[go: up one dir, main page]

Follow
Wang Kailong
Wang Kailong
Verified email at hust.edu.cn - Homepage
Title
Cited by
Cited by
Year
Large Language Models for Software Engineering: A Systematic Literature Review
X Hou, Y Zhao, Y Liu, Z Yang, K Wang, L Li, X Luo, D Lo, J Grundy, ...
TOSEM 2024, 2024
1561*2024
Prompt injection attack against llm-integrated applications
Y Liu, G Deng, Y Li, K Wang, Z Wang, X Wang, T Zhang, Y Liu, H Wang, ...
arXiv preprint arXiv:2306.05499, 2023
6812023
Jailbreaking ChatGPT via Prompt Engineering: An Empirical Study
Y Liu, G Deng, Z Xu, Y Li, Y Zheng, Y Zhang, L Zhao, T Zhang, K Wang, ...
FSE 2024-SEA4DQ Workshop, 2023
6762023
MASTERKEY: Automated jailbreaking of large language model chatbots
G Deng, Y Liu, Y Li, K Wang, Y Zhang, Z Li, H Wang, T Zhang, Y Liu
NDSS 2024, 2024
528*2024
Large language models for cyber security: A systematic literature review
HX Xu, SA Wang, N Li, K Wang, Y Zhao, K Chen, T Yu, Y Liu, HY Wang
TOSEM, 2025
1902025
Pandora: Jailbreak GPTs by Retrieval Augmented Generation Poisoning
G Deng, Y Liu, K Wang, Y Li, T Zhang, Y Liu
2024 NDSS- AISCC, 2024
722024
A hitchhiker’s guide to jailbreaking chatgpt via prompt engineering
Y Liu, G Deng, Z Xu, Y Li, Y Zheng, Y Zhang, L Zhao, T Zhang, K Wang
Proceedings of the 4th International Workshop on Software Engineering and AI …, 2024
442024
Digger: Detecting copyright content mis-usage in large language model training
H Li, G Deng, Y Liu, K Wang, Y Li, T Zhang, Y Liu, G Xu, G Xu, H Wang
arXiv preprint arXiv:2401.00676, 2024
422024
Drowzee: Metamorphic testing for fact-conflicting hallucination detection in large language models
N Li, Y Li, Y Liu, L Shi, K Wang, H Wang
Proceedings of the ACM on Programming Languages 8 (OOPSLA2), 1843-1872, 2024
38*2024
It’s not just the site, it’s the contents: intra-domain fingerprinting social media websites through CDN bursts
K Wang, J Zhang, G Bai, R Ko, JS Dong
Proceedings of the Web Conference 2021, 2142-2153, 2021
382021
Understanding and tackling label errors in deep learning-based vulnerability detection
X Nie, N Li, K Wang, S Wang, X Luo, H Wang
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
332023
The Fusion of Large Language Models and Formal Methods for Trustworthy AI Agents: A Roadmap
Y Zhang, Y Cai, X Zuo, X Luan, K Wang, Z Hou, Y Zhang, Z Wei, M Sun, ...
International Conference on Machine Learning (ICML), 2025
312025
Formal analysis of a single sign-on protocol implementation for android
Q Ye, G Bai, K Wang, JS Dong
2015 20th International Conference on Engineering of Complex Computer …, 2015
312015
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection
Y Li, Y Liu, G Deng, Y Zhang, W Song, L Shi, K Wang, Y Li, Y Liu, H Wang
2024 The ACM International Conference on the Foundations of Software …, 2024
292024
Are they toeing the line? diagnosing privacy compliance violations among browser extensions
Y Ling, K Wang, G Bai, H Wang, JS Dong
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
292022
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs
J Zhao, S Wang, Y Zhao, X Hou, K Wang, P Gao, Y Zhang, C Wei, ...
39th IEEE/ACM International Conference on Automated Software Engineering …, 2024
252024
Large Language Models are overconfident and amplify human bias
F Sun, N Li, K Wang, L Goette
arXiv preprint arXiv:2505.02151, 2025
212025
MalWuKong: Towards fast, accurate, and multilingual detection of malicious code poisoning in OSS supply chains
N Li, S Wang, M Feng, K Wang, M Wang, H Wang
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
192023
Lockpicking llms: A logit-based jailbreak using token-level manipulation
Y Li, Y Liu, Y Li, L Shi, G Deng, S Chen, K Wang
arXiv preprint arXiv:2405.13068, 2024
182024
Assessing certificate validation user interfaces of WPA supplicants
K Wang, Y Zheng, Q Zhang, G Bai, M Qin, D Zhang, JS Dong
Proceedings of the 28th Annual International Conference on Mobile Computing …, 2022
172022
The system can't perform the operation now. Try again later.
Articles 1–20