Chen Li

Orcid: 0000-0003-4307-0896

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China (PhD 2023)


According to our database1, Chen Li authored at least 24 papers between 2021 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Efficient packet classification with updatable learned index for online network defense.
Cybersecur., December, 2026

2025
Zero-trust based dynamic access control for cloud computing.
Cybersecur., December, 2025

Towards Unsupervised Time-Series Anomaly Detection for Virtual Cloud Networks.
IEEE Trans. Inf. Forensics Secur., 2025

IMS: Towards Computability and Dynamicity for Intent-Driven Micro-Segmentation.
IEEE Trans. Dependable Secur. Comput., 2025

Behavioral Biometrics-Based Continuous Authentication Using a Lightweight Latent Representation Masked One-Class Autoencoder.
IEEE Trans. Dependable Secur. Comput., 2025

End-to-end anomaly detection of service function chain through multi-source data in cloud-native systems.
Comput. Secur., 2025

End-to-End Security Policy Automation with Multi-LLM Agents in Cloud-Native Systems.
Proceedings of the 24th IEEE International Conference on Trust, 2025

ZTKA: A Zero-Trust Based Kernel Encryption Architecture for Transparent Data Protection.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

CPRAM: Cryptographic Performance-Aware Resource Affinity Management in Para-virtualized Environment.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

Lightweight Distributed Cloud-Native Service Function Chain Anomaly Detection for Edge-Cloud Networks.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

2024
Using KVM Events to Detect VM Memory-Sharing Lateral Movement Attacks in a Virtualized Environment.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024

CloudFusion: Multi-Source Intrusion Detection in Cloud Environments.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

EI-XIDS: An explainable intrusion detection system based on integration framework.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

An Efficient Caching Mechanism for End-host Network Functions.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Desktop Virtualization Optimization Methods Based on IDV Architecture.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
Continuous User Trust Assessment Based on Emphasized Contextual Differentiation Behavior Analysis.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Who Gets in the Way of Parallelism? Analysis and Optimization of the Parallel Processing Bottleneck of SDN Flow Rules in ONOS.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
The Shared Memory Based Cryptographic Card Virtualization.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

An Unsupervised Approach For Detecting Lateral Movement Logins Based On Knowledge Graph.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

A Novel Discrete Bi-objective Optimization Method for Virtual Machine Placement.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

2021
TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings.
Cybersecur., 2021

Log-based Anomaly Detection from Multi-view by Associating Anomaly Scores with User Trust.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Evalt: Authenticate Implicitly Before Attacks.
Proceedings of the 28th International Conference on Telecommunications, 2021

A Keystroke-based Continuous User Authentication in Virtual Desktop Infrastructure.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021


  Loading...