Opening A Pandora's Box: Things You Should Know in the Era of Custom GPTs G Tao, S Cheng, Z Zhang, J Zhu, G Shen, X Zhang arXiv preprint arXiv:2401.00905, 2023 | 5 | 2023 |
From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age. Y Wu, J Zhuge, T Yin, T Li, J Zhu, G Guo, Y Liu, J Hu ICISSP, 237-248, 2021 | 5 | 2021 |
CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation J Yu, S Li, J Zhu, Y Cao Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 2 | 2023 |
ICScope: Detecting and Measuring Vulnerable ICS Devices Exposed on the Internet Y Wu, S Song, J Zhuge, T Yin, T Li, J Zhu, G Guo, Y Liu, J Hu International Conference on Information Systems Security and Privacy, 1-24, 2021 | 2 | 2021 |
Vulnerability-oriented Testing for RESTful APIs W Du, J Li, Y Wang, L Chen, R Zhao, J Zhu, Z Han, Y Wang, Z Xue | | |
SAWD: Structural-Aware Webshell Detection System with Control Flow Graph J Zhu, Y Yao, X Deng, Y Yong, Y Wang, L Chen, Z Xue, R Zhao | | |