Geng Hong
Orcid: 0000-0003-1811-9432
According to our database1,
Geng Hong
authored at least 19 papers
between 2018 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
ReasoningShield: Content Safety Detection over Reasoning Traces of Large Reasoning Models.
CoRR, May, 2025
OpenDeception: Benchmarking and Investigating AI Deceptive Behaviors via Open-ended Interaction Simulation.
CoRR, April, 2025
The Illusionist's Prompt: Exposing the Factual Vulnerabilities of Large Language Models with Linguistic Nuances.
CoRR, April, 2025
You Can't Eat Your Cake and Have It Too: The Performance Degradation of LLMs with Jailbreak Defense.
Proceedings of the ACM on Web Conference 2025, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Revealing the Black Box of Device Search Engine: Scanning Assets, Strategies, and Ethical Consideration.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025
2024
Int. J. Softw. Informatics, 2024
RAG-Thief: Scalable Extraction of Private Data from Retrieval-Augmented Generation Applications with Agent-based Attacks.
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
2020
How Android developers handle evolution-induced API compatibility issues: a large-scale study.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018