Sledovat
Li Zhenyuan
Li Zhenyuan
E-mailová adresa ověřena na: zju.edu.cn - Domovská stránka
Název
Citace
Citace
Rok
AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports
Z Li, J Zeng, Y Chen, Z Liang
European Symposium on Research in Computer Security, 589-609, 2022
922022
Threat detection and investigation with system-level provenance graphs: A survey
Z Li, QA Chen, R Yang, Y Chen, W Ruan
Computers & Security 106, 102282, 2021
682021
Effective and light-weight deobfuscation and semantic-aware attack detection for powershell scripts
Z Li, QA Chen, C Xiong, Y Chen, T Zhu, H Yang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
472019
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows
R Yang, X Chen, H Xu, Y Cheng, C Xiong, L Ruan, M Kavousi, Z Li, L Xu, ...
IEEE Transactions on Dependable and Secure Computing 19 (3), 1621-1638, 2020
182020
Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts
C Xiong, Z Li, Y Chen, T Zhu, J Wang, H Yang, W Ruan
Frontiers of Information Technology & Electronic Engineering 23 (3), 361-381, 2022
62022
Decoding the mitre engenuity att&ck enterprise evaluation: An analysis of edr performance in real-world environments
X Shen, Z Li, G Burleigh, L Wang, Y Chen
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
12024
Poster: Towards automated and large-scale cyber attack reconstruction with apt reports
Z Li, A Soltani, A Yusof, AC Risdianto, K Huang, J Zeng, Z Liang, Y Chen
NDSS, 0
1
From Sands to Mansions: Enabling Automatic Full-Life-Cycle Cyberattack Construction with LLM
L Wang, J Wang, K Jung, K Thiagarajan, E Wei, X Shen, Y Chen, Z Li
arXiv preprint arXiv:2407.16928, 2024
2024
An Automated Alert Cross-Verification System with Graph Neural Networks for IDS Events
L Li, Y He, F Huang, Z Zhao, Z Song, T Zhou, Z Li, F Zhang
2024 27th International Conference on Computer Supported Cooperative Work in …, 2024
2024
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection
L Wang, X Shen, W Li, Z Li, R Sekar, H Liu, Y Chen
arXiv preprint arXiv:2404.14720, 2024
2024
TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events
Z Li, Y Wei, X Shen, L Wang, Y Chen, H Xu, S Ji, F Zhang
arXiv preprint arXiv:2403.12541, 2024
2024
Paris: A Practical, Adaptive Trace-Fetching and Real-Time Malicious Behavior Detection System
J Wang, L Wang, Z Li, H Yu, X Shen, Y Chen
Adaptive Trace-Fetching and Real-Time Malicious Behavior Detection System, 0
A First Look at Evasion against Provenance Graph-based Threat Detection
Z Li, R Yang, QA Chen, Y Chen
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–13