2025
DWFS-Obfuscation: Dynamic Weighted Feature Selection for Robust Malware Familial Classification under Obfuscation.
CoRR, April, 2025
2024
Mitigating the Impact of Malware Evolution on API Sequence-based Windows Malware Detector.
CoRR, 2024
BehaMiner: System Behavior Mining for Audit Log Based on Graph Learning.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
GNNexPIDS: An Interpretation Method for Provenance-Based Intrusion Detection Based on GNNExplainer.
Proceedings of the Science of Cyber Security - 6th International Conference, 2024
2023
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks.
Comput. Secur., December, 2023
VN-SMT: An SMT-based Construction Method on Virtual Network to Defend Insider Reconnaissance.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023
LWVN: A Lightweight Virtual Network View Method to Defend Lateral Movement.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
UAG: User Action Graph Based on System Logs for Insider Threat Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
CTP: Defending Against Data Poisoning in Attack Traffic Detection Based Deep Neural Networks.
Proceedings of the 8th IEEE International Conference on Network Intelligence and Digital Content, 2023
ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
GHunter: A Fast Subgraph Matching Method for Threat Hunting.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
A novel deep framework for dynamic malware detection based on API sequence intrinsic features.
Comput. Secur., 2022
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning.
Comput. Secur., 2022
A Software Security Entity Relationships Prediction Framework Based on Knowledge Graph Embedding Using Sentence-Bert.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios.
Proceedings of the IEEE Symposium on Computers and Communications, 2022
CyEvent2vec: Attributed Heterogeneous Information Network based Event Embedding Framework for Cyber Security Events Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2022
2021
AOPL: Attention Enhanced Oversampling and Parallel Deep Learning Model for Attack Detection in Imbalanced Network Traffic.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
GSketch: A Comprehensive Graph Analytic Approach for Masquerader Detection Based on File Access Graph.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
ITDBERT: Temporal-semantic Representation for Insider Threat Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Anomaly Detection in Unstructured Logs Using Attention-based Bi-LSTM Network.
Proceedings of the 7th IEEE International Conference on Network Intelligence and Digital Content, 2021
A Few-Shot Class-Incremental Learning Approach for Intrusion Detection.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Density Weighted Diversity Based Query Strategy for Active Learning.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
2019
Cyber Profiles Based Risk Prediction of Application Systems for Effective Access Control.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Risk Prediction for Imbalanced Data in Cyber Security : A Siamese Network-based Deep Learning Classification Framework.
Proceedings of the International Joint Conference on Neural Networks, 2019
2018
Measuring Geospatial Properties: Relating Online Content Browsing Behaviors to Users' Points of Interest.
Wirel. Pers. Commun., 2018
A Hybrid Model Based on Multi-dimensional Features for Insider Threat Detection.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
2017
Big Data Driven Hidden Markov Model Based Individual Mobility Prediction at Points of Interest.
IEEE Trans. Veh. Technol., 2017
A Comprehensive Analysis of Video Service Quality on IQIYI from Large-Scale Data Sets.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2017
Linking Virtual Identities across Service Domains: An Online Behavior Modeling Approach.
Proceedings of the 2017 International Conference on Intelligent Environments, 2017
2015
Spatial and temporal mobility analysis in LTE mobile network.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015
2014
Hidden Markov Model based user mobility analysis in LTE network.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014