Large language models for cyber security: A systematic literature review H Xu, S Wang, N Li, Y Zhao, K Chen, K Wang, Y Liu, T Yu, H Wang arXiv preprint arXiv:2405.04760, 2024 | 42 | 2024 |
How about bug-triggering paths?-understanding and characterizing learning-based vulnerability detectors X Cheng, X Nie, N Li, H Wang, Z Zheng, Y Sui IEEE Transactions on Dependable and Secure Computing 21 (2), 542-558, 2022 | 40 | 2022 |
Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper) X Nie, N Li, K Wang, S Wang, X Luo, H Wang Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 20 | 2023 |
Drowzee: Metamorphic Testing for Fact-Conflicting Hallucination Detection in Large Language Models N Li, Y Li, Y Liu, L Shi, K Wang, H Wang Proceedings of the ACM on Programming Languages 8 (OOPSLA2), 1843-1872, 2024 | 11* | 2024 |
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains N Li, S Wang, M Feng, K Wang, M Wang, H Wang 2023 38th IEEE/ACM International Conference on Automated Software …, 2023 | 7 | 2023 |