Zhichun Li
Orcid: 0009-0003-5029-4246
According to our database1,
Zhichun Li
authored at least 67 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Enhancing Gastrointestinal Stromal Tumor (GIST) Diagnosis: An Improved YOLOv8 Deep Learning Approach for Precise Mitotic Detection.
IEEE Access, 2024
IEEE Access, 2024
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
Physical-Layer Adversarial Robustness for Deep Learning-Based Semantic Communications.
IEEE J. Sel. Areas Commun., August, 2023
Research on Electromagnetic Effect Generated by DC Converter on Human Body in Electric Vehicle.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023
2022
Enhancing Revisitation in Touchscreen Reading for Visually Impaired People with Semantic Navigation Design.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
SemBAT: Physical Layer Black-box Adversarial Attacks for Deep Learning-based Semantic Communication Systems.
Proceedings of the 96th Vehicular Technology Conference, 2022
2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security.
Proc. VLDB Endow., 2019
A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security.
CoRR, 2019
Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification.
Proceedings of the 2019 SIAM International Conference on Data Mining, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
CoRR, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
TwistBlocks: Pluggable and Twistable Modular TUI for Armature Interaction in 3D Design.
Proceedings of the Twelfth International Conference on Tangible, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018
Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Accelerating Dependency Graph Learning from Heterogeneous Categorical Event Streams via Knowledge Transfer.
CoRR, 2017
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proc. VLDB Endow., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the Genetic and Evolutionary Computing, 2014
2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications.
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Thwarting zero-day polymorphic worms with network-level length-based signature generation.
IEEE/ACM Trans. Netw., 2010
Comput. Networks, 2010
NetShield: massive semantics-based vulnerability signature matching for high-speed networks.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008
2007
IEEE/ACM Trans. Netw., 2007
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms.
Proceedings of the IEEE International Conference on Network Protocols, 2007
2006
IEEE Computer Graphics and Applications, 2006
Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Towards scalable and robust distributed intrusion alert fusion with good load balancing.
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, 2006
Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006
2005
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005