Segueix
Shenao Wang (王申奥)
Shenao Wang (王申奥)
Correu electrònic verificat a hust.edu.cn - Pàgina d'inici
Títol
Citada per
Citada per
Any
Large language models for cyber security: A systematic literature review
HX Xu, SA Wang, N Li, K Wang, Y Zhao, K Chen, T Yu, Y Liu, HY Wang
arXiv preprint arXiv:2405.04760, 2024
462024
Large language model supply chain: A research agenda
S Wang, Y Zhao, X Hou, H Wang
ACM Transactions on Software Engineering and Methodology, 2024
92024
Gpt store mining and analysis
D Su, Y Zhao, X Hou, S Wang, H Wang
arXiv preprint arXiv:2405.10210, 2024
82024
WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs
S Meng, L Wang, S Wang, K Wang, X Xiao, G Bai, H Wang
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
82023
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains
N Li, S Wang, M Feng, K Wang, M Wang, H Wang
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
72023
Models are codes: Towards measuring malicious code poisoning attacks on pre-trained model hubs
J Zhao*, S Wang*, Y Zhao, X Hou, K Wang, P Gao, Y Zhang, C Wei, ...
2024 39th IEEE/ACM International Conference on Automated Software …, 2024
62024
Llm app store analysis: A vision and roadmap
Y Zhao, X Hou, S Wang, H Wang
ACM Transactions on Software Engineering and Methodology, 2024
62024
Gptzoo: A large-scale dataset of gpts for the research community
X Hou, Y Zhao, S Wang, H Wang
Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024
32024
On the Usage-scenario-based Data Minimization in Mini Programs
S Wang, Y Zhao, K Wang, H Wang
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 29-32, 2023
32023
Towards robust detection of open source software supply chain poisoning attacks in industry environments
X Zheng, C Wei, S Wang, Y Zhao, P Gao, Y Zhang, K Wang, H Wang
Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024
12024
MiniScope: Automated UI Exploration and Privacy Inconsistency Detection of MiniApps via Two-phase Iterative Hybrid Analysis
S Wang, Y Li, K Wang, Y Liu, H Li, Y Liu, H Wang
ACM Transactions on Software Engineering and Methodology, 2024
12024
CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments
S Wang*, F Dong*, H Yang, J Xu, H Wang
arXiv preprint arXiv:2408.16515, 2024
2024
Seeing is (Not) Believing: Practical Phishing Attacks Targeting Social Media Sharing Cards
W Huang, S Wang, Y Zhao, G Xu, H Wang
arXiv preprint arXiv:2405.10758, 2024
2024
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–13