Large language models for cyber security: A systematic literature review HX Xu, SA Wang, N Li, K Wang, Y Zhao, K Chen, T Yu, Y Liu, HY Wang arXiv preprint arXiv:2405.04760, 2024 | 46 | 2024 |
Large language model supply chain: A research agenda S Wang, Y Zhao, X Hou, H Wang ACM Transactions on Software Engineering and Methodology, 2024 | 9 | 2024 |
Gpt store mining and analysis D Su, Y Zhao, X Hou, S Wang, H Wang arXiv preprint arXiv:2405.10210, 2024 | 8 | 2024 |
WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs S Meng, L Wang, S Wang, K Wang, X Xiao, G Bai, H Wang 2023 38th IEEE/ACM International Conference on Automated Software …, 2023 | 8 | 2023 |
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains N Li, S Wang, M Feng, K Wang, M Wang, H Wang 2023 38th IEEE/ACM International Conference on Automated Software …, 2023 | 7 | 2023 |
Models are codes: Towards measuring malicious code poisoning attacks on pre-trained model hubs J Zhao*, S Wang*, Y Zhao, X Hou, K Wang, P Gao, Y Zhang, C Wei, ... 2024 39th IEEE/ACM International Conference on Automated Software …, 2024 | 6 | 2024 |
Llm app store analysis: A vision and roadmap Y Zhao, X Hou, S Wang, H Wang ACM Transactions on Software Engineering and Methodology, 2024 | 6 | 2024 |
Gptzoo: A large-scale dataset of gpts for the research community X Hou, Y Zhao, S Wang, H Wang Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024 | 3 | 2024 |
On the Usage-scenario-based Data Minimization in Mini Programs S Wang, Y Zhao, K Wang, H Wang Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 29-32, 2023 | 3 | 2023 |
Towards robust detection of open source software supply chain poisoning attacks in industry environments X Zheng, C Wei, S Wang, Y Zhao, P Gao, Y Zhang, K Wang, H Wang Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024 | 1 | 2024 |
MiniScope: Automated UI Exploration and Privacy Inconsistency Detection of MiniApps via Two-phase Iterative Hybrid Analysis S Wang, Y Li, K Wang, Y Liu, H Li, Y Liu, H Wang ACM Transactions on Software Engineering and Methodology, 2024 | 1 | 2024 |
CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments S Wang*, F Dong*, H Yang, J Xu, H Wang arXiv preprint arXiv:2408.16515, 2024 | | 2024 |
Seeing is (Not) Believing: Practical Phishing Attacks Targeting Social Media Sharing Cards W Huang, S Wang, Y Zhao, G Xu, H Wang arXiv preprint arXiv:2405.10758, 2024 | | 2024 |