Publications

(2026). Shape Before You Build: Secure Cryptographic Code Generation via Prompt Optimization. The 41st IFIP TC11 Information Security & Privacy Conference (IFIP SEC 2026).
(2025). Securing AI Code Generation - A Prompt Rectification Approach for Mitigating Cyber Risks. The 24th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Outstanding Paper.
(2025). Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes. The 3rd International Conference on Data Security and Privacy Protection (DSPP), Best Paper.
(2025). From Surface to Semantics: Semantic Structure Parsing for Table-Centric Document Analysis. The 28th European Conference on Artificial Intelligence (ECAI).
(2025). What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software. The 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
(2025). Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis. ISOC 32th Network and Distributed System Security Symposium (NDSS).
(2024). WEDA: Exploring Copyright Protection for Large Language Model Downstream Alignment. IEEE/ACM Transactions on Audio, Speech, and Language Processing (TASLP).
(2023). Transferable Adversarial Distribution Learning: Query-Efficient Adversarial Attack against Large Language Models. Computers & Security (COSE).
(2022). Adversarial Attack and Defense on Natural Language Processing in Deep Learning: A Survey and Perspective. International Conference on Machine Learning for Cyber Security (ML4CS).
(2022). A Textual Adversarial Attack Scheme for Domain-Specific Models. International Conference on Machine Learning for Cyber Security (ML4CS).