, P Liu
arXiv preprint arXiv:2404.04849, 2024
2024
A hybrid LLM workflow can help identify user privilege related variables in programs of any size
H Wang, Z Wang, P Liu
arXiv preprint arXiv:2403.15723, 2024
2024
AI for Cybersecurity: A Handbook of Use Case
LZ Nanqing Luo, Qingtian Zou, Peng Liu, Tao Liu, Nanqing Luo, Zitong Shang ...
https://psucybersecuritylab.github.io/book.pdf, 96, 2022
2022
基于多态 Canary 的栈保护技术研究
王之隆
南京大学, 2019
2019
系统目前无法执行此操作,请稍后再试。
文章 1–14