Zhilong Wang

Orcid: 0000-0003-1360-0745

According to our database1, Zhilong Wang authored at least 34 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Hidden You Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Logic Chain Injection.
CoRR, 2024

A hybrid LLM workflow can help identify user privilege related variables in programs of any size.
CoRR, 2024

Knowledge-Reuse Transfer Learning Methods in Molecular and Material Science.
CoRR, 2024

2023
An ensemble belief rule base model for pathologic complete response prediction in gastric cancer.
Expert Syst. Appl., December, 2023

Machine-learning-assisted rational design of 2D doped tellurene for fin field-effect transistor devices.
Patterns, April, 2023

A deep transfer learning-based protocol accelerates full quantum mechanics calculation of protein.
Briefings Bioinform., January, 2023

ChatGPT for Software Security: Exploring the Strengths and Limitations of ChatGPT in the Security Applications.
CoRR, 2023

Which Features are Learned by CodeBert: An Empirical Study of the BERT-based Source Code Representation Learning.
CoRR, 2023

2022
Health status evaluation method of CNC machine tools based on grey clustering analysis and fuzzy comprehensive evaluation.
J. Intell. Fuzzy Syst., 2022

AutoBRB: An automated belief rule base model for pathologic complete response prediction in gastric cancer.
Comput. Biol. Medicine, 2022

Clustered tree regression to learn protein energy change with mutated amino acid.
Briefings Bioinform., 2022

An inductive transfer learning force field (ITLFF) protocol builds protein force fields in seconds.
Briefings Bioinform., 2022

Predicting treatment outcome in metastatic melanoma through automated multi-objective model with hyperparameter optimization.
Proceedings of the Medical Imaging 2022: Image-Guided Procedures, 2022

2021
Influence of Stokes number on the particle phase distribution behaviors in a rolling circulating fluidized beds (RCFB).
J. Vis., 2021

Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity.
Cybersecur., 2021

Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model.
CoRR, 2021

Spotting Silent Buffer Overflows in Execution Trace through Graph Neural Network Assisted Data Flow Analysis.
CoRR, 2021

Immunotherapy treatment outcome prediction in metastatic melanoma through an automated multi-objective delta-radiomics model.
Comput. Biol. Medicine, 2021

Machine learning builds full-QM precision protein force fields in seconds.
Briefings Bioinform., 2021

Potential inhibitors for the novel coronavirus (SARS-CoV-2).
Briefings Bioinform., 2021

2020
Evaluation of particle dispersion behaviours in Lithium-ion battery slurry by electrical impedance spectra-tomography method.
Trans. Inst. Meas. Control, 2020

Using deep learning to solve computer security challenges: a survey.
Cybersecur., 2020

HART: Hardware-Assisted Kernel Module Tracing on Arm.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Brain MRI imaging mechanism based on deep visual information perception and dementia degree induction.
Multim. Tools Appl., 2019

GPT Conjecture: Understanding the Trade-offs between Granularity, Performance and Timeliness in Control-Flow Integrity.
CoRR, 2019

2018
QRS Detection and Measurement Method of ECG Paper Based on Convolutional Neural Networks.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

To Detect Stack Buffer Overflow with Polymorphic Canaries.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
DiffGuard: Obscuring Sensitive Information in Canary Based Protections.
Proceedings of the Security and Privacy in Communication Networks, 2017

ROPOB: Obfuscating Binary Code via Return Oriented Programming.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
Comparison of Security Frameworks for Governmental Clouds between United States and European Union.
Proceedings of the 6th International Conference on Communication and Network Security, 2016

A New Secure Android Model Based on Privilege.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

2012
An optimizing method for bus-only signal based on Fuzzy Control.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2011
Key technologies of aerial photogrammetric drift angle automatic adjust-and-control system.
Proceedings of the IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2011

2009
A Rough Set Based PSO-BPNN Model for Air Pollution Forecasting.
Proceedings of the Fifth International Conference on Natural Computation, 2009


  Loading...