About Me

  • Hello, I am Shenglong, my English name is James.
  • I am currently a second year CS PhD Student supervised by Prof. Wenke Lee at Georgia Tech in Computer Security.
  • I got my B.S. in CS from City University of Hong Kong, supervised by Prof. Cong Wang.
  • Before joining Georgia Tech, I have worked as a research intern at UCSB SecLab with Prof Christopher Kruegel and Prof. Giovanni Vigna.

Research Interest

  • I am interested in everything related to computer security.
  • Currently, my research interests include but are not limited to software security and system security. I am also interested in applying machine learning method in security area.
  • My detailed research experience can be seen in my cv.

Publication

  • Yiren Liu, S. Joe Qin, Xiangyu Zhao, Yixiao HUANG, Shenglong Yao, Guo Han. “Dynamic Statistical Learning with Engineered Features Outperforms Deep Neural Networks for Smart Building Cooling Load Predictions”. Accepted by NeurIPS 2022 Workshop ICBINB. [pdf], [poster]
  • Jiasi Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang. “Proof of Unlearning: Definitions and Instantiation”. Submitted to IEEE Transactions on Information Forensics & Security. [pdf]

Service

  • Official Reviewer for NeurIPS 2023 Workshop ICBINB
  • Official Reviewer for IEEE Transactions on Information Forensics & Security

Personal Interest

  • I am interested in hacking and like playing CTF competitions as a PWNer.
  • I am the leader of CITYFHK CTF Team of CityU and team member of Shellphish CTF Team.
  • In my leisure time, I prefer to do computer geek activities and electronic DIYs.
  • I also enjoy sports activities such as table tennis, soccer and swimming.

Skills

  • Programming Language: C/C++, Java, Python, JavaScript
  • Hacking: Master proficient skills in binary exploitation (PWN) and web hacking
  • Back-end Operation: Good Knowledge of Linux, Cloud Computing and Server / Container Management
  • Artificial Intelligence: Good knowledge of Machine Learning and Large Language Model, Competition experience in data wrangling and model training
  • ML & Security: Knowledge in Machine Learning Robustness and Adversarial Attack
  • Program Analysis: Skills in common static and dynamic software analysis tools such as Intel Pin and LLVM