


default search action
Zhuo Zhang 0002
Person information
- affiliation: Purdue University, West Lafayette, IN, USA
- unicode name: 张倬
Other persons with the same name
- Zhuo Zhang — disambiguation page
- Zhuo Zhang 0001 — Institute for Infocomm Research, Agency for Science, Technology and Research, Singapore
- Zhuo Zhang 0003
— Tianjin University, Tianjin International Engineering Institute, China
- Zhuo Zhang 0004
— Xi'an Research Institute of High Technology, Xi'an, China (and 1 more)
- Zhuo Zhang 0005
— Northwestern Polytechnical University, School of Electronics and Information, Xi'an, China
- Zhuo Zhang 0006
— Northwestern Polytechnical University, School of Marine Science and Technology, Xi'an, China (and 1 more)
- Zhuo Zhang 0007
— National University of Defense Technology, Changsha, China
- Zhuo Zhang 0008 — I.M. Systems Group, Rockville, MD, USA (and 1 more)
- Zhuo Zhang 0009 — Princeton University, Princeton, New Jersey, USA
- Zhuo Zhang 0010 — Beijing University of Technology, Beijing, China
- Zhuo Zhang 0011 — De Montfort University, Leicester, UK
- Zhuo Zhang 0012 — Zhejiang University of Technology, Hangzhou, China
- Zhuo Zhang 0013 — Zhengzhou University, Zhengzhou, China
- Zhuo Zhang 0014 — Northeast Normal University, China
- Zhuo Zhang 0015 — Alibaba Cloud Computing Inc., China
- Zhuo Zhang 0016 — China University of Mining and Technology, Beijing, China
- Zhuo Zhang 0017 — Central South University of Forestry & Technology, Changsha, China
- Zhuo Zhang 0018 — I.M. Systems Group, Inc., College Park, MD, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c29]Xiangzhe Xu, Zhuo Zhang, Zian Su, Ziyang Huang, Shiwei Feng, Yapeng Ye, Nan Jiang, Danning Xie, Siyuan Cheng, Lin Tan, Xiangyu Zhang:
Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary. NDSS 2025 - 2024
- [j3]Guannan Wei
, Danning Xie
, Wuqi Zhang
, Yongwei Yuan
, Zhuo Zhang
:
Consolidating Smart Contracts with Behavioral Contracts. Proc. ACM Program. Lang. 8(PLDI): 965-989 (2024) - [j2]Zian Su
, Xiangzhe Xu
, Ziyang Huang
, Zhuo Zhang
, Yapeng Ye
, Jianjun Huang
, Xiangyu Zhang
:
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking. Proc. ACM Softw. Eng. 1(FSE): 562-585 (2024) - [c28]Guanhong Tao, Siyuan Cheng, Zhenting Wang, Shiqing Ma, Shengwei An, Yingqi Liu, Guangyu Shen, Zhuo Zhang, Yunshu Mao, Xiangyu Zhang:
Exploring Inherent Backdoors in Deep Learning Models. ACSAC 2024: 923-939 - [c27]Danning Xie
, Zhuo Zhang
, Nan Jiang
, Xiangzhe Xu
, Lin Tan
, Xiangyu Zhang
:
ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries. CCS 2024: 4554-4568 - [c26]Chanwoo Bae, Guanhong Tao, Zhuo Zhang, Xiangyu Zhang:
Threat Behavior Textual Search by Attention Graph Isomorphism. EACL (1) 2024: 2616-2630 - [c25]Xuwei Liu
, Wei You
, Yapeng Ye
, Zhuo Zhang
, Jianjun Huang
, Xiangyu Zhang
:
FuzzInMem: Fuzzing Programs via In-memory Structures. ICSE 2024: 131:1-131:13 - [c24]Dongnan He
, Dongchen Xie
, Yujie Wang
, Wei You
, Bin Liang
, Jianjun Huang
, Wenchang Shi
, Zhuo Zhang
, Xiangyu Zhang
:
Define-Use Guided Path Exploration for Better Forced Execution. ISSTA 2024: 287-299 - [c23]Hanxi Guo, Siyuan Cheng, Xiaolong Jin, Zhuo Zhang, Kaiyuan Zhang, Guanhong Tao, Guangyu Shen, Xiangyu Zhang:
BiScope: AI-generated Text Detection by Checking Memorization of Preceding Tokens. NeurIPS 2024 - [c22]Brian Zhang, Zhuo Zhang:
Detecting Bugs with Substantial Monetary Consequences by LLM and Rule-based Reasoning. NeurIPS 2024 - [c21]Zhuo Zhang
, Guangyu Shen, Guanhong Tao, Siyuan Cheng, Xiangyu Zhang:
On Large Language Models' Resilience to Coercive Interrogation. SP 2024: 826-844 - [c20]Siyuan Cheng, Guangyu Shen, Guanhong Tao, Kaiyuan Zhang, Zhuo Zhang
, Shengwei An, Xiangzhe Xu, Yingqi Li, Shiqing Ma, Xiangyu Zhang:
OdScan: Backdoor Scanning for Object Detection Models. SP 2024: 1703-1721 - [c19]Wuqi Zhang, Zhuo Zhang
, Qingkai Shi, Lu Liu, Lili Wei, Yepang Liu, Xiangyu Zhang, Shing-Chi Cheung:
Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts. SP 2024: 2198-2216 - [c18]Le Yu, Yapeng Ye, Zhuo Zhang, Xiangyu Zhang:
Cost-effective Attack Forensics by Recording and Correlating File System Changes. USENIX Security Symposium 2024 - [i13]Guanhong Tao, Siyuan Cheng, Zhuo Zhang
, Junmin Zhu, Guangyu Shen, Xiangyu Zhang:
Opening A Pandora's Box: Things You Should Know in the Era of Custom GPTs. CoRR abs/2401.00905 (2024) - [i12]Xiaolong Jin, Zhuo Zhang
, Xiangyu Zhang:
MULTIVERSE: Exposing Large Language Model Alignment Problems in Diverse Worlds. CoRR abs/2402.01706 (2024) - [i11]Guangyu Shen, Siyuan Cheng, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Lu Yan, Zhuo Zhang
, Shiqing Ma, Xiangyu Zhang:
Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia. CoRR abs/2402.05467 (2024) - [i10]Zian Su, Xiangzhe Xu, Ziyang Huang, Zhuo Zhang
, Yapeng Ye, Jianjun Huang, Xiangyu Zhang:
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking. CoRR abs/2402.11842 (2024) - [i9]Chanwoo Bae, Guanhong Tao, Zhuo Zhang
, Xiangyu Zhang:
Threat Behavior Textual Search by Attention Graph Isomorphism. CoRR abs/2404.10944 (2024) - [i8]Lu Yan, Siyuan Cheng, Xuan Chen, Kaiyuan Zhang, Guangyu Shen, Zhuo Zhang, Xiangyu Zhang:
ASPIRER: Bypassing System Prompts With Permutation-based Backdoors in LLMs. CoRR abs/2410.04009 (2024) - 2023
- [b1]Zhuo Zhang:
Revamping Binary Analysis with Sampling and Probabilistic Inference. Purdue University, USA, 2023 - [c17]Zhuo Zhang
, Brian Zhang, Wen Xu, Zhiqiang Lin:
Demystifying Exploitable Bugs in Smart Contracts. ICSE 2023: 615-627 - [c16]Xiangzhe Xu, Shiwei Feng, Yapeng Ye, Guangyu Shen, Zian Su, Siyuan Cheng, Guanhong Tao, Qingkai Shi, Zhuo Zhang
, Xiangyu Zhang:
Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis. ISSTA 2023: 1106-1118 - [c15]Lu Yan, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Xuan Chen, Guangyu Shen, Xiangyu Zhang:
ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP. NeurIPS 2023 - [c14]Xiangzhe Xu
, Zhou Xuan
, Shiwei Feng
, Siyuan Cheng
, Yapeng Ye
, Qingkai Shi
, Guanhong Tao
, Le Yu
, Zhuo Zhang
, Xiangyu Zhang
:
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model. ESEC/SIGSOFT FSE 2023: 401-412 - [c13]Yapeng Ye, Zhuo Zhang
, Qingkai Shi, Yousra Aafer, Xiangyu Zhang:
D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling. SP 2023: 2391-2408 - [c12]Zhuo Zhang, Zhiqiang Lin, Marcelo Morales, Xiangyu Zhang, Kaiyuan Zhang:
Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract. USENIX Security Symposium 2023: 1757-1774 - [c11]Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang:
PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis. USENIX Security Symposium 2023: 2365-2382 - [i7]Xiangzhe Xu, Zhuo Zhang
, Shiwei Feng, Yapeng Ye, Zian Su, Nan Jiang, Siyuan Cheng, Lin Tan, Xiangyu Zhang:
LmPa: Improving Decompilation by Synergy of Large Language Model and Program Analysis. CoRR abs/2306.02546 (2023) - [i6]Lu Yan, Zhuo Zhang
, Guanhong Tao, Kaiyuan Zhang, Xuan Chen, Guangyu Shen, Xiangyu Zhang:
ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP. CoRR abs/2308.02122 (2023) - [i5]Xiangzhe Xu, Zhou Xuan, Shiwei Feng, Siyuan Cheng, Yapeng Ye, Qingkai Shi, Guanhong Tao, Le Yu, Zhuo Zhang
, Xiangyu Zhang:
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model. CoRR abs/2308.15449 (2023) - [i4]Zhuo Zhang
, Guangyu Shen, Guanhong Tao, Siyuan Cheng, Xiangyu Zhang:
Make Them Spill the Beans! Coercive Knowledge Extraction from (Production) LLMs. CoRR abs/2312.04782 (2023) - 2022
- [c10]Zeinab El-Rewini, Zhuo Zhang
, Yousra Aafer:
Poirot: Probabilistically Recommending Protections for the Android Framework. CCS 2022: 937-950 - [c9]Guangyu Shen, Yingqi Liu, Guanhong Tao, Qiuling Xu, Zhuo Zhang, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense. ICML 2022: 19879-19892 - [c8]Xuwei Liu, Wei You, Zhuo Zhang
, Xiangyu Zhang:
TensileFuzz: facilitating seed input generation in fuzzing via string constraint solving. ISSTA 2022: 391-403 - [c7]Guanhong Tao, Yingqi Liu, Guangyu Shen, Qiuling Xu, Shengwei An, Zhuo Zhang
, Xiangyu Zhang:
Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security. SP 2022: 1372-1389 - [i3]Guangyu Shen, Yingqi Liu, Guanhong Tao, Qiuling Xu, Zhuo Zhang, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense. CoRR abs/2202.05749 (2022) - [i2]Guanhong Tao, Yingqi Liu, Siyuan Cheng, Shengwei An, Zhuo Zhang
, Qiuling Xu, Guangyu Shen, Xiangyu Zhang:
DECK: Model Hardening for Defending Pervasive Backdoors. CoRR abs/2206.09272 (2022) - [i1]Guanhong Tao, Zhenting Wang, Siyuan Cheng, Shiqing Ma, Shengwei An, Yingqi Liu, Guangyu Shen, Zhuo Zhang
, Yunshu Mao, Xiangyu Zhang:
Backdoor Vulnerabilities in Normally Trained Deep Learning Models. CoRR abs/2211.15929 (2022) - 2021
- [c6]Yapeng Ye, Zhuo Zhang, Fei Wang, Xiangyu Zhang, Dongyan Xu:
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces. NDSS 2021 - [c5]Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent E. Urias, Han Wei Lin, Gabriela F. Ciocarlie, Vinod Yegneswaran, Ashish Gehani:
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation. NDSS 2021 - [c4]Zhuo Zhang
, Wei You, Guanhong Tao, Yousra Aafer, Xuwei Liu
, Xiangyu Zhang:
StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting. SP 2021: 659-676 - [c3]Zhuo Zhang
, Yapeng Ye
, Wei You, Guanhong Tao, Wen-Chuan Lee, Yonghwi Kwon, Yousra Aafer, Xiangyu Zhang:
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary. SP 2021: 813-832 - 2020
- [c2]Wei You, Zhuo Zhang
, Yonghwi Kwon, Yousra Aafer, Fei Peng, Yu Shi, Carson Harmon, Xiangyu Zhang:
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning. SP 2020: 1121-1138
2010 – 2019
- 2019
- [j1]Zhuo Zhang
, Wei You, Guanhong Tao, Guannan Wei
, Yonghwi Kwon, Xiangyu Zhang:
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation. Proc. ACM Program. Lang. 3(OOPSLA): 137:1-137:31 (2019) - [c1]Kenneth A. Miller, Yonghwi Kwon, Yi Sun, Zhuo Zhang
, Xiangyu Zhang, Zhiqiang Lin
:
Probabilistic disassembly. ICSE 2019: 1187-1198
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-20 23:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint