


default search action
Geng Hong
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[i15]Xinyi Wu, Geng Hong, Yueyue Chen, MingXuan Liu, Feier Jin, Xudong Pan, Jiarun Dai, Baojun Liu:
When Bots Take the Bait: Exposing and Mitigating the Emerging Social Engineering Attack in Web Automation Agent. CoRR abs/2601.07263 (2026)
[i14]Xinyi Wu, Jiagui Chen, Geng Hong, Jiayi Dong, Xudong Pan, Jiarun Dai, Min Yang:
WebTrap Park: An Automated Platform for Systematic Security Evaluation of Web Agents. CoRR abs/2601.08406 (2026)
[i13]Wenqi Zhang, Yulin Shen, Changyue Jiang, Jiarun Dai, Geng Hong, Xudong Pan:
MirrorGuard: Toward Secure Computer-Use Agents via Simulation-to-Real Reasoning Correction. CoRR abs/2601.12822 (2026)- 2025
[c17]Bingyang Guo, Mingxuan Liu, Yihui Ma, Ruixuan Li, Fan Shi, Min Zhang, Baojun Liu, Chengxi Xu, Haixin Duan
, Geng Hong, Min Yang, Qingfeng Pan:
Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings. ESORICS (4) 2025: 147-168
[c16]Mengying Wu, Geng Hong, Wuyuao Mai
, Xinyi Wu, Lei Zhang, Yingyuan Pu, Huajun Chai, Lingyun Ying, Haixin Duan
, Min Yang:
Exposing the Hidden Layer: Software Repositories in the Service of Seo Manipulation. ICSE 2025: 2100-2112
[c15]Yijing Liu
, Mingxuan Liu
, Yiming Zhang
, Baojun Liu
, Jia Zhang
, Geng Hong
, Haixin Duan
, Min Yang
:
Dive into the Cloud: Unveiling the (Ab)Usage of Serverless Cloud Function in the Wild. IMC 2025: 63-77
[c14]Ruixuan Li, Chaoyi Lu, Baojun Liu, Yunyi Zhang, Geng Hong, Haixin Duan, Yanzhong Lin, Qingfeng Pan, Min Yang, Jun Shao:
HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists. NDSS 2025
[c13]Mengying Wu, Geng Hong, Jinsong Chen, Qi Liu, Shujun Tang, Youhao Li, Baojun Liu, Haixin Duan, Min Yang:
Revealing the Black Box of Device Search Engine: Scanning Assets, Strategies, and Ethical Consideration. NDSS 2025
[c12]Zhibo Zhang, Lei Zhang, Zhangyue Zhang, Geng Hong, Yuan Zhang, Min Yang:
Misdirection of Trust: Demystifying the Abuse of Dedicated URL Shortening Service. NDSS 2025
[c11]Jinsong Chen, Mengying Wu, Geng Hong, Baichao An, Mingxuan Liu, Lei Zhang, Baojun Liu, Haixin Duan, Min Yang:
Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification. USENIX Security Symposium 2025: 2847-2866
[c10]Mingxuan Liu, Yunyi Zhang, Lijie Wu, Baojun Liu, Geng Hong, Yiming Zhang, Hui Jiang, Jia Zhang, Haixin Duan, Min Zhang, Wei Guan, Fan Shi, Min Yang:
NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines. USENIX Security Symposium 2025: 4779-4798
[c9]Wuyuao Mai
, Geng Hong
, Pei Chen
, Xudong Pan
, Baojun Liu
, Yuan Zhang
, Haixin Duan
, Min Yang
:
You Can't Eat Your Cake and Have It Too: The Performance Degradation of LLMs with Jailbreak Defense. WWW 2025: 872-883
[i12]Wuyuao Mai, Geng Hong, Pei Chen, Xudong Pan, Baojun Liu, Yuan Zhang, Haixin Duan
, Min Yang:
You Can't Eat Your Cake and Have It Too: The Performance Degradation of LLMs with Jailbreak Defense. CoRR abs/2501.12210 (2025)
[i11]Yining Wang, Yuquan Wang, Xi Li, Mi Zhang, Geng Hong, Min Yang:
The Illusionist's Prompt: Exposing the Factual Vulnerabilities of Large Language Models with Linguistic Nuances. CoRR abs/2504.02865 (2025)
[i10]Yichen Wu, Xudong Pan, Geng Hong, Min Yang:
OpenDeception: Benchmarking and Investigating AI Deceptive Behaviors via Open-ended Interaction Simulation. CoRR abs/2504.13707 (2025)
[i9]Changyi Li, Jiayi Wang, Xudong Pan, Geng Hong, Min Yang:
ReasoningShield: Content Safety Detection over Reasoning Traces of Large Reasoning Models. CoRR abs/2505.17244 (2025)
[i8]Xinyi Wu, Geng Hong, Pei Chen, Yueyue Chen, Xudong Pan, Min Yang:
PRISON: Unmasking the Criminal Potential of Large Language Models. CoRR abs/2506.16150 (2025)
[i7]Yuquan Wang, Mi Zhang, Yining Wang, Geng Hong, Xiaoyu You, Min Yang:
ReasoningGuard: Safeguarding Large Reasoning Models with Inference-time Safety Aha Moments. CoRR abs/2508.04204 (2025)
[i6]Wuyuao Mai, Geng Hong, Qi Liu, Jinsong Chen, Jiarun Dai, Xudong Pan, Yuan Zhang, Min Yang:
Shell or Nothing: Real-World Benchmarks and Memory-Activated Agents for Automated Penetration Testing. CoRR abs/2509.09207 (2025)
[i5]James Zhang, Miles Kodama, Zongze Wu, Michael Chen, Yue Zhu, Geng Hong:
Emergency Response Measures for Catastrophic AI Risk. CoRR abs/2511.05526 (2025)
[i4]Mengying Wu, Pei Chen, Geng Hong, Baichao An, Jinsong Chen, Binwang Wan, Xudong Pan, Jiarun Dai, Min Yang:
MCPZoo: A Large-Scale Dataset of Runnable Model Context Protocol Servers for AI Agent. CoRR abs/2512.15144 (2025)
[i3]Yiming Sun, Mi Zhang, Feifei Li, Geng Hong, Min Yang:
SmartSight: Mitigating Hallucination in Video-LLMs Without Compromising Video Understanding via Temporal Attention Collapse. CoRR abs/2512.18671 (2025)- 2024
[j1]Pei Chen, Geng Hong, Mengying Wu, Jinsong Chen, Haixin Duan, Min Yang:
Underground Application Collection Method Based on Spiking Traffic Analysis. Int. J. Softw. Informatics 14(3): 331-348 (2024)
[c8]Guoyi Ye
, Geng Hong
, Yuan Zhang
, Min Yang
:
Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets. WWW 2024: 1585-1595
[i2]Changyue Jiang, Xudong Pan, Geng Hong, Chenfu Bao, Min Yang:
RAG-Thief: Scalable Extraction of Private Data from Retrieval-Augmented Generation Applications with Agent-based Attacks. CoRR abs/2411.14110 (2024)
[i1]Mengying Wu, Geng Hong, Jinsong Chen, Qi Liu, Shujun Tang, Youhao Li, Baojun Liu, Haixin Duan, Min Yang:
Revealing the Black Box of Device Search Engine: Scanning Assets, Strategies, and Ethical Consideration. CoRR abs/2412.15696 (2024)- 2023
[c7]Guoyi Ye
, Mengying Wu
, Geng Hong
, Min Yang
:
Revealing and Analyzing the Visual Scams of Cryptocurrency Wallets. ACM TUR-C 2023: 148-149
[c6]Zhenrui Zhang, Geng Hong, Xiang Li
, Zhuoqun Fu
, Jia Zhang
, Mingxuan Liu
, Chuhan Wang
, Jianjun Chen
, Baojun Liu
, Haixin Duan
, Chao Zhang
, Min Yang
:
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild. CCS 2023: 326-340
[c5]Geng Hong
, Mengying Wu
, Pei Chen
, Xiaojing Liao
, Guoyi Ye
, Min Yang
:
Understanding and Detecting Abused Image Hosting Modules as Malicious Services. CCS 2023: 3213-3227- 2022
[c4]Geng Hong, Zhemin Yang, Sen Yang
, Xiaojing Liao, Xiaolin Du, Min Yang, Haixin Duan
:
Analyzing Ground-Truth Data of Mobile Gambling Scams. SP 2022: 2176-2193- 2020
[c3]Hao Xia, Yuan Zhang, Yingtian Zhou, Xiaoting Chen
, Yang Wang
, Xiangyu Zhang
, Shuaishuai Cui, Geng Hong, Xiaohan Zhang, Min Yang, Zhemin Yang:
How Android developers handle evolution-induced API compatibility issues: a large-scale study. ICSE 2020: 886-898
2010 – 2019
- 2018
[c2]Lei Zhang
, Zhemin Yang, Yuyu He, Zhenyu Zhang, Zhiyun Qian
, Geng Hong, Yuan Zhang, Min Yang:
Invetter: Locating Insecure Input Validations in Android Services. CCS 2018: 1165-1178
[c1]Geng Hong, Zhemin Yang, Sen Yang
, Lei Zhang
, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian
, Hai-Xin Duan
:
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. CCS 2018: 1701-1713
Coauthor Index
aka: Haixin Duan

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-06 22:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







