How well does LLM generate security tests? Y Zhang, W Song, Z Ji, N Meng arXiv preprint arXiv:2310.00710, 2023 | 29 | 2023 |
ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management P Gao, X Liu, E Choi, S Ma, X Yang, Z Ji, Z Zhang, D Song arXiv preprint arXiv:2212.10388, 2022 | 16 | 2022 |
A Knowledge Base Question Answering System for Cyber Threat Knowledge Acquisition Z Ji, E Choi, P Gao 2022 IEEE 38th International Conference on Data Engineering (ICDE), 3158-3161, 2022 | 10 | 2022 |
Privmon: A stream-based system for real-time privacy attack detection for machine learning models M Ko, X Yang, Z Ji, HA Just, P Gao, A Kumar, R Jia Proceedings of the 26th International Symposium on Research in Attacks …, 2023 | 3 | 2023 |
A Hybrid Queuing Model for Coordinated Vehicle Platooning on Mixed-Autonomy Highways: Training and Validation H Su, Z Ji, K Johansson, L Jin arXiv preprint arXiv:2103.14202, 2021 | 3 | 2021 |
Eliminating eBPF Tracing Overhead on Untraced Processes M Craun, K Hussain, U Gautam, Z Ji, T Rao, D Williams Proceedings of the ACM SIGCOMM 2024 Workshop on eBPF and Kernel Extensions …, 2024 | 1 | 2024 |