Gelei Deng
Cited by
Cited by
Jailbreaking ChatGPT via Prompt Engineering: An Empirical Study
Y Liu, G Deng, Z Xu, Y Li, Y Zheng, Y Zhang, L Zhao, T Zhang, Y Liu
arXiv preprint arXiv:2305.13860, 2023
MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots
G Deng, Y Liu, Y Li, K Wang, Y Zhang, Z Li, H Wang, T Zhang, Y Liu
Network and Distributed System Security Symposium (NDSS) 2024, 2024
Prompt Injection attack against LLM-integrated Applications
Y Liu, G Deng, Y Li, K Wang, Z Wang, X Wang, T Zhang, Y Liu, H Wang, ...
arXiv preprint arXiv:2306.05499, 2023
A fog computing based approach to DDoS mitigation in IIoT systems
L Zhou, H Guo, G Deng
Computers & Security 85, 51-62, 2019
The Threat of Offensive AI to Organizations
Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei, L Yang, X Zhang, ...
Computers & Security 124, 103006, 2023
Automatic code summarization via chatgpt: How far are we?
W Sun, C Fang, Y You, Y Miao, Y Liu, Y Li, G Deng, S Huang, Y Chen, ...
arXiv preprint arXiv:2305.12865, 2023
PENTESTGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing
G Deng, Y Liu, V Mayoral-Vilches23, P Liu, Y Li, Y Xu, T Zhang, Y Liu, ...
Novel Denial-of-Service Attacks Against Cloud-based Multi-Robot Systems
Y Xu, G Deng, T Zhang, H Qiu, Y Bao
Information Sciences 576, 329-344, 2021
Morest: Model-based RESTful API testing with execution feedback
Y Liu, Y Li, G Deng, Y Liu, R Wan, R Wu, D Ji, S Xu, M Bao
Proceedings of the 44th International Conference on Software Engineering …, 2022
An investigation of byzantine threats in multi-robot systems
G Deng, Y Zhou, Y Xu, T Zhang, Y Liu
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
On the (in) security of secure ros2
G Deng, G Xu, Y Zhou, T Zhang, Y Liu
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
Efficient password guessing based on a password segmentation approach
G Deng, X Yu, H Guo
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
LLM Jailbreak Attack versus Defense Techniques--A Comprehensive Study
Z Xu, Y Liu, G Deng, Y Li, S Picek
arXiv preprint arXiv:2402.13457, 2024
SoK: Rethinking sensor spoofing attacks against robotic vehicles from a systematic view
Y Xu, X Han, G Deng, J Li, Y Liu, T Zhang
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 1082-1100, 2023
Pandora: Jailbreak GPTs by Retrieval Augmented Generation Poisoning
G Deng, Y Liu, K Wang, Y Li, T Zhang, Y Liu
Workshop on Artificial Intelligence System with Confidential Computing …, 2024
Jailbreaking chatgpt via prompt engineering: An empirical study. arXiv 2023
Y Liu, G Deng, Z Xu, Y Li, Y Zheng, Y Zhang, L Zhao, T Zhang, Y Liu
arXiv preprint arXiv:2305.13860, 2023
Digger: Detecting copyright content mis-usage in large language model training
H Li, G Deng, Y Liu, K Wang, Y Li, T Zhang, Y Liu, G Xu, G Xu, H Wang
arXiv preprint arXiv:2401.00676, 2024
NAUTILUS: Automated RESTful API Vulnerability Detection
G Deng, Z Zhang, Y Li, Y Liu, T Zhang, Y Liu, G Yu, D Wang
Glitch tokens in large language models: Categorization taxonomy and effective detection
Y Li, Y Liu, G Deng, Y Zhang, W Song, L Shi, K Wang, Y Li, Y Liu, H Wang
Proceedings of the ACM on Software Engineering 1 (FSE), 2075-2097, 2024
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG)
R Liang, J Chen, K He, Y Wu, G Deng, R Du, C Wu
Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024
The system can't perform the operation now. Try again later.
Articles 1–20