Wenke Lee
Orcid: 0000-0003-2761-1277Affiliations:
- Georgia Institute of Technology, Atlanta GA, USA
According to our database1,
Wenke Lee
authored at least 228 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2017, "For contributions to systems and network security, intrusion and anomaly detection, and malware analysis".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
RL-ARNE: A Reinforcement Learning Algorithm for Computing Average Reward Nash Equilibrium of Nonzero-Sum Stochastic Games.
IEEE Trans. Autom. Control., November, 2024
Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach.
IEEE Trans. Autom. Control., October, 2024
Stochastic Dynamic Information Flow Tracking game using supervised learning for detecting advanced persistent threats.
Autom., January, 2024
Revisiting Non-separable Binary Classification and its Applications in Anomaly Detection.
Trans. Mach. Learn. Res., 2024
Optimal Classification-based Anomaly Detection with Neural Networks: Theory and Practice.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web.
Proceedings of the 33rd USENIX Security Symposium, 2024
Jasmine: Scale up JavaScript Static Security Analysis with Computation-based Semantic Explanation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Second Tiny Papers Track at ICLR 2024, 2024
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
2023
Bridging Both Worlds in Semantics and Time: Domain Knowledge Based Analysis and Correlation of Industrial Process.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats.
IEEE Trans. Autom. Control., 2020
A Multi-Agent Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Advanced Persistent Threats.
CoRR, 2020
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the 28th USENIX Security Symposium, 2019
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
Dynamic Information Flow Tracking Games for Simultaneous Detection of Multiple Attackers.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019
Learning Equilibria in Stochastic Information Flow Tracking Games with Partial Knowledge.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching.
Proceedings of the 2019 American Control Conference, 2019
2018
A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats.
CoRR, 2018
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Proceedings of the 57th IEEE Conference on Decision and Control, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
CoRR, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the Provenance and Annotation of Data and Processes, 2016
Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
CoRR, 2012
Proceedings of the 21st World Wide Web Conference 2012, 2012
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the 20th International Conference on World Wide Web, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
PEASOUP: preventing exploits against software of uncertain provenance (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
A combinatorial approach to network covert communications with applications in Web Leaks.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Understanding the prevalence and use of alternative plans in malware with network games.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010
Proceedings of the Computer Security, 2010
Proceedings of the Detection of Intrusions and Malware, 2010
Proceedings of the 49th IEEE Conference on Decision and Control, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Comput. Networks, 2009
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Pattern Recognit. Lett., 2008
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
Proceedings of the 17th USENIX Security Symposium, 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the Computer Security, 2008
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
Principled reasoning and practical applications of alert fusion in intrusion detection systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
ACM SIGOPS Oper. Syst. Rev., 2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Network and Distributed System Security Symposium, 2006
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006
Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems.
Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
Proceedings of the Computer Security, 2006
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Evading network anomaly detection systems: formal reasoning and practical techniques.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the 2005 International Conference on Compilers, 2005
2004
Proceedings of the Practical Handbook of Internet Computing., 2004
Knowl. Inf. Syst., 2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004
Proceedings of the 12th International Workshop on Modeling, 2004
Proceedings of the Computer Security, 2004
Proceedings of the 43rd IEEE Conference on Decision and Control, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003
Proactive Intrusion Detection and SNMP-based Security Management: New Experiments and Validation.
Proceedings of the Integrated Network Management VII, Managing It All, 2003
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003
2002
Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility.
SIGKDD Explor., 2002
Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management.
J. Netw. Syst. Manag., 2002
J. Comput. Secur., 2002
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002
Proceedings of the 2002 Workshop on New Security Paradigms, 2002
Proceedings of the Management Solutions for the New Communications World, 2002
Proceedings of the 41st IEEE Conference on Decision and Control, 2002
Proceedings of the Applications of Data Mining in Computer Security, 2002
Proceedings of the Applications of Data Mining in Computer Security, 2002
2001
SIGMOD Rec., 2001
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001
Proceedings of the New Security Paradigms Workshop 2001, 2001
Proactive Detection of Distributed Denial of Service Attacks using MIB Traffic Variables - A Feasibility Study.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001
2000
ACM Trans. Inf. Syst. Secur., 2000
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000
Proceedings of the MOBICOM 2000, 2000
Proceedings of the Machine Learning: ECML 2000, 11th European Conference on Machine Learning, Barcelona, Catalonia, Spain, May 31, 2000
1999
Interfacing Oz with the PCTE OMS: A Case Study of Integrating a Legacy System with a Standard Object Management System.
J. Syst. Integr., 1999
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999
Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1999
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999
1998
Proceedings of the 7th USENIX Security Symposium, 1998
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), 1998
1997
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining (KDD-97), 1997
Proceedings of the Graph Drawing, 5th International Symposium, 1997