Follow
ZHUO ZHANG
Title
Cited by
Cited by
Year
Probabilistic disassembly
K Miller, Y Kwon, Y Sun, Z Zhang, X Zhang, Z Lin
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
562019
Model orthogonalization: Class distance hardening in neural networks for better security
G Tao, Y Liu, G Shen, Q Xu, S An, Z Zhang, X Zhang
2022 IEEE Symposium on Security and Privacy (SP), 1372-1389, 2022
472022
Osprey: Recovery of variable and data structure via probabilistic analysis for stripped binary
Z Zhang, Y Ye, W You, G Tao, W Lee, Y Kwon, Y Aafer, X Zhang
2021 IEEE Symposium on Security and Privacy (SP), 813-832, 2021
402021
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.
Y Ye, Z Zhang, F Wang, X Zhang, D Xu
NDSS, 2021
402021
Demystifying Exploitable Bugs in Smart Contracts
Z Zhang, B Zhang, W Xu, Z Lin
2023 IEEE/ACM 45st International Conference on Software Engineering (ICSE …, 2023
372023
Stochfuzz: Sound and cost-effective fuzzing of stripped binaries by incremental and stochastic rewriting
Z Zhang, W You, G Tao, Y Aafer, X Liu, X Zhang
2021 IEEE Symposium on Security and Privacy (SP), 659-676, 2021
372021
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation
L Yu, S Ma, Z Zhang, G Tao, X Zhang, D Xu, VE Urias, HW Lin, ...
NDSS, 2021
332021
Constrained optimization with dynamic bound-scaling for effective nlp backdoor defense
G Shen, Y Liu, G Tao, Q Xu, Z Zhang, S An, S Ma, X Zhang
International Conference on Machine Learning, 19879-19892, 2022
312022
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation
Z Zhang, W You, G Tao, G Wei, Y Kwon, X Zhang
Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-31, 2019
282019
Pmp: Cost-effective forced execution with probabilistic memory pre-planning
W You, Z Zhang, Y Kwon, Y Aafer, F Peng, Y Shi, C Harmon, X Zhang
2020 IEEE Symposium on Security and Privacy (SP), 1121-1138, 2020
232020
Backdoor vulnerabilities in normally trained deep learning models
G Tao, Z Wang, S Cheng, S Ma, S An, Y Liu, G Shen, Z Zhang, Y Mao, ...
arXiv preprint arXiv:2211.15929, 2022
142022
On large language models’ resilience to coercive interrogation
Z Zhang, G Shen, G Tao, S Cheng, X Zhang
2024 IEEE Symposium on Security and Privacy (SP), 252-252, 2024
10*2024
Your exploit is mine: instantly synthesizing counterattack smart contract
Z Zhang, Z Lin, M Morales, X Zhang, K Zhang
32nd USENIX Security Symposium (USENIX Security 23), 1757-1774, 2023
92023
Opening a Pandora's box: things you should know in the era of custom GPTs
G Tao, S Cheng, Z Zhang, J Zhu, G Shen, X Zhang
arXiv preprint arXiv:2401.00905, 2023
62023
Improving binary code similarity transformer models by semantics-driven instruction deemphasis
X Xu, S Feng, Y Ye, G Shen, Z Su, S Cheng, G Tao, Q Shi, Z Zhang, ...
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
62023
D-arm: Disassembling arm binaries by lightweight superset instruction interpretation and graph modeling
Y Ye, Z Zhang, Q Shi, Y Aafer, X Zhang
2023 IEEE Symposium on Security and Privacy (SP), 2391-2408, 2023
62023
Lmpa: Improving decompilation by synergy of large language model and program analysis
X Xu, Z Zhang, S Feng, Y Ye, Z Su, N Jiang, S Cheng, L Tan, X Zhang
arXiv preprint arXiv:2306.02546, 2023
52023
TensileFuzz: facilitating seed input generation in fuzzing via string constraint solving
X Liu, W You, Z Zhang, X Zhang
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
52022
Deck: Model hardening for defending pervasive backdoors
G Tao, Y Liu, S Cheng, S An, Z Zhang, Q Xu, G Shen, X Zhang
arXiv preprint arXiv:2206.09272, 2022
52022
Parafuzz: An interpretability-driven technique for detecting poisoned samples in nlp
L Yan, Z Zhang, G Tao, K Zhang, X Chen, G Shen, X Zhang
Advances in Neural Information Processing Systems 36, 2024
42024
The system can't perform the operation now. Try again later.
Articles 1–20