Kailong Wang
Orcid: 0000-0002-3415-0790
According to our database1,
Kailong Wang
authored at least 55 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ACM Trans. Softw. Eng. Methodol., June, 2024
WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets.
Autom. Softw. Eng., June, 2024
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection.
Proc. ACM Softw. Eng., 2024
Drowzee: Metamorphic Testing for Fact-Conflicting Hallucination Detection in Large Language Models.
Proc. ACM Program. Lang., 2024
Efficient and Effective Universal Adversarial Attack against Vision-Language Pre-training Models.
CoRR, 2024
CoRR, 2024
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs.
CoRR, 2024
Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments.
CoRR, 2024
Investigating Coverage Criteria in Large Language Models: An In-Depth Study Through Jailbreak Attacks.
CoRR, 2024
GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models.
CoRR, 2024
NeuSemSlice: Towards Effective DNN Model Maintenance via Neuron-level Semantic Slicing.
CoRR, 2024
SPOLRE: Semantic Preserving Object Layout Reconstruction for Image Captioning System Testing.
CoRR, 2024
Continuous Embedding Attacks via Clipped Inputs in Jailbreaking Large Language Models.
CoRR, 2024
HalluVault: A Novel Logic Programming-aided Metamorphic Testing Framework for Detecting Fact-Conflicting Hallucinations in Large Language Models.
CoRR, 2024
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web.
CoRR, 2024
MiniScope: Automated UI Exploration and Privacy Inconsistency Detection of MiniApps via Two-phase Iterative Hybrid Analysis.
CoRR, 2024
The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors.
CoRR, 2024
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack.
CoRR, 2024
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Don't Bite Off More than You Can Chew: Investigating Excessive Permission Requests in Trigger-Action Integrations.
Proceedings of the ACM on Web Conference 2024, 2024
Essential or Excessive? MINDAEXT: Measuring Data Minimization Practices among Browser Extensions.
Proceedings of the IEEE International Conference on Software Analysis, 2024
Proceedings of the 4th International Workshop on Software Engineering and AI for Data Quality in Cyber-Physical Systems/Internet of Things, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the Engineering of Complex Computer Systems - 28th International Conference, 2024
Proceedings of the Engineering of Complex Computer Systems - 28th International Conference, 2024
MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation.
Proceedings of the 2024 IEEE/ACM First International Conference on AI Foundation Models and Software Engineering, 2024
2023
CoRR, 2023
CoRR, 2023
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper).
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
2022
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
2021
IEEE Trans. Software Eng., 2021
Proc. ACM Meas. Anal. Comput. Syst., 2021
It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts.
Proceedings of the WWW '21: The Web Conference 2021, 2021
2020
Cloud Computing-Assisted Dose Verification System and Method for Tumor Pain Treatment.
IEEE Access, 2020
Research on Positioning Accuracy of Indoor and Outdoor Pedestrian Seamless Navigation.
Proceedings of the Multimedia Technology and Enhanced Learning, 2020
2018
Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols.
Proceedings of the Formal Methods and Software Engineering, 2018
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018
2017
Proceedings of the Security and Privacy in Communication Networks, 2017
2016
Int. J. High Perform. Syst. Archit., 2016
2015
Concurr. Comput. Pract. Exp., 2015
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015