Shaofei Li

Orcid: 0009-0001-6530-5935

According to our database1, Shaofei Li authored at least 16 papers between 2016 and 2026.

Collaborative distances:

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
LOGIGEN: Logic-Driven Generation of Verifiable Agentic Tasks.
CoRR, March, 2026

Connect the Dots: Knowledge Graph-Guided Crawler Attack on Retrieval-Augmented Generation Systems.
CoRR, January, 2026

KnowHow: Automatically Applying High-Level CTI Knowledge for Interpretable and Accurate Provenance Analysis.
Proceedings of the 33rd Annual Network and Distributed System Security Symposium, 2026

2025
QianfanHuijin Technical Report: A Novel Multi-Stage Training Paradigm for Finance Industrial LLMs.
CoRR, December, 2025

Not All Exceptions Are Created Equal: Triaging Error Logs in Real-World Enterprises.
ACM Trans. Softw. Eng. Methodol., November, 2025

PromoGuardian: Detecting Promotion Abuse Fraud with Multi-Relation Fused Graph Neural Networks.
CoRR, October, 2025

When MCP Servers Attack: Taxonomy, Feasibility, and Mitigation.
CoRR, September, 2025

KnowHow: Automatically Applying High-Level CTI Knowledge for Interpretable and Accurate Provenance Analysis.
CoRR, September, 2025

Query Provenance Analysis: Efficient and Robust Defense Against Query-Based Black-Box Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

2024
<i>Adonis</i>: Practical and Efficient Control Flow Recovery through OS-level Traces.
ACM Trans. Softw. Eng. Methodol., January, 2024

Query Provenance Analysis for Robust and Efficient Query-based Black-box Attack Defense.
CoRR, 2024

NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
Instance segmentation based 6D pose estimation of industrial objects using point clouds for robotic bin-picking.
Robotics Comput. Integr. Manuf., August, 2023

Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2016
Research on Virtual Simulation of Flood Propagation in Agricultural Area Under the Land Subsidence.
Proceedings of the Computer and Computing Technologies in Agriculture X, 2016

Application of GIS and Modified DRASTIC Model Based on Entropy Weight and Fuzzy Theory to Ground Water Vulnerability Evaluation.
Proceedings of the Computer and Computing Technologies in Agriculture X, 2016


  Loading...