default search action
Zhilong Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i10]An Chen, Zhilong Wang, Karl Luigi Loza Vidaurre, Yanqiang Han, Simin Ye, Kehao Tao, Shiwei Wang, Jing Gao, Jinjin Li:
Knowledge-Reuse Transfer Learning Methods in Molecular and Material Science. CoRR abs/2403.12982 (2024) - [i9]Haizhou Wang, Zhilong Wang, Peng Liu:
A hybrid LLM workflow can help identify user privilege related variables in programs of any size. CoRR abs/2403.15723 (2024) - [i8]Zhilong Wang, Yebo Cao, Peng Liu:
Hidden You Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Logic Chain Injection. CoRR abs/2404.04849 (2024) - [i7]Zhilong Wang, Haizhou Wang, Nanqing Luo, Lan Zhang, Xiaoyan Sun, Yebo Cao, Peng Liu:
Hide Your Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Neural Carrier Articles. CoRR abs/2408.11182 (2024) - 2023
- [j15]Yanqiang Han, Zhilong Wang, An Chen, Imran Ali, Junfei Cai, Simin Ye, Zhiyun Wei, Jin-Jin Li:
A deep transfer learning-based protocol accelerates full quantum mechanics calculation of protein. Briefings Bioinform. 24(1) (2023) - [j14]Zhilong Wang, Qianwen Wang, Jie Wu, Miao Ma, Zhao Pei, Yingshi Sun, Zhiguo Zhou:
An ensemble belief rule base model for pathologic complete response prediction in gastric cancer. Expert Syst. Appl. 233: 120976 (2023) - [j13]An Chen, Simin Ye, Zhilong Wang, Yanqiang Han, Junfei Cai, Jin-Jin Li:
Machine-learning-assisted rational design of 2D doped tellurene for fin field-effect transistor devices. Patterns 4(4): 100722 (2023) - [i6]Lan Zhang, Chen Cao, Zhilong Wang, Peng Liu:
Which Features are Learned by CodeBert: An Empirical Study of the BERT-based Source Code Representation Learning. CoRR abs/2301.08427 (2023) - [i5]Zhilong Wang, Lan Zhang, Peng Liu:
ChatGPT for Software Security: Exploring the Strengths and Limitations of ChatGPT in the Security Applications. CoRR abs/2307.12488 (2023) - 2022
- [j12]Yanqiang Han, Zhilong Wang, An Chen, Imran Ali, Junfei Cai, Simin Ye, Jin-Jin Li:
An inductive transfer learning force field (ITLFF) protocol builds protein force fields in seconds. Briefings Bioinform. 23(2) (2022) - [j11]Hongwei Tu, Yanqiang Han, Zhilong Wang, Jinjin Li:
Clustered tree regression to learn protein energy change with mutated amino acid. Briefings Bioinform. 23(6) (2022) - [j10]Jie Wu, Qianwen Wang, Zhilong Wang, Zhiguo Zhou:
AutoBRB: An automated belief rule base model for pathologic complete response prediction in gastric cancer. Comput. Biol. Medicine 140: 105104 (2022) - [j9]Xiaoqing Huang, Zhilong Wang, Shihao Liu:
Health status evaluation method of CNC machine tools based on grey clustering analysis and fuzzy comprehensive evaluation. J. Intell. Fuzzy Syst. 42(4): 4065-4082 (2022) - [c11]Zhiguo Zhou, Meijuan Zhou, Zhilong Wang, Xi Chen:
Predicting treatment outcome in metastatic melanoma through automated multi-objective model with hyperparameter optimization. Image-Guided Procedures 2022 - 2021
- [j8]Yanqiang Han, Zhilong Wang, Jiahao Ren, Zhiyun Wei, Jin-Jin Li:
Potential inhibitors for the novel coronavirus (SARS-CoV-2). Briefings Bioinform. 22(2): 1225-1231 (2021) - [j7]Yanqiang Han, Zhilong Wang, Zhiyun Wei, Jinyun Liu, Jinjin Li:
Machine learning builds full-QM precision protein force fields in seconds. Briefings Bioinform. 22(6) (2021) - [j6]Xi Chen, Meijuan Zhou, Zhilong Wang, Si Lu, Shaojie Chang, Zhiguo Zhou:
Immunotherapy treatment outcome prediction in metastatic melanoma through an automated multi-objective delta-radiomics model. Comput. Biol. Medicine 138: 104916 (2021) - [j5]Zhilong Wang, Peng Liu:
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity. Cybersecur. 4(1): 33 (2021) - [j4]Pengwei Wang, Tong Zhao, Kai Liu, Zhilong Wang:
Influence of Stokes number on the particle phase distribution behaviors in a rolling circulating fluidized beds (RCFB). J. Vis. 24(4): 733-748 (2021) - [i4]Zhilong Wang, Li Yu, Suhang Wang, Peng Liu:
Spotting Silent Buffer Overflows in Execution Trace through Graph Neural Network Assisted Data Flow Analysis. CoRR abs/2102.10452 (2021) - [i3]Zhilong Wang, Haizhou Wang, Hong Hu, Peng Liu:
Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model. CoRR abs/2108.12071 (2021) - 2020
- [j3]Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou:
Using deep learning to solve computer security challenges: a survey. Cybersecur. 3(1): 15 (2020) - [j2]Zhilong Wang, Tong Zhao, Masanori Kanzawa, Kai Liu, Masahiro Takei:
Evaluation of particle dispersion behaviours in Lithium-ion battery slurry by electrical impedance spectra-tomography method. Trans. Inst. Meas. Control 42(4): 704-715 (2020) - [c10]Yunlan Du, Zhenyu Ning, Jun Xu, Zhilong Wang, Yueh-Hsun Lin, Fengwei Zhang, Xinyu Xing, Bing Mao:
HART: Hardware-Assisted Kernel Module Tracing on Arm. ESORICS (1) 2020: 316-337
2010 – 2019
- 2019
- [j1]Jiayuan Ding, Siou Li, Zhilong Wang, Zihe Jiang, Yuexin Zhao, Xue Wang, Mengfei He, Weina Zhao, Changhao Yin:
Brain MRI imaging mechanism based on deep visual information perception and dementia degree induction. Multim. Tools Appl. 78(7): 8841-8859 (2019) - [i2]Zhilong Wang, Peng Liu:
GPT Conjecture: Understanding the Trade-offs between Granularity, Performance and Timeliness in Control-Flow Integrity. CoRR abs/1911.07828 (2019) - [i1]Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou:
Using Deep Learning to Solve Computer Security Challenges: A Survey. CoRR abs/1912.05721 (2019) - 2018
- [c9]Zhilong Wang, Xuhua Ding, Chengbin Pang, Jian Guo, Jun Zhu, Bing Mao:
To Detect Stack Buffer Overflow with Polymorphic Canaries. DSN 2018: 243-254 - [c8]Runze Yu, Yingguo Gao, Xiaohui Duan, Tiangang Zhu, Zhilong Wang, Bingli Jiao:
QRS Detection and Measurement Method of ECG Paper Based on Convolutional Neural Networks. EMBC 2018: 4636-4639 - 2017
- [c7]Dongliang Mu, Jia Guo, Wenbiao Ding, Zhilong Wang, Bing Mao, Lei Shi:
ROPOB: Obfuscating Binary Code via Return Oriented Programming. SecureComm 2017: 721-737 - [c6]Jun Zhu, Weiping Zhou, Zhilong Wang, Dongliang Mu, Bing Mao:
DiffGuard: Obscuring Sensitive Information in Canary Based Protections. SecureComm 2017: 738-751 - 2016
- [c5]Tao Zhang, Zhilong Wang:
A New Secure Android Model Based on Privilege. CSA/CUTE 2016: 179-184 - [c4]Zhilong Wang, Tao Zhang, Yu Yang, Haipeng Qu:
Comparison of Security Frameworks for Governmental Clouds between United States and European Union. ICCNS 2016: 30-34 - 2012
- [c3]Liying Wei, Zhilong Wang:
An optimizing method for bus-only signal based on Fuzzy Control. FSKD 2012: 429-432 - 2011
- [c2]Liuzhao Wang, Fang Chen, Zhilong Wang:
Key technologies of aerial photogrammetric drift angle automatic adjust-and-control system. ICSDM 2011: 401-404
2000 – 2009
- 2009
- [c1]Zhilong Wang, Zengtai Gong, Wenjin Zhu, Weigang Zhao:
A Rough Set Based PSO-BPNN Model for Air Pollution Forecasting. ICNC (3) 2009: 357-361
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 21:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint