


default search action
Ling Shi 0002
Person information
- affiliation: Nanyang Technological University, Singapore
- affiliation (PhD 2014): National University of Singapore, Singapore
Other persons with the same name
- Ling Shi — disambiguation page
- Ling Shi 0001
— Hong Kong University of Science and Technology, Hong Kong (and 1 more) - Ling Shi 0003 — Statsbygg, Oslo, Norway
- Ling Shi 0004 — Tianjin University, College of Intelligence and Computing, TJUNLP Lab, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[c19]Shide Zhou, Tianlin Li, Kailong Wang, Yihao Huang, Ling Shi, Yang Liu, Haoyu Wang:
Understanding the Effectiveness of Coverage Criteria for Large Language Models: A Special Angle from Jailbreak Attacks. ICSE 2025: 730-742
[c18]Zihao Xu, Yi Liu, Gelei Deng, Kailong Wang, Yuekang Li
, Ling Shi, Stjepan Picek:
Continuous Embedding Attacks via Clipped Inputs in Jailbreaking Large Language Models. SP (Workshops) 2025: 270-277
[i21]Ningke Li, Yahui Song, Kailong Wang, Yuekang Li
, Ling Shi, Yi Liu, Haoyu Wang:
Detecting LLM Fact-conflicting Hallucinations Enhanced by Temporal-logic-based Reasoning. CoRR abs/2502.13416 (2025)
[i20]Junzhe Yu, Yi Liu, Huijia Sun, Ling Shi, Yuqi Chen:
Breaking the Loop: Detecting and Mitigating Denial-of-Service Vulnerabilities in Large Language Models. CoRR abs/2503.00416 (2025)
[i19]Shide Zhou, Kailong Wang, Ling Shi, Haoyu Wang:
Exposing the Ghost in the Transformer: Abnormal Detection for Large Language Models via Hidden State Forensics. CoRR abs/2504.00446 (2025)
[i18]Zhibo Zhang, Yuxi Li, Kailong Wang, Shuai Yuan, Ling Shi, Haoyu Wang:
Circumventing Safety Alignment in Large Language Models Through Embedding Space Toxicity Attenuation. CoRR abs/2507.08020 (2025)
[i17]Fan Yang, Yihao Huang, Jiayi Zhu, Ling Shi, Geguang Pu, Jin Song Dong, Kailong Wang:
Seeing It Before It Happens: In-Generation NSFW Detection for Diffusion-Based Text-to-Image Models. CoRR abs/2508.03006 (2025)
[i16]Baijun Cheng, Kailong Wang, Ling Shi, Haoyu Wang, Yao Guo, Ding Li, Xiangqun Chen:
Enhancing Semantic Understanding in Pointer Analysis using Large Language Models. CoRR abs/2508.21454 (2025)
[i15]Baijun Cheng, Kailong Wang, Ling Shi, Haoyu Wang, Peng Di, Yao Guo, Ding Li, Xiangqun Chen:
Boosting Pointer Analysis With Large Language Model-Enhanced Allocation Function Detection. CoRR abs/2509.22530 (2025)- 2024
[j5]Ningke Li
, Yuekang Li
, Yi Liu
, Ling Shi
, Kailong Wang
, Haoyu Wang
:
Drowzee: Metamorphic Testing for Fact-Conflicting Hallucination Detection in Large Language Models. Proc. ACM Program. Lang. 8(OOPSLA2): 1843-1872 (2024)
[j4]Yuxi Li
, Yi Liu
, Gelei Deng
, Ying Zhang
, Wenjia Song
, Ling Shi
, Kailong Wang
, Yuekang Li
, Yang Liu
, Haoyu Wang
:
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection. Proc. ACM Softw. Eng. 1(FSE): 2075-2097 (2024)
[c17]Zhaoyu Liu, Murong Ma, Kan Jiang, Zhe Hou
, Ling Shi, Jin Song Dong:
PCSP# Denotational Semantics with an Application in Sports Analytics. The Application of Formal Methods 2024: 71-102
[c16]Mingke Yang
, Yuqi Chen
, Yi Liu
, Ling Shi
:
DistillSeq: A Framework for Safety Alignment Testing in Large Language Models using Knowledge Distillation. ISSTA 2024: 578-589
[c15]Baijun Cheng, Cen Zhang
, Kailong Wang
, Ling Shi
, Yang Liu
, Haoyu Wang, Yao Guo, Ding Li, Xiangqun Chen:
Semantic-Enhanced Indirect Call Analysis with Large Language Models. ASE 2024: 430-442
[c14]Yi Liu
, Junzhe Yu
, Huijia Sun
, Ling Shi
, Gelei Deng
, Yuqi Chen, Yang Liu
:
Efficient Detection of Toxic Prompts in Large Language Models. ASE 2024: 455-467
[c13]Zhibo Zhang
, Wuxia Bai
, Yuxi Li
, Mark Huasong Meng
, Kailong Wang
, Ling Shi
, Li Li
, Jun Wang, Haoyu Wang:
GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models. ASE 2024: 643-655
[i14]Jie Li, Yi Liu, Chongyang Liu, Ling Shi, Xiaoning Ren, Yaowen Zheng, Yang Liu, Yinxing Xue:
A Cross-Language Investigation into Jailbreak Attacks in Large Language Models. CoRR abs/2401.16765 (2024)
[i13]Yi Liu, Guowei Yang
, Gelei Deng, Feiyue Chen, Yuqi Chen, Ling Shi, Tianwei Zhang, Yang Liu
:
Groot: Adversarial Testing for Generative Text-to-Image Models with Tree-based Semantic Transformation. CoRR abs/2402.12100 (2024)
[i12]Yuxi Li, Yi Liu, Gelei Deng, Ying Zhang, Wenjia Song, Ling Shi, Kailong Wang
, Yuekang Li
, Yang Liu, Haoyu Wang:
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection. CoRR abs/2404.09894 (2024)
[i11]Ningke Li, Yuekang Li
, Yi Liu, Ling Shi, Kailong Wang
, Haoyu Wang:
HalluVault: A Novel Logic Programming-aided Metamorphic Testing Framework for Detecting Fact-Conflicting Hallucinations in Large Language Models. CoRR abs/2405.00648 (2024)
[i10]Yuxi Li, Yi Liu, Yuekang Li
, Ling Shi, Gelei Deng, Shengquan Chen, Kailong Wang
:
Lockpicking LLMs: A Logit-Based Jailbreak Using Token-level Manipulation. CoRR abs/2405.13068 (2024)
[i9]Mingke Yang, Yuqi Chen, Yi Liu, Ling Shi:
DistillSeq: A Framework for Safety Alignment Testing in Large Language Models using Knowledge Distillation. CoRR abs/2407.10106 (2024)
[i8]Zihao Xu, Yi Liu, Gelei Deng, Kailong Wang
, Yuekang Li
, Ling Shi, Stjepan Picek:
Continuous Embedding Attacks via Clipped Inputs in Jailbreaking Large Language Models. CoRR abs/2407.13796 (2024)
[i7]Shide Zhou, Tianlin Li, Yihao Huang, Ling Shi, Kailong Wang
, Yang Liu
, Haoyu Wang:
NeuSemSlice: Towards Effective DNN Model Maintenance via Neuron-level Semantic Slicing. CoRR abs/2407.20281 (2024)
[i6]Baijun Cheng, Ce Zhang, Kailong Wang
, Ling Shi, Yang Liu, Haoyu Wang, Yao Guo, Xiangqun Chen:
Semantic-Enhanced Indirect Call Analysis with Large Language Models. CoRR abs/2408.04344 (2024)
[i5]Zhibo Zhang, Wuxia Bai, Yuxi Li, Mark Huasong Meng, Kailong Wang
, Ling Shi, Li Li
, Jun Wang, Haoyu Wang:
GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models. CoRR abs/2408.04905 (2024)
[i4]Yi Liu, Junzhe Yu, Huijia Sun, Ling Shi, Gelei Deng, Yuqi Chen, Yang Liu:
Efficient Detection of Toxic Prompts in Large Language Models. CoRR abs/2408.11727 (2024)
[i3]Shide Zhou, Tianlin Li, Kailong Wang
, Yihao Huang, Ling Shi, Yang Liu
, Haoyu Wang:
Investigating Coverage Criteria in Large Language Models: An In-Depth Study Through Jailbreak Attacks. CoRR abs/2408.15207 (2024)
[i2]Fan Yang, Yihao Huang, Kailong Wang, Ling Shi, Geguang Pu, Yang Liu
, Haoyu Wang:
Efficient and Effective Universal Adversarial Attack against Vision-Language Pre-training Models. CoRR abs/2410.11639 (2024)
[i1]Yuxi Li, Zhibo Zhang, Kailong Wang, Ling Shi, Haoyu Wang:
Model-Editing-Based Jailbreak against Safety-aligned Large Language Models. CoRR abs/2412.08201 (2024)- 2021
[j3]Kulani Mahadewa
, Kailong Wang
, Guangdong Bai
, Ling Shi
, Yan Liu
, Jin Song Dong, Zhenkai Liang:
Scrutinizing Implementations of Smart Home Integrations. IEEE Trans. Software Eng. 47(12): 2667-2683 (2021)
[c12]Bo Gao, Siyuan Shen, Ling Shi, Jiaying Li, Jun Sun, Lei Bu
:
Verification Assisted Gas Reduction for Smart Contracts. APSEC 2021: 264-274
[c11]Bo Gao, Ling Shi, Jiaying Li, Jialiang Chang, Jun Sun, Zijiang Yang:
sVerify: Verifying Smart Contracts Through Lazy Annotation and Learning. ISoLA 2021: 453-469
2010 – 2019
- 2019
[c10]Yongxin Zhao, Xiujuan Zhang, Ling Shi, Gan Zeng, Feng Sheng, Shuang Liu:
Towards a Formal Approach to Defining and Computing the Complexity of Component Based Software. APSEC 2019: 331-338
[c9]Siteng Cao, Yongxin Zhao, Ling Shi:
Software Complexity Reduction by Automated Refactoring Schema. TASE 2019: 208-215- 2018
[j2]Ling Shi
, Yongxin Zhao, Yang Liu
, Jun Sun, Jin Song Dong, Shengchao Qin
:
A UTP semantics for communicating processes with shared variables and its formal encoding in PVS. Formal Aspects Comput. 30(3-4): 351-380 (2018)
[c8]Kulani Tharaka Mahadewa
, Kailong Wang
, Guangdong Bai
, Ling Shi, Jin Song Dong, Zhenkai Liang:
HOMESCAN: Scrutinizing Implementations of Smart Home Integrations. ICECCS 2018: 21-30- 2017
[c7]Ling Shi, Shuang Liu, Jianye Hao, Jun Yang Koh, Zhe Hou
, Jin Song Dong:
Towards Solving Decision Making Problems Using Probabilistic Model Checking. ICECCS 2017: 150-153- 2015
[c6]Jin Song Dong, Ling Shi, Le Vu Nguyen Chuong, Kan Jiang
, Jing Sun
:
Sports Strategy Analytics Using Probabilistic Reasoning. ICECCS 2015: 182-185
[c5]Jin Song Dong, Jun Sun
, Yang Liu
, Yuan-Fang Li
, Jing Sun
, Ling Shi:
Event and Strategy Analytics. TASE 2015: 4-6- 2013
[j1]Jun Sun
, Yang Liu, Jin Song Dong, Yan Liu, Ling Shi
, Étienne André
:
Modeling and verifying hierarchical real-time systems using stateful timed CSP. ACM Trans. Softw. Eng. Methodol. 22(1): 3:1-3:29 (2013)
[c4]Ling Shi, Yongxin Zhao, Yang Liu
, Jun Sun
, Jin Song Dong, Shengchao Qin
:
A UTP Semantics for Communicating Processes with Shared Variables. ICFEM 2013: 215-230- 2012
[c3]Ling Shi, Yang Liu
, Jun Sun
, Jin Song Dong, Gustavo Carvalho:
An Analytical and Experimental Comparison of CSP Extensions and Tools. ICFEM 2012: 381-397- 2010
[c2]Ling Shi, Yan Liu:
Modeling and Verification of Transmission Protocols: A Case Study on CSMA/CD Protocol. SSIRI (Companion) 2010: 143-149
2000 – 2009
- 2008
[c1]Min Zhang, Ling Shi, Longfei Zhu, Yifei Wang, Libo Feng, Geguang Pu:
A Bigraphical Model of WSBPEL. TASE 2008: 117-120
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-03 02:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







