<i>Adonis</i>: Practical and Efficient Control Flow Recovery through OS-level Traces.
ACM Trans. Softw. Eng. Methodol., January, 2024
Query Provenance Analysis for Robust and Efficient Query-based Black-box Attack Defense.
CoRR, 2024
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Instance segmentation based 6D pose estimation of industrial objects using point clouds for robotic bin-picking.
Robotics Comput. Integr. Manuf., August, 2023
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Research on Virtual Simulation of Flood Propagation in Agricultural Area Under the Land Subsidence.
Proceedings of the Computer and Computing Technologies in Agriculture X, 2016
Application of GIS and Modified DRASTIC Model Based on Entropy Weight and Fuzzy Theory to Ground Water Vulnerability Evaluation.
Proceedings of the Computer and Computing Technologies in Agriculture X, 2016