Lan Zhang

Orcid: 0000-0003-3964-8034

Affiliations:
  • Northern Arizona University, Flagstaff, AZ, USA


According to our database1, Lan Zhang authored at least 17 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Can AI Fix Buggy Code? Exploring the Use of Large Language Models in Automated Program Repair.
Computer, July, 2025

Comparing Different Membership Inference Attacks With a Comprehensive Benchmark.
IEEE Trans. Inf. Forensics Secur., 2025

A Novel Polynomial Activation for Audio Classification Using Homomorphic Encryption.
IEEE Access, 2025

To Protect the LLM Agent Against the Prompt Injection Attack with Polymorphic Prompt.
Proceedings of the 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2025

Exploring Prompt Patterns for Effective Vulnerability Repair in Real-World Code by Large Language Models.
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, 2025

2024
Using Explainable AI for Neural Network-Based Network Attack Detection.
Computer, May, 2024

Analysis of neural network detectors for network attacks.
J. Comput. Secur., 2024

Hide Your Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Neural Carrier Articles.
CoRR, 2024

Federated Learning for Enhanced ECG Signal Classification with Privacy Awareness.
Proceedings of the 46th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2024

Evaluating Large Language Models for Real-World Vulnerability Repair in C/C++ Code.
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, 2024

2023
Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection.
IEEE Trans. Dependable Secur. Comput., 2023

2022
Attacks on ML Systems: From Security Analysis to Attack Mitigation.
Proceedings of the Information Systems Security - 18th International Conference, 2022

What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems.
IEEE Internet Things J., 2021

2020
Using deep learning to solve computer security challenges: a survey.
Cybersecur., 2020

Semantic-preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection.
CoRR, 2020

2019
Logic Bugs in IoT Platforms and Systems: A Review.
CoRR, 2019


  Loading...