Zhichun Li

Orcid: 0009-0003-5029-4246

According to our database1, Zhichun Li authored at least 67 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Gastrointestinal Stromal Tumor (GIST) Diagnosis: An Improved YOLOv8 Deep Learning Approach for Precise Mitotic Detection.
IEEE Access, 2024

Prototype Comparison Convolutional Networks for One-Shot Segmentation.
IEEE Access, 2024

BeeZip: Towards An Organized and Scalable Architecture for Data Compression.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Physical-Layer Adversarial Robustness for Deep Learning-Based Semantic Communications.
IEEE J. Sel. Areas Commun., August, 2023

Gamify Stencil Dwarf on Cloud for Democratizing Scientific Computing.
CoRR, 2023

Research on Electromagnetic Effect Generated by DC Converter on Human Body in Electric Vehicle.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

2022
Enhancing Revisitation in Touchscreen Reading for Visually Impaired People with Semantic Navigation Design.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

SemBAT: Physical Layer Black-box Adversarial Attacks for Deep Learning-based Semantic Communication Systems.
Proceedings of the 96th Vehicular Technology Conference, 2022

2021
Anomalous Event Sequence Detection.
IEEE Intell. Syst., 2021

UTrack: Enterprise User Tracking Based on OS-Level Audit Logs.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
APTrace: A Responsive System for Agile Enterprise Level Causality Analysis.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Detecting Malware Injection with Program-DNS Behavior.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security.
Proc. VLDB Endow., 2019

Heterogeneous Graph Matching Networks.
CoRR, 2019

Adversarial Defense Framework for Graph Neural Network.
CoRR, 2019

A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security.
CoRR, 2019

Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification.
Proceedings of the 2019 SIAM International Conference on Data Mining, 2019

Countering Malicious Processes with Process-DNS Association.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Heterogeneous Graph Matching Networks for Unknown Malware Detection.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Deep Program Reidentification: A Graph Neural Network Solution.
CoRR, 2018

A Query Tool for Efficiently Investigating Risky Software Behaviors.
CoRR, 2018

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.
CoRR, 2018

SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection.
Proceedings of the 27th USENIX Security Symposium, 2018

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

TwistBlocks: Pluggable and Twistable Modular TUI for Armature Interaction in 3D Design.
Proceedings of the Twelfth International Conference on Tangible, 2018

Towards a Timely Causality Analysis for Enterprise Security.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

TINET: Learning Invariant Networks via Knowledge Transfer.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Collaborative Alert Ranking for Anomaly Detection.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Accelerating Dependency Graph Learning from Heterogeneous Categorical Event Streams via Knowledge Transfer.
CoRR, 2017

Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
Detecting Stack Layout Corruptions with Robust Stack Unwinding.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

High Fidelity Data Reduction for Big Data Security Dependency Analyses.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Behavior Query Discovery in System-Generated Temporal Graphs.
Proc. VLDB Endow., 2015

SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps.
Proceedings of the 24th USENIX Security Symposium, 2015

Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Discover and Tame Long-running Idling Processes in Enterprise Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Seismic Qualification of Telecommunication System in Nuclear Power Plant.
Proceedings of the Genetic and Evolutionary Computing, 2014

2013
Redefining web browser principals with a Configurable Origin Policy.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
CHEX: statically vetting Android apps for component hijacking vulnerabilities.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Towards Situational Awareness of Large-Scale Botnet Probing Events.
IEEE Trans. Inf. Forensics Secur., 2011

Measurement and diagnosis of address misconfigured P2P traffic.
IEEE Netw., 2011

WebShield: Enabling Various Web Defense Techniques without Client Side Modifications.
Proceedings of the Network and Distributed System Security Symposium, 2011

Poster: CUD: crowdsourcing for URL spam detection.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Employing Honeynets For Network Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Thwarting zero-day polymorphic worms with network-level length-based signature generation.
IEEE/ACM Trans. Netw., 2010

HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency.
Comput. Networks, 2010

NetShield: massive semantics-based vulnerability signature matching for high-speed networks.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

WebProphet: Automating Performance Prediction for Web Services.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Detecting and characterizing social spam campaigns.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Automating analysis of large-scale botnet probing events.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Honeynet-based Botnet Scan Traffic Analysis.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

2007
Reversible sketches: enabling monitoring and analysis over high-speed data streams.
IEEE/ACM Trans. Netw., 2007

Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms.
Proceedings of the IEEE International Conference on Network Protocols, 2007

2006
IDGraphs: Intrusion Detection and Analysis Using Stream Compositing.
IEEE Computer Graphics and Applications, 2006

Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Towards scalable and robust distributed intrusion alert fusion with good load balancing.
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, 2006

Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

2005
IDGraphs: Intrusion Detection and Analysis Using Histographs.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005


  Loading...