Zhilong Wang

This page is a disambiguation page, it actually contains multiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2026
From Pixels to Prompts: A Systematic Study and Introduction to Image Prompt Injection Attacks.
Computer, April, 2026

Identifying Non-Control Security-Critical Data Through Program Dependence Learning.
IEEE Trans. Dependable Secur. Comput., 2026

DeepSanitizer: Combining Heuristic Rules and Deep Learning Models to Spot Silent Buffer Overflows in Binary.
IEEE Trans. Dependable Secur. Comput., 2026

Agile software project scheduling using reinforcement learning with genetic programming.
Eng. Appl. Artif. Intell., 2026

2025
DESCG: data encoding scheme classification with GNN in binary analysis.
Autom. Softw. Eng., November, 2025

NovelSeek: When Agent Becomes the Scientist - Building Closed-Loop System from Hypothesis to Verification.
CoRR, May, 2025

ADNS: An adaptive dynamic neighborhood search method guided by joint learning heuristics and corresponding hyperparameters.
Appl. Soft Comput., 2025

Deep Learning Assisted Reverse Engineering: Recognizing Encryption Loops in Ransomware.
Proceedings of the 24th IEEE International Conference on Trust, 2025

Image-based Prompt Injection: Hijacking Multimodal LLMs through Visually Embedded Adversarial Instructions.
Proceedings of the 3rd International Conference on Foundation and Large Language Models, 2025

To Protect the LLM Agent Against the Prompt Injection Attack with Polymorphic Prompt.
Proceedings of the 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2025

Automated Essential Concept Discovery for Few-Shot Out-of-Distribution Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2025

2024
Advanced Gastric Cancer: CT Radiomics Prediction of Lymph Modes Metastasis After Neoadjuvant Chemotherapy.
J. Imaging Inform. Medicine, 2024

Hide Your Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Neural Carrier Articles.
CoRR, 2024

Hidden You Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Logic Chain Injection.
CoRR, 2024

A hybrid LLM workflow can help identify user privilege related variables in programs of any size.
CoRR, 2024

2023
An ensemble belief rule base model for pathologic complete response prediction in gastric cancer.
Expert Syst. Appl., December, 2023

ChatGPT for Software Security: Exploring the Strengths and Limitations of ChatGPT in the Security Applications.
CoRR, 2023

Which Features are Learned by CodeBert: An Empirical Study of the BERT-based Source Code Representation Learning.
CoRR, 2023

2022
Health status evaluation method of CNC machine tools based on grey clustering analysis and fuzzy comprehensive evaluation.
J. Intell. Fuzzy Syst., 2022

AutoBRB: An automated belief rule base model for pathologic complete response prediction in gastric cancer.
Comput. Biol. Medicine, 2022

Predicting treatment outcome in metastatic melanoma through automated multi-objective model with hyperparameter optimization.
Proceedings of the Medical Imaging 2022: Image-Guided Procedures, 2022

2021
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity.
Cybersecur., 2021

Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model.
CoRR, 2021

Spotting Silent Buffer Overflows in Execution Trace through Graph Neural Network Assisted Data Flow Analysis.
CoRR, 2021

2020
Using deep learning to solve computer security challenges: a survey.
Cybersecur., 2020

HART: Hardware-Assisted Kernel Module Tracing on Arm.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Brain MRI imaging mechanism based on deep visual information perception and dementia degree induction.
Multim. Tools Appl., 2019

GPT Conjecture: Understanding the Trade-offs between Granularity, Performance and Timeliness in Control-Flow Integrity.
CoRR, 2019

2018
QRS Detection and Measurement Method of ECG Paper Based on Convolutional Neural Networks.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

To Detect Stack Buffer Overflow with Polymorphic Canaries.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
DiffGuard: Obscuring Sensitive Information in Canary Based Protections.
Proceedings of the Security and Privacy in Communication Networks, 2017

ROPOB: Obfuscating Binary Code via Return Oriented Programming.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
Comparison of Security Frameworks for Governmental Clouds between United States and European Union.
Proceedings of the 6th International Conference on Communication and Network Security, 2016

A New Secure Android Model Based on Privilege.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

2012
An optimizing method for bus-only signal based on Fuzzy Control.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2011
Key technologies of aerial photogrammetric drift angle automatic adjust-and-control system.
Proceedings of the IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2011

2009
A Rough Set Based PSO-BPNN Model for Air Pollution Forecasting.
Proceedings of the Fifth International Conference on Natural Computation, 2009


  Loading...