Kailong Wang

Orcid: 0000-0002-3977-6573

According to our database1, Kailong Wang authored at least 32 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets.
Autom. Softw. Eng., June, 2024

MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation.
CoRR, 2024

Pandora: Jailbreak GPTs by Retrieval Augmented Generation Poisoning.
CoRR, 2024

The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web.
CoRR, 2024

MiniScope: Automated UI Exploration and Privacy Inconsistency Detection of MiniApps via Two-phase Iterative Hybrid Analysis.
CoRR, 2024

The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors.
CoRR, 2024

Beyond Fidelity: Explaining Vulnerability Localization of Learning-based Detectors.
CoRR, 2024

MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack.
CoRR, 2024

Digger: Detecting Copyright Content Mis-usage in Large Language Model Training.
CoRR, 2024

2023
Empirical Study on Transformer-based Techniques for Software Engineering.
CoRR, 2023

Large Language Models for Software Engineering: A Systematic Literature Review.
CoRR, 2023

Jailbreaker: Automated Jailbreak Across Multiple Large Language Model Chatbots.
CoRR, 2023

Prompt Injection attack against LLM-integrated Applications.
CoRR, 2023

On the Usage-scenario-based Data Minimization in Mini Programs.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

Enhancing Federated Learning Robustness Using Data-Agnostic Model Pruning.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper).
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
Solving the WiFi Sensing Dilemma in Reality Leveraging Conformal Prediction.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

Assessing certificate validation user interfaces of WPA supplicants.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

2021
Scrutinizing Implementations of Smart Home Integrations.
IEEE Trans. Software Eng., 2021

Characterizing Cryptocurrency-themed Malicious Browser Extensions.
Proc. ACM Meas. Anal. Comput. Syst., 2021

It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts.
Proceedings of the WWW '21: The Web Conference 2021, 2021

2020
Cloud Computing-Assisted Dose Verification System and Method for Tumor Pain Treatment.
IEEE Access, 2020

Research on Positioning Accuracy of Indoor and Outdoor Pedestrian Seamless Navigation.
Proceedings of the Multimedia Technology and Enhanced Learning, 2020

2018
Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols.
Proceedings of the Formal Methods and Software Engineering, 2018

HOMESCAN: Scrutinizing Implementations of Smart Home Integrations.
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018

2017
A Framework for Formal Analysis of Privacy on SSO Protocols.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
A parallel middleware framework for vehicular network applications.
Int. J. High Perform. Syst. Archit., 2016

2015
A lightweight middleware framework for vehicle networking application.
Concurr. Comput. Pract. Exp., 2015

Formal Analysis of a Single Sign-On Protocol Implementation for Android.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015


  Loading...