Jun Zeng

Orcid: 0009-0005-4031-1297

Affiliations:
  • National University of Singapore, Singapore


According to our database1, Jun Zeng authored at least 16 papers between 2021 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
ProvGuard: Detecting SDN Control Policy Manipulation via Contextual Semantics of Provenance Graphs.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile Applications.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

2024
MASKDROID: Robust Android Malware Detection with Masked Graph Representations.
CoRR, 2024

Unraveling the Key of Machine Learning Solutions for Android Malware Detection.
CoRR, 2024

UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation.
Proceedings of the 33rd USENIX Security Symposium, 2024

MaskDroid: Robust Android Malware Detection with Masked Graph Representations.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024

Automatic Root Cause Analysis via Large Language Models for Cloud Incidents.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Empowering Practical Root Cause Analysis by Large Language Models for Cloud Incidents.
CoRR, 2023

Learning Graph-based Code Representations for Source-level Functional Similarity Detection.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

2022
FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation.
Proceedings of the 31st USENIX Security Symposium, 2022

SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

TeLL: log level suggestions via modeling multi-level code block information.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
Proceedings of the Computer Security - ESORICS 2022, 2022

PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021


  Loading...