Large Language Models for Software Engineering: A Systematic Literature Review X Hou, Y Zhao, Y Liu, Z Yang, K Wang, L Li, X Luo, D Lo, J Grundy, ... TOSEM 2024, 2024 | 590* | 2024 |
Jailbreaking ChatGPT via Prompt Engineering: An Empirical Study Y Liu, G Deng, Z Xu, Y Li, Y Zheng, Y Zhang, L Zhao, T Zhang, K Wang, ... FSE 2024-SEA4DQ Workshop, 2023 | 396 | 2023 |
MASTERKEY: Automated jailbreaking of large language model chatbots G Deng, Y Liu, Y Li, K Wang, Y Zhang, Z Li, H Wang, T Zhang, Y Liu NDSS 2024, 2024 | 312* | 2024 |
Prompt Injection attack against LLM-integrated Applications Y Liu, G Deng, Y Li, K Wang, Z Wang, X Wang, T Zhang, Y Liu, H Wang, ... arXiv preprint arXiv:2306.05499, 2023 | 288 | 2023 |
Large language models for cyber security: A systematic literature review HX Xu, SA Wang, N Li, K Wang, Y Zhao, K Chen, T Yu, Y Liu, HY Wang arXiv preprint arXiv:2405.04760, 2024 | 45 | 2024 |
Pandora: Jailbreak GPTs by Retrieval Augmented Generation Poisoning G Deng, Y Liu, K Wang, Y Li, T Zhang, Y Liu 2024 NDSS- AISCC, 2024 | 36 | 2024 |
It’s not just the site, it’s the contents: Intra-domain fingerprinting social media websites through cdn bursts K Wang, J Zhang, G Bai, R Ko, JS Dong Proceedings of the Web Conference 2021, 2142-2153, 2021 | 34 | 2021 |
Formal analysis of a single sign-on protocol implementation for android Q Ye, G Bai, K Wang, JS Dong 2015 20th International Conference on Engineering of Complex Computer …, 2015 | 30 | 2015 |
Digger: Detecting copyright content mis-usage in large language model training H Li, G Deng, Y Liu, K Wang, Y Li, T Zhang, Y Liu, G Xu, G Xu, H Wang arXiv preprint arXiv:2401.00676, 2024 | 24 | 2024 |
Understanding and tackling label errors in deep learning-based vulnerability detection X Nie, N Li, K Wang, S Wang, X Luo, H Wang Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 21 | 2023 |
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection Y Li, Y Liu, G Deng, Y Zhang, W Song, L Shi, K Wang, Y Li, Y Liu, H Wang 2024 The ACM International Conference on the Foundations of Software …, 2024 | 18 | 2024 |
Are they toeing the line? diagnosing privacy compliance violations among browser extensions Y Ling, K Wang, G Bai, H Wang, JS Dong Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022 | 17 | 2022 |
HOMESCAN: Scrutinizing implementations of smart home integrations KT Mahadewa, K Wang, G Bai, L Shi, JS Dong, Z Liang 2018 23rd International Conference on Engineering of Complex Computer …, 2018 | 15 | 2018 |
Scrutinizing implementations of smart home integrations K Mahadewa, K Wang, G Bai, L Shi, Y Liu, JS Dong, Z Liang IEEE Transactions on Software Engineering 47 (12), 2667-2683, 2019 | 13 | 2019 |
A hitchhiker’s guide to jailbreaking chatgpt via prompt engineering Y Liu, G Deng, Z Xu, Y Li, Y Zheng, Y Zhang, L Zhao, T Zhang, K Wang Proceedings of the 4th International Workshop on Software Engineering and AI …, 2024 | 12 | 2024 |
A framework for formal analysis of privacy on SSO protocols K Wang, G Bai, N Dong, JS Dong Security and Privacy in Communication Networks: 13th International …, 2018 | 11 | 2018 |
Assessing certificate validation user interfaces of WPA supplicants K Wang, Y Zheng, Q Zhang, G Bai, M Qin, D Zhang, JS Dong Proceedings of the 28th Annual International Conference on Mobile Computing …, 2022 | 9 | 2022 |
Drowzee: Metamorphic testing for fact-conflicting hallucination detection in large language models N Li, Y Li, Y Liu, L Shi, K Wang, H Wang Proceedings of the ACM on Programming Languages 8 (OOPSLA2), 1843-1872, 2024 | 8 | 2024 |
Lockpicking LLMs: A Logit-Based Jailbreak Using Token-level Manipulation Y Li, Y Liu, Y Li, L Shi, G Deng, S Chen, K Wang arXiv preprint arXiv:2405.13068, 2024 | 8 | 2024 |
MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation G Wang, Y Li, Y Liu, G Deng, T Li, G Xu, Y Liu, H Wang, K Wang ICSE-AI Foundation Models and Software Engineering (FORGE 2024), 2024 | 8 | 2024 |