Jialiang Dong
  • Bio
  • Papers
  • Talks
  • News
  • Experience
  • Teaching
  • Blog
    • Our paper "Securing AI Code Generation - A Prompt Rectification Approach for Mitigating Cyber Risks" got accepted in TrustCom 2025!
    • Our paper "Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes" got accepted in DSPP 2025!
    • My study "From Surface to Semantics: Semantic Structure Parsing for Table-Centric Document Analysis" got accepted in ECAI 2025!
    • Our paper "What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software" got accepted in DSN 2025!
    • Our paper "Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis" got accepted in NDSS 2025!
    • My study "WEDA: Exploring Copyright Protection for Large Language Model Downstream Alignment" got accepted in TASLP!
  • Publications
    • Securing AI Code Generation - A Prompt Rectification Approach for Mitigating Cyber Risks
    • Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes
    • From Surface to Semantics: Semantic Structure Parsing for Table-Centric Document Analysis
    • What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software
    • Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis
    • WEDA: Exploring Copyright Protection for Large Language Model Downstream Alignment
    • Transferable Adversarial Distribution Learning: Query-Efficient Adversarial Attack against Large Language Models
    • A Textual Adversarial Attack Scheme for Domain-Specific Models
    • Adversarial Attack and Defense on Natural Language Processing in Deep Learning: A Survey and Perspective
    • A Sentence-Level Text Adversarial Attack Algorithm against IIoT based Smart Grid
  • Recent & Upcoming Talks
    • DSN'25
    • ACM MMAsia'24 PhD School
  • Teaching
    • Software Architecture (UTS)
    • Cyber Resilience (UNSW)
  • Experience

Securing AI Code Generation - A Prompt Rectification Approach for Mitigating Cyber Risks

Oct 5, 2025·
Jialiang Dong
,
Zihan Ni
,
Nan Sun
,
Sanjay Jha
,
Yiwei Zhang
,
Elisa Bertino
,
Surya Nepal
,
Siqi Ma
· 0 min read
Cite
Type
Conference paper
Publication
The 24th IEEE Internation Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
Last updated on Oct 5, 2025

Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes Aug 12, 2025 →

© 2025 Me. This work is licensed under CC BY NC ND 4.0

Published with Hugo Blox Builder — the free, open source website builder that empowers creators.