会议论文:
[1] Kaihua Wang, Jianjun Chen, Pinji Chen, Jianwei Zhuge, Jia-Ju Bai, Haixin Duan. Identifying Logical Vulnerabilities in QUIC Implementations. Accepted by NDSS 2026.
[2] Ziwen Liu, Jian Mao, Jun Zeng, Jiawei Li, Qixiao Lin, Jiahao Liu, Jianwei Zhuge, Zhenkai Liang. ProvGuard: Detecting SDN Control Policy Manipulation via Contextual Semantics of Provenance Graphs, NDSS 2025.
[3] Keran Mu, Jianjun Chen, Jianwei Zhuge, Qi Li, Haixin Duan, Nick Feamster. The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing. USENIX Security 2025.
[4] Yi He and Yunchao Guan(Co-first author), Ruoyu Lun, Shangru Song, Zhihao Guo, Jianwei Zhuge*, Jianjun Chen, Qiang Wei, Zehui Wu, Miao Yu, Hetian Shi, Qi Li. Demystifying the Security Implications in IoT Device Rental Services, USENIX Security 2024.
[5] Jiahe Zhang, Jianjun Chen, Qi Wang, Hangyu Zhang, Chuhan Wang, Jianwei Zhuge, Haixin Duan, Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors. 31th ACM Conference on Computer and Communications Security: CCS 2024.
[6] Hetian Shi, Yi He, Qing Wang, Jianwei Zhuge*, Qi Li, Xin Liu. Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(2), 654-676. CHES 2024.
[7] Hetian Shi, Shangru Song, Jianwei Zhuge*, Xin Liu. Poster: Advanced Ultrasonic Jamming Technology for Privacy Protection: Dynamic Inter-modulation Modulation (DIM), IEEE S&P 2024.
[8] Xin Liu, Yuan Tan, Zhenghang Xiao, Jianwei Zhuge*, Rui Zhou. Not The End of Story: An Evaluation of ChatGPT-Driven Vulnerability Description Mappings. ACL 2023, Toronto, Canada.
[9] Hao Wang, Wenjie Qu, Gilad Katz, Wenyu Zhu, Zeyu Gao, Han Qiu, Jianwei Zhuge, Chao Zhang*,jTrans: Jump-Aware Transformer for Binary Code Similarity Detection,ISSTA 2022, 18-22 July 2022, Online.
[10] Baozheng Liu , Chao Zhang* , Guang Gong , Yishun Zeng , Haifeng Ruan , Jianwei Zhuge* . FANS: Fuzzing Android Native System Services via Automated Interface Analysis, USENIX Security 2020.
[11] J. Zhuge*, L. Gu, H. Duan, Investigating China’s Online Underground Economy. Conference on the Political Economy of Information Security in China, San Diego, US, Apr, 2012.
[12] J. Zhuge*, T. Holz, C. Song, J. Guo, X. Han, and W. Zou. Studying Malicious Websites and the Underground Economy on the Chinese Web, In Proceedings of the 7th Workshop on the Economics of Information Security (WEIS’08), Hanover, NH, USA, June 2008.
[13] J. Zhuge*, T. Holz, X. Han, C. Song, and W. Zou. Collecting Autonomous Spreading Malware Using High-interaction Honeypots, In Proceedings of 9th International Conference on Information and Communications Security (ICICS’07), Zhengzhou, China, Lecture Notes in Computer Science 4861, 438~451. Dec 2007.
[14] J. Zhuge*, X. Han, Y. Chen, Z. Ye, and W. Zou. Towards High Level Attack Scenario Graph through Honeynet Data Correlation Analysis, In Proceedings of the 7th IEEE Workshop on Information Assurance (IAW’06), West Point, New York, USA, 2006.
[15] J. Zhuge, and R. Yao*. Security Mechanisms for Wireless Home Network, In Proceedings of IEEE Global Telecommunications Conference 2003 (GLOBECOM’03), Vol. 3, pp. 1527-1531, San Francisco, USA, 2003.
期刊论文:
[1] Zhenhao Tian; Yi He; Nuo Zhang; Qixiao Lin; Hetian Shi; Jianwei Zhuge*; Jian Mao; Deliang Chang. BLMProbe: Enhancing Internet-connected Device Discovery by Automated Device Labeling and Label Migration. IEEE Transactions on Information Forensics and Security ( Early Access ). **DOI: **10.1109/TIFS.2025.3587211.
[2] Zewen Huang and Jinjing Zhuge(Co-first author). * Jianwei Zhuge. Multi-Agent Framework Utilizing Large Language Models for Solving Capture-the-Flag Challenges in Cybersecurity Competitions. Appl. Sci. 2025, 15(13), 7159; https://doi.org/10.3390/app15137159.
[3] Zhang, Zhiyu; Zhuge, Jianwei*; Zhou, Xiaokang. VPLocator: Vulnerability Patch Localization Model Based on LLM. Tsinghua Science and Technology.2026, 31(2):809-822. https://www.sciopen.com/article/10.26599/TST.2024.9010198, https://www.sciopen.com/article/10.26599/TST.2025.9010173.
[4] Qingchen Yu, Xin Liu, Qingguo Zhou, Jianwei Zhuge, Chunming Wu*, Code classification with graph neural networks: Have you ever struggled to make it work? Expert Systems with Applications, Volume 233, 15 December 2023.https://doi.org/10.1016/j.eswa.2023.120978.
[5] Miao Yu, Jianwei Zhuge*, Ming Cao, Zhiwei Shi, and Lin Jiang. A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices. Future Internet 2020, 12(2), 27; https://doi.org/10.3390/fi12020027.
[6] 诸葛建伟,唐勇,韩心慧,段海新. 蜜罐技术研究与应用进展.软件学报,2013, 24(4):825-842.
[7] 诸葛建伟, 陈力波, 田繁, 鲍由之, 陆恂. 基于类型的动态污点分析技术. 清华大学学报: 自然科学版, 52(10): 1320-1328, 2012.
[8] 诸葛建伟,韩心慧,周勇林,等.僵尸网络研究[J].软件学报, 2008, 19(3):702-715.
[9] 诸葛建伟,韩心慧,周勇林,等. HoneyBow:一个基于高交互式蜜罐技术的恶意代码自动捕获器[J].通信学报, 2007, 28(12):6.DOI:10.3321/j.issn:1000-436x.2007.12.002.
[10] 诸葛建伟,韩心慧,叶志远,邹维.基于扩展目标规划图的网络攻击规划识别算法, 计算机学报,2026,29(8):1356-1366. DOI10.3321/j.issn:0254-4164.2006.08.013