2024
DSGN: Log-based anomaly diagnosis with dynamic semantic gate networks.
Inf. Sci., 2024
PromptSAM+: Malware Detection based on Prompt Segment Anything Model.
CoRR, 2024
Mitigating the Impact of Malware Evolution on API Sequence-based Windows Malware Detector.
CoRR, 2024
Autocue : Targeted Textual Adversarial Attacks with Adversarial Prompts.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Smartphone Gait Authentication Based on Activity Recognition Task in Unconstrained Environment.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
MLNT: A Multi-Level Network Traps Deployment Method.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks.
Comput. Secur., December, 2023
CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication.
Comput. Secur., May, 2023
VN-SMT: An SMT-based Construction Method on Virtual Network to Defend Insider Reconnaissance.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023
DTrap: A cyberattack-defense confrontation technique based on Moving Target Defense.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
LWVN: A Lightweight Virtual Network View Method to Defend Lateral Movement.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
IAD-Net: Multivariate KPIs Interpretable Anomaly Detection with Dual Gated Residual Fusion Networks.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
UAG: User Action Graph Based on System Logs for Insider Threat Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
AdaptParse: Adaptive Contextual Aware Attention Network for Log Parsing via Word Classification.
Proceedings of the International Joint Conference on Neural Networks, 2023
ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
CTP: Defending Against Data Poisoning in Attack Traffic Detection Based Deep Neural Networks.
Proceedings of the 8th IEEE International Conference on Network Intelligence and Digital Content, 2023
ABTD-Net: Autonomous Baggage Threat Detection Networks for X-ray Images.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Prompt Makes mask Language Models Better Adversarial Attackers.
Proceedings of the IEEE International Conference on Acoustics, 2023
ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
GHunter: A Fast Subgraph Matching Method for Threat Hunting.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection.
Knowl. Inf. Syst., 2022
A novel deep framework for dynamic malware detection based on API sequence intrinsic features.
Comput. Secur., 2022
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning.
Comput. Secur., 2022
A Software Security Entity Relationships Prediction Framework Based on Knowledge Graph Embedding Using Sentence-Bert.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
DGQAN: Dual Graph Question-Answer Attention Networks for Answer Selection.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022
Implicit Continuous Authentication Model Based on Mobile Terminal Touch Behavior.
Proceedings of the IEEE Symposium on Computers and Communications, 2022
MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios.
Proceedings of the IEEE Symposium on Computers and Communications, 2022
CyEvent2vec: Attributed Heterogeneous Information Network based Event Embedding Framework for Cyber Security Events Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2022
2021
AOPL: Attention Enhanced Oversampling and Parallel Deep Learning Model for Attack Detection in Imbalanced Network Traffic.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Multi-Modal fake news Detection on Social Media with Dual Attention Fusion Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
FKTAN: Fusion Keystroke Time-Textual Attention Networks for Continuous Authentication.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
GSketch: A Comprehensive Graph Analytic Approach for Masquerader Detection Based on File Access Graph.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
ITDBERT: Temporal-semantic Representation for Insider Threat Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Sprelog: Log-Based Anomaly Detection with Self-matching Networks and Pre-trained Models.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021
BERTDAN: Question-Answer Dual Attention Fusion Networks with Pre-trained Models for Answer Selection.
Proceedings of the Neural Information Processing - 28th International Conference, 2021
Anomaly Detection in Unstructured Logs Using Attention-based Bi-LSTM Network.
Proceedings of the 7th IEEE International Conference on Network Intelligence and Digital Content, 2021
2020
AMQAN: Adaptive Multi-Attention Question-Answer Networks for Answer Selection.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2020
2019
Cyber Profiles Based Risk Prediction of Application Systems for Effective Access Control.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Risk Prediction for Imbalanced Data in Cyber Security : A Siamese Network-based Deep Learning Classification Framework.
Proceedings of the International Joint Conference on Neural Networks, 2019
2018
A Hybrid Model Based on Multi-dimensional Features for Insider Threat Detection.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
2017
Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
Botnet Detection Method Analysis on the Effect of Feature Extraction.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
2015
An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks.
Proceedings of the Information and Communications Security - 17th International Conference, 2015