Magnifier: Detecting Network Access via Lightweight Traffic-based Fingerprints.
CoRR, 2024
Stories behind decisions: Towards interpretable malware family classification with hierarchical attention.
Comput. Secur., 2024
A LLM-based agent for the automatic generation and generalization of IDS rules.
Proceedings of the 23rd IEEE International Conference on Trust, 2024
A Framework for Intelligent Generation of Intrusion Detection Rules Based on Grad-CAM.
Proceedings of the Computational Science - ICCS 2024, 2024
CAFE: Robust Detection of Malicious Macro based on Cross-modal Feature Extraction.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Poster: Towards Real-Time Intrusion Detection with Explainable AI-Based Detector.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Poster: PGPNet: Classify APT Malware Using Prediction-Guided Prototype Network.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
ProGraph: Robust Network Traffic Identification With Graph Propagation.
IEEE/ACM Trans. Netw., June, 2023
Prism: Real-Time Privacy Protection Against Temporal Network Traffic Analyzers.
IEEE Trans. Inf. Forensics Secur., 2023
AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Payload Level Graph Attention Network for Web Attack Traffic Detection.
Proceedings of the Computational Science - ICCS 2023, 2023
Towards Open-Set APT Malware Classification under Few-Shot Setting.
Proceedings of the IEEE Global Communications Conference, 2023
PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Robust network traffic identification with graph matching.
Comput. Networks, 2022
High-Efficient and Few-shot Adaptive Encrypted Traffic Classification with Deep Tree.
Proceedings of the IEEE Military Communications Conference, 2022
AMDetector: Detecting Large-Scale and Novel Android Malware Traffic with Meta-learning.
Proceedings of the Computational Science - ICCS 2022, 2022
A Glimpse of the Whole: Detecting Few-shot Android Malware Encrypted Network Traffic.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Mining Trojan Detection Based on Multi-dimensional Static Features.
Proceedings of the Science of Cyber Security - Third International Conference, 2021
HSLF: HTTP Header Sequence Based LSH Fingerprints for Application Traffic Classification.
Proceedings of the Computational Science - ICCS 2021, 2021