Search Results for author: Zhilong Wang

Found 5 papers, 1 papers with code

Hidden You Malicious Goal Into Benigh Narratives: Jailbreak Large Language Models through Logic Chain Injection

no code implementations7 Apr 2024 Zhilong Wang, Yebo Cao, Peng Liu

This paper proposes a new type of jailbreak attacks which can deceive both the LLMs and human (i. e., security analyst).

Language Modelling

Knowledge-Reuse Transfer Learning Methods in Molecular and Material Science

no code implementations2 Mar 2024 An Chen, Zhilong Wang, Karl Luigi Loza Vidaurre, Yanqiang Han, Simin Ye, Kehao Tao, Shiwei Wang, Jing Gao, Jinjin Li

We focus on the application of transfer learning methods for the discovery of advanced molecules/materials, particularly, the construction of transfer learning frameworks for different systems, and how transfer learning can enhance the performance of models.

Transfer Learning

The Effectiveness of Large Language Models (ChatGPT and CodeBERT) for Security-Oriented Code Analysis

1 code implementation24 Jul 2023 Zhilong Wang, Lan Zhang, Chen Cao, Peng Liu

However, we observed that the strengths and limitations of adopting these LLMs to the code analysis have not been investigated.

Code Generation Language Modelling +1

Which Features are Learned by CodeBert: An Empirical Study of the BERT-based Source Code Representation Learning

no code implementations20 Jan 2023 Lan Zhang, Chen Cao, Zhilong Wang, Peng Liu

The Bidirectional Encoder Representations from Transformers (BERT) were proposed in the natural language process (NLP) and shows promising results.

Representation Learning

Using Deep Learning to Solve Computer Security Challenges: A Survey

no code implementations12 Dec 2019 Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou

Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.