Zongjie Li

Orcid: 0000-0002-9897-4086

According to our database1, Zongjie Li authored at least 49 papers between 1988 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
JSidentify-V2: Leveraging Dynamic Memory Fingerprinting for Mini-Game Plagiarism Detection.
CoRR, August, 2025

Measuring and Augmenting Large Language Models for Solving Capture-the-Flag Challenges.
CoRR, June, 2025

Differentiation-Based Extraction of Proprietary Data from Fine-Tuned LLMs.
CoRR, June, 2025

SoK: Evaluating Jailbreak Guardrails for Large Language Models.
CoRR, June, 2025

Reasoning as a Resource: Optimizing Fast and Slow Thinking in Code Generation Models.
CoRR, June, 2025

IP Leakage Attacks Targeting LLM-Based Multi-Agent Systems.
CoRR, May, 2025

NAMET: Robust Massive Model Editing via Noise-Aware Memory Optimization.
CoRR, May, 2025

STShield: Single-Token Sentinel for Real-Time Jailbreak Detection in Large Language Models.
CoRR, March, 2025

GuidedBench: Equipping Jailbreak Evaluation with Guidelines.
CoRR, February, 2025

Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators.
CoRR, January, 2025

DecLLM: LLM-Augmented Recompilable Decompilation for Enabling Programmatic Use of Decompiled Code.
Proc. ACM Softw. Eng., 2025

Beyond PEFT: Layer-Wise Optimization for More Effective and Efficient Large Code Model Tuning.
Proc. ACM Softw. Eng., 2025

Causality-Aided Evaluation and Explanation of Large Language Model-Based Code Generation.
Proc. ACM Softw. Eng., 2025

API-Guided Dataset Synthesis to Finetune Large Code Models.
Proc. ACM Program. Lang., 2025

2024
Evaluating C/C++ Vulnerability Detectability of Query-Based Static Application Security Testing Tools.
IEEE Trans. Dependable Secur. Comput., 2024

SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner.
CoRR, 2024

NAVRepair: Node-type Aware C/C++ Code Vulnerability Repair.
CoRR, 2024

Exploring Multi-Lingual Bias of Large Code Models in Code Generation.
CoRR, 2024

Testing and Understanding Erroneous Planning in LLM Agents through Synthesized User Inputs.
CoRR, 2024

How do LLMs Support Deep Learning Testing? A Comprehensive Study Through the Lens of Image Mutation.
CoRR, 2024

An Empirical Study on Large Language Models in Accuracy and Robustness under Chinese Industrial Scenarios.
CoRR, 2024

Poster Abstract: On the Accuracy and Robustness of Large Language Models in Chinese Industrial Scenarios.
Proceedings of the 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks, 2024

BinAug: Enhancing Binary Similarity Analysis with Low-Cost Input Repairing.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

On Extracting Specialized Code Abilities from Large Language Models: A Feasibility Study.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Split and Merge: Aligning Position Biases in LLM-based Evaluators.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

2023
VRPTEST: Evaluating Visual Referring Prompting in Large Multimodal Models.
CoRR, 2023

InstructTA: Instruction-Tuned Targeted Attack for Large Vision-Language Models.
CoRR, 2023

Benchmarking and Explaining Large Language Model-based Code Generation: A Causality-Centric Approach.
CoRR, 2023

Refining Decompiled C Code with Large Language Models.
CoRR, 2023

Split and Merge: Aligning Position Biases in Large Language Model based Evaluators.
CoRR, 2023

"Oops, Did I Just Say That?" Testing and Repairing Unethical Suggestions of Large Language Models with Suggest-Critique-Reflect Process.
CoRR, 2023

On the Feasibility of Specialized Ability Extracting for Large Language Code Models.
CoRR, 2023

A Unified Framework for Mini-game Testing: Experience on WeChat.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

REEF: A Framework for Collecting Real-World Vulnerabilities and Fixes.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Exploring Missed Optimizations in WebAssembly Optimizers.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

CCTEST: Testing and Repairing Code Completion Systems.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Protecting Intellectual Property of Large Language Model-Based Code Generation APIs via Watermarks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
3D Bipolar Spectral Inversion Based on Structural Geosteering Shear Backfill Mapping.
IEEE Trans. Geosci. Remote. Sens., 2022

Enriching query semantics for code search with reinforcement learning.
Neural Networks, 2022

CCTEST: Testing and Repairing Code Completion Systems.
CoRR, 2022

Static Inference Meets Deep learning: A Hybrid Type Inference Approach for Python.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Unleashing the Power of Compiler Intermediate Representation to Enhance Neural Program Embeddings.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
CRaDLe: Deep code retrieval based on semantic Dependency Learning.
Neural Networks, 2021

Enriching Query Semantics for Code Search with Reinforcement Learning.
CoRR, 2021

HiTyper: A Hybrid Static Type Inference Framework with Neural Prediction.
CoRR, 2021

2018
A new constrained maximum margin approach to discriminative learning of Bayesian classifiers.
Frontiers Inf. Technol. Electron. Eng., 2018

2016
Shot Boundary Detection based on Multilevel Difference of Colour Histograms.
Proceedings of the First International Conference on Multimedia and Image Processing, 2016

1996
An adaptive image segmentation method with visual nonlinearity characteristics.
IEEE Trans. Syst. Man Cybern. Part B, 1996

1988
A renovated algorithm for extracting moving target from background in real time video tracking system.
Proceedings of the 9th International Conference on Pattern Recognition, 1988


  Loading...