Jialiang Dong
  • Bio
  • Papers
  • Talks
  • News
  • Experience
  • Teaching
  • Blog
    • Our paper "Shape Before You Build: Secure Cryptographic Code Generation via Prompt Optimization" got accepted in IFIP SEC 2026!
    • I am honored to serve as a Program Committee member for ACISP 2026!
    • Our paper "Securing AI Code Generation - A Prompt Rectification Approach for Mitigating Cyber Risks" was awarded as the distinguished paper at TrustCom 2025!
    • Our paper "Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes" was awarded as the best paper at DSPP 2025!
    • I became a reviewer of IEEE Transactions on Dependable and Secure Computing (TDSC)
    • Our paper "Securing AI Code Generation - A Prompt Rectification Approach for Mitigating Cyber Risks" got accepted in TrustCom 2025!
    • Our paper "Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes" got accepted in DSPP 2025!
    • My study "From Surface to Semantics: Semantic Structure Parsing for Table-Centric Document Analysis" got accepted in ECAI 2025!
    • Our paper "What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software" got accepted in DSN 2025!
    • Our paper "Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis" got accepted in NDSS 2025!
    • My study "WEDA: Exploring Copyright Protection for Large Language Model Downstream Alignment" got accepted in TASLP!
  • Publications
    • Shape Before You Build: Secure Cryptographic Code Generation via Prompt Optimization
    • Securing AI Code Generation - A Prompt Rectification Approach for Mitigating Cyber Risks
    • Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes
    • From Surface to Semantics: Semantic Structure Parsing for Table-Centric Document Analysis
    • What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software
    • Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis
    • WEDA: Exploring Copyright Protection for Large Language Model Downstream Alignment
    • Transferable Adversarial Distribution Learning: Query-Efficient Adversarial Attack against Large Language Models
    • A Textual Adversarial Attack Scheme for Domain-Specific Models
    • Adversarial Attack and Defense on Natural Language Processing in Deep Learning: A Survey and Perspective
    • A Sentence-Level Text Adversarial Attack Algorithm against IIoT based Smart Grid
  • Recent & Upcoming Talks
    • DSN'25
    • ACM MMAsia'24 PhD School
  • Teaching
    • Software Architecture (UTS)
    • Cyber Resilience (UNSW)
  • Experience

DSN'25

Jun 26, 2025·
Jialiang (Kaelin) Dong
Jialiang (Kaelin) Dong
· 0 min read
Image credit: Unsplash
Date
Jun 26, 2025 12:00 AM — 12:00 AM
Event
DSN'25
Location

Naples, Italy

Via Parthenope, 38, Naples, Napoli 80121

Last updated on Jun 26, 2025
Jialiang (Kaelin) Dong
Authors
Jialiang (Kaelin) Dong
PhD Candidate

ACM MMAsia'24 PhD School Dec 3, 2024 →

© 2026 Me. This work is licensed under CC BY NC ND 4.0

Published with Hugo Blox Builder — the free, open source website builder that empowers creators.