Qiujian Lv

Orcid: 0000-0003-1031-185X

According to our database1, Qiujian Lv authored at least 29 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Mitigating the Impact of Malware Evolution on API Sequence-based Windows Malware Detector.
CoRR, 2024

Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks.
Comput. Secur., December, 2023

VN-SMT: An SMT-based Construction Method on Virtual Network to Defend Insider Reconnaissance.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

LWVN: A Lightweight Virtual Network View Method to Defend Lateral Movement.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

UAG: User Action Graph Based on System Logs for Insider Threat Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

CTP: Defending Against Data Poisoning in Attack Traffic Detection Based Deep Neural Networks.
Proceedings of the 8th IEEE International Conference on Network Intelligence and Digital Content, 2023

ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

GHunter: A Fast Subgraph Matching Method for Threat Hunting.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
A novel deep framework for dynamic malware detection based on API sequence intrinsic features.
Comput. Secur., 2022

DMalNet: Dynamic malware analysis based on API feature engineering and graph learning.
Comput. Secur., 2022

A Software Security Entity Relationships Prediction Framework Based on Knowledge Graph Embedding Using Sentence-Bert.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

CyEvent2vec: Attributed Heterogeneous Information Network based Event Embedding Framework for Cyber Security Events Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2022

2021
AOPL: Attention Enhanced Oversampling and Parallel Deep Learning Model for Attack Detection in Imbalanced Network Traffic.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

GSketch: A Comprehensive Graph Analytic Approach for Masquerader Detection Based on File Access Graph.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

ITDBERT: Temporal-semantic Representation for Insider Threat Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Anomaly Detection in Unstructured Logs Using Attention-based Bi-LSTM Network.
Proceedings of the 7th IEEE International Conference on Network Intelligence and Digital Content, 2021

A Few-Shot Class-Incremental Learning Approach for Intrusion Detection.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Density Weighted Diversity Based Query Strategy for Active Learning.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2019
Cyber Profiles Based Risk Prediction of Application Systems for Effective Access Control.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Risk Prediction for Imbalanced Data in Cyber Security : A Siamese Network-based Deep Learning Classification Framework.
Proceedings of the International Joint Conference on Neural Networks, 2019

2018
Measuring Geospatial Properties: Relating Online Content Browsing Behaviors to Users' Points of Interest.
Wirel. Pers. Commun., 2018

A Hybrid Model Based on Multi-dimensional Features for Insider Threat Detection.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

2017
Big Data Driven Hidden Markov Model Based Individual Mobility Prediction at Points of Interest.
IEEE Trans. Veh. Technol., 2017

A Comprehensive Analysis of Video Service Quality on IQIYI from Large-Scale Data Sets.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2017

Linking Virtual Identities across Service Domains: An Online Behavior Modeling Approach.
Proceedings of the 2017 International Conference on Intelligent Environments, 2017

2015
Spatial and temporal mobility analysis in LTE mobile network.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

2014
Hidden Markov Model based user mobility analysis in LTE network.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014


  Loading...