Geng Hong

Orcid: 0000-0003-1811-9432

According to our database1, Geng Hong authored at least 19 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
PRISON: Unmasking the Criminal Potential of Large Language Models.
CoRR, June, 2025

ReasoningShield: Content Safety Detection over Reasoning Traces of Large Reasoning Models.
CoRR, May, 2025

OpenDeception: Benchmarking and Investigating AI Deceptive Behaviors via Open-ended Interaction Simulation.
CoRR, April, 2025

The Illusionist's Prompt: Exposing the Factual Vulnerabilities of Large Language Models with Linguistic Nuances.
CoRR, April, 2025

You Can't Eat Your Cake and Have It Too: The Performance Degradation of LLMs with Jailbreak Defense.
Proceedings of the ACM on Web Conference 2025, 2025

Misdirection of Trust: Demystifying the Abuse of Dedicated URL Shortening Service.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

Revealing the Black Box of Device Search Engine: Scanning Assets, Strategies, and Ethical Consideration.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

Exposing the Hidden Layer: Software Repositories in the Service of Seo Manipulation.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025

2024
Underground Application Collection Method Based on Spiking Traffic Analysis.
Int. J. Softw. Informatics, 2024

RAG-Thief: Scalable Extraction of Private Data from Retrieval-Augmented Generation Applications with Agent-based Attacks.
CoRR, 2024

Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets.
Proceedings of the ACM on Web Conference 2024, 2024

2023
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Understanding and Detecting Abused Image Hosting Modules as Malicious Services.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Revealing and Analyzing the Visual Scams of Cryptocurrency Wallets.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

2022
Analyzing Ground-Truth Data of Mobile Gambling Scams.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2020
How Android developers handle evolution-induced API compatibility issues: a large-scale study.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2018
Invetter: Locating Insecure Input Validations in Android Services.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018


  Loading...