Zhenyuan Li
Orcid: 0000-0002-7712-0292
According to our database1,
Zhenyuan Li
authored at least 19 papers
between 2019 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
From Sands to Mansions: Enabling Automatic Full-Life-Cycle Cyberattack Construction with LLM.
CoRR, 2024
Towards Dynamic Resource Allocation and Client Scheduling in Hierarchical Federated Learning: A Two-Phase Deep Reinforcement Learning Approach.
CoRR, 2024
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection.
CoRR, 2024
TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events.
CoRR, 2024
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments.
CoRR, 2024
Proceedings of the Engineering of Complex Computer Systems - 28th International Conference, 2024
An Automated Alert Cross-Verification System with Graph Neural Networks for IDS Events.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Expensive Optimization Based on Evolutionary Multi-Tasking and Hybrid Restart Strategy.
Proceedings of the IEEE Congress on Evolutionary Computation, 2024
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2022
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows.
IEEE Trans. Dependable Secur. Comput., 2022
Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts.
Frontiers Inf. Technol. Electron. Eng., 2022
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
Two-Phase Deep Reinforcement Learning of Dynamic Resource Allocation and Client Selection for Hierarchical Federated Learning.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Comput. Secur., 2021
Proceedings of the Intelligent Computing Theories and Application, 2021
2020
CoRR, 2020
IEEE Access, 2020
2019
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019