Zhenyuan Li

Orcid: 0000-0002-7712-0292

According to our database1, Zhenyuan Li authored at least 19 papers between 2019 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
From Sands to Mansions: Enabling Automatic Full-Life-Cycle Cyberattack Construction with LLM.
CoRR, 2024

Towards Dynamic Resource Allocation and Client Scheduling in Hierarchical Federated Learning: A Two-Phase Deep Reinforcement Learning Approach.
CoRR, 2024

Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection.
CoRR, 2024

TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events.
CoRR, 2024

Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments.
CoRR, 2024

Formal Verification Techniques for Post-quantum Cryptography: A Systematic Review.
Proceedings of the Engineering of Complex Computer Systems - 28th International Conference, 2024

An Automated Alert Cross-Verification System with Graph Neural Networks for IDS Events.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Expensive Optimization Based on Evolutionary Multi-Tasking and Hybrid Restart Strategy.
Proceedings of the IEEE Congress on Evolutionary Computation, 2024

Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2022
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows.
IEEE Trans. Dependable Secur. Comput., 2022

Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts.
Frontiers Inf. Technol. Electron. Eng., 2022

A Method for Residual Network Image Classification with Multi-scale Feature Fusion.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Two-Phase Deep Reinforcement Learning of Dynamic Resource Allocation and Client Selection for Hierarchical Federated Learning.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Threat detection and investigation with system-level provenance graphs: A survey.
Comput. Secur., 2021

A Data Processing Method for Load Data of Electric Boiler with Heat Reservoir.
Proceedings of the Intelligent Computing Theories and Application, 2021

2020
Threat Detection and Investigation with System-level Provenance Graphs: A Survey.
CoRR, 2020

Research on Ultra-Short-Term Wind Power Prediction Considering Source Relevance.
IEEE Access, 2020

2019
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019


  Loading...