Follow
Zhilong Wang
Title
Cited by
Cited by
Year
Using deep learning to solve computer security challenges: a survey
YH Choi, P Liu, Z Shang, H Wang, Z Wang, L Zhang, J Zhou, Q Zou
Cybersecurity 3 (1), 1-32, 2020
512020
To detect stack buffer overflow with polymorphic canaries
Z Wang, X Ding, C Pang, J Guo, J Zhu, B Mao
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
282018
ROPOB: Obfuscating Binary Code via Return Oriented Programming
D Mu, J Guo, W Ding, Z Wang, B Mao, L Shi
International Conference on Security and Privacy in Communication Systems …, 2017
182017
HART: Hardware-Assisted Kernel Module Tracing on Arm
Y Du, Z Ning, J Xu, Z Wang, YH Lin, F Zhang, X Xing, B Mao
European Symposium on Research in Computer Security, 316-337, 2020
132020
The Effectiveness of Large Language Models (Chatgpt and Codebert) for Security-Oriented Code Analysis
Z Wang, L Zhang, C Cao, P Liu
Available at SSRN 4567887, 0
10*
Spotting Silent Buffer Overflows in Execution Trace through Graph Neural Network Assisted Data Flow Analysis
Z Wang, L Yu, S Wang, P Liu
arXiv preprint arXiv:2102.10452, 2021
72021
Diffguard: Obscuring sensitive information in canary based protections
J Zhu, W Zhou, Z Wang, D Mu, B Mao
Security and Privacy in Communication Networks: 13th International …, 2018
72018
Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model
Z Wang, H Wang, H Hu, P Liu
arXiv preprint arXiv:2108.12071, 2021
62021
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity
Z Wang, P Liu
Cybersecurity 4 (1), 1-9, 2021
22021
Hide Your Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Neural Carrier Articles
Z Wang, H Wang, N Luo, L Zhang, X Sun, Y Cao, P Liu
arXiv preprint arXiv:2408.11182, 2024
1*2024
Which Features are Learned by CodeBert: An Empirical Study of the BERT-based Source Code Representation Learning
L Zhang, C Cao, Z Wang, P Liu
arXiv preprint arXiv:2301.08427v2, 2023
12023
A hybrid LLM workflow can help identify user privilege related variables in programs of any size
H Wang, Z Wang, P Liu
arXiv preprint arXiv:2403.15723, 2024
2024
AI for Cybersecurity: A Handbook of Use Case
LZ Nanqing Luo, Qingtian Zou, Peng Liu, Tao Liu, Nanqing Luo, Zitong Shang ...
https://psucybersecuritylab.github.io/book.pdf, 96, 2022
2022
基于多态 Canary 的栈保护技术研究
王之隆
南京大学, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–14