Follow
Wang Kailong
Title
Cited by
Cited by
Year
Jailbreaking ChatGPT via Prompt Engineering: An Empirical Study
Y Liu, G Deng, Z Xu, Y Li, Y Zheng, Y Zhang, L Zhao, T Zhang, K Wang, ...
arXiv preprint arXiv:2305.13860, 2023
1442023
Large Language Models for Software Engineering: A Systematic Literature Review
X Hou, Y Zhao, Y Liu, Z Yang, K Wang, L Li, X Luo, D Lo, J Grundy, ...
arXiv preprint arXiv:2308.10620, 2023
112*2023
MASTERKEY: Automated jailbreaking of large language model chatbots
G Deng, Y Liu, Y Li, K Wang, Y Zhang, Z Li, H Wang, T Zhang, Y Liu
Proc. ISOC NDSS, 2024
90*2024
Prompt Injection attack against LLM-integrated Applications
Y Liu, G Deng, Y Li, K Wang, T Zhang, Y Liu, H Wang, Y Zheng, Y Liu
arXiv preprint arXiv:2306.05499, 2023
722023
It’s not just the site, it’s the contents: Intra-domain fingerprinting social media websites through cdn bursts
K Wang, J Zhang, G Bai, R Ko, JS Dong
Proceedings of the Web Conference 2021, 2142-2153, 2021
282021
Formal analysis of a single sign-on protocol implementation for android
Q Ye, G Bai, K Wang, JS Dong
2015 20th International Conference on Engineering of Complex Computer …, 2015
282015
HOMESCAN: Scrutinizing implementations of smart home integrations
KT Mahadewa, K Wang, G Bai, L Shi, JS Dong, Z Liang
2018 23rd International Conference on Engineering of Complex Computer …, 2018
122018
Are they toeing the line? diagnosing privacy compliance violations among browser extensions
Y Ling, K Wang, G Bai, H Wang, JS Dong
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
92022
Scrutinizing implementations of smart home integrations
K Mahadewa, K Wang, G Bai, L Shi, Y Liu, JS Dong, Z Liang
IEEE Transactions on Software Engineering 47 (12), 2667-2683, 2019
92019
A framework for formal analysis of privacy on SSO protocols
K Wang, G Bai, N Dong, JS Dong
Security and Privacy in Communication Networks: 13th International …, 2018
82018
Assessing certificate validation user interfaces of WPA supplicants
K Wang, Y Zheng, Q Zhang, G Bai, M Qin, D Zhang, JS Dong
Proceedings of the 28th Annual International Conference on Mobile Computing …, 2022
72022
Understanding and tackling label errors in deep learning-based vulnerability detection (experience paper)
X Nie, N Li, K Wang, S Wang, X Luo, H Wang
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
62023
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains
N Li, S Wang, M Feng, K Wang, M Wang, H Wang
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
32023
Wemint: Tainting Sensitive Data Leaks in WeChat Mini-Programs
S Meng, L Wang, S Wang, K Wang, X Xiao, G Bai, H Wang
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
22023
Characterizing cryptocurrency-themed malicious browser extensions
K Wang, Y Ling, Y Zhang, Z Yu, H Wang, G Bai, BC Ooi, JS Dong
Proceedings of the ACM on Measurement and Analysis of Computing Systems 6 (3 …, 2022
22022
Pandora: Jailbreak GPTs by Retrieval Augmented Generation Poisoning
G Deng, Y Liu, K Wang, Y Li, T Zhang, Y Liu
arXiv preprint arXiv:2402.08416, 2024
12024
The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors
B Cheng, K Wang, C Gao, X Luo, Y Sui, L Li, Y Guo, X Chen, H Wang
arXiv preprint arXiv:2401.02737, 2024
12024
Digger: Detecting Copyright Content Mis-usage in Large Language Model Training
H Li, G Deng, Y Liu, K Wang, Y Li, T Zhang, Y Liu, G Xu, G Xu, H Wang
arXiv preprint arXiv:2401.00676, 2024
12024
Empirical Study on Transformer-based Techniques for Software Engineering
Y Xiao, X Zuo, L Xue, K Wang, JS Dong, I Beschastnikh
arXiv preprint arXiv:2310.00399, 2023
12023
Enhancing Federated Learning Robustness Using Data-Agnostic Model Pruning
MH Meng, SG Teo, G Bai, K Wang, JS Dong
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 441-453, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20