Kailong Wang

Orcid: 0000-0002-3415-0790

According to our database1, Kailong Wang authored at least 55 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors.
ACM Trans. Softw. Eng. Methodol., June, 2024

WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets.
Autom. Softw. Eng., June, 2024

Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection.
Proc. ACM Softw. Eng., 2024

Drowzee: Metamorphic Testing for Fact-Conflicting Hallucination Detection in Large Language Models.
Proc. ACM Program. Lang., 2024

Efficient and Effective Universal Adversarial Attack against Vision-Language Pre-training Models.
CoRR, 2024

Decoding Secret Memorization in Code LLMs Through Token-Level Characterization.
CoRR, 2024

A Large-Scale Privacy Assessment of Android Third-Party SDKs.
CoRR, 2024

Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs.
CoRR, 2024

Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments.
CoRR, 2024

Investigating Coverage Criteria in Large Language Models: An In-Depth Study Through Jailbreak Attacks.
CoRR, 2024

GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models.
CoRR, 2024

Semantic-Enhanced Indirect Call Analysis with Large Language Models.
CoRR, 2024

NeuSemSlice: Towards Effective DNN Model Maintenance via Neuron-level Semantic Slicing.
CoRR, 2024

SPOLRE: Semantic Preserving Object Layout Reconstruction for Image Captioning System Testing.
CoRR, 2024

Continuous Embedding Attacks via Clipped Inputs in Jailbreaking Large Language Models.
CoRR, 2024

Lockpicking LLMs: A Logit-Based Jailbreak Using Token-level Manipulation.
CoRR, 2024

Large Language Models for Cyber Security: A Systematic Literature Review.
CoRR, 2024

HalluVault: A Novel Logic Programming-aided Metamorphic Testing Framework for Detecting Fact-Conflicting Hallucinations in Large Language Models.
CoRR, 2024

Pandora: Jailbreak GPTs by Retrieval Augmented Generation Poisoning.
CoRR, 2024

The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web.
CoRR, 2024

MiniScope: Automated UI Exploration and Privacy Inconsistency Detection of MiniApps via Two-phase Iterative Hybrid Analysis.
CoRR, 2024

The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors.
CoRR, 2024

MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack.
CoRR, 2024

Digger: Detecting Copyright Content Mis-usage in Large Language Model Training.
CoRR, 2024

Is It Safe to Share Your Files? An Empirical Security Analysis of Google Workspace.
Proceedings of the ACM on Web Conference 2024, 2024

Don't Bite Off More than You Can Chew: Investigating Excessive Permission Requests in Trigger-Action Integrations.
Proceedings of the ACM on Web Conference 2024, 2024

Essential or Excessive? MINDAEXT: Measuring Data Minimization Practices among Browser Extensions.
Proceedings of the IEEE International Conference on Software Analysis, 2024

A Hitchhiker's Guide to Jailbreaking ChatGPT via Prompt Engineering.
Proceedings of the 4th International Workshop on Software Engineering and AI for Data Quality in Cyber-Physical Systems/Internet of Things, 2024

MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Analyzing Excessive Permission Requests in Google Workspace Add-Ons.
Proceedings of the Engineering of Complex Computer Systems - 28th International Conference, 2024

SC-WGAN: GAN-Based Oversampling Method for Network Intrusion Detection.
Proceedings of the Engineering of Complex Computer Systems - 28th International Conference, 2024

MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation.
Proceedings of the 2024 IEEE/ACM First International Conference on AI Foundation Models and Software Engineering, 2024

2023
Empirical Study on Transformer-based Techniques for Software Engineering.
CoRR, 2023

Large Language Models for Software Engineering: A Systematic Literature Review.
CoRR, 2023

Jailbreaker: Automated Jailbreak Across Multiple Large Language Model Chatbots.
CoRR, 2023

Prompt Injection attack against LLM-integrated Applications.
CoRR, 2023

On the Usage-scenario-based Data Minimization in Mini Programs.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

Enhancing Federated Learning Robustness Using Data-Agnostic Model Pruning.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper).
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
Solving the WiFi Sensing Dilemma in Reality Leveraging Conformal Prediction.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

Assessing certificate validation user interfaces of WPA supplicants.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

2021
Scrutinizing Implementations of Smart Home Integrations.
IEEE Trans. Software Eng., 2021

Characterizing Cryptocurrency-themed Malicious Browser Extensions.
Proc. ACM Meas. Anal. Comput. Syst., 2021

It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts.
Proceedings of the WWW '21: The Web Conference 2021, 2021

2020
Cloud Computing-Assisted Dose Verification System and Method for Tumor Pain Treatment.
IEEE Access, 2020

Research on Positioning Accuracy of Indoor and Outdoor Pedestrian Seamless Navigation.
Proceedings of the Multimedia Technology and Enhanced Learning, 2020

2018
Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols.
Proceedings of the Formal Methods and Software Engineering, 2018

HOMESCAN: Scrutinizing Implementations of Smart Home Integrations.
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018

2017
A Framework for Formal Analysis of Privacy on SSO Protocols.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
A parallel middleware framework for vehicular network applications.
Int. J. High Perform. Syst. Archit., 2016

2015
A lightweight middleware framework for vehicle networking application.
Concurr. Comput. Pract. Exp., 2015

Formal Analysis of a Single Sign-On Protocol Implementation for Android.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015


  Loading...