Tiantian Zhu

Orcid: 0000-0002-8657-662X

Affiliations:
  • Zhejiang University of Technology, China


According to our database1, Tiantian Zhu authored at least 45 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
GANDACOG: Implicit Mobile User Authentication in Multi Environments With Scarce Data.
IEEE Internet Things J., July, 2025

SoK: Knowledge is All You Need: Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs.
CoRR, March, 2025

ActMiner: Applying Causality Tracking and Increment Aligning for Graph-based Cyber Threat Hunting.
CoRR, January, 2025

METANOIA: A Lifelong Intrusion Detection and Investigation System for Mitigating Concept Drift.
CoRR, January, 2025

Dehydrator: Enhancing Provenance Graph Storage via Hierarchical Encoding and Sequence Generation.
IEEE Trans. Inf. Forensics Secur., 2025

TAGAPT: Toward Automatic Generation of APT Samples With Provenance-Level Granularity.
IEEE Trans. Inf. Forensics Secur., 2025

Nip in the Bud: Forecasting and Interpreting Post- Exploitation Attacks in Real-Time Through Cyber Threat Intelligence Reports.
IEEE Trans. Dependable Secur. Comput., 2025

Actminer: Applying causality tracking and increment aligning for graph-based threat hunting.
Knowl. Based Syst., 2025

RT-APT: A real-time APT anomaly detection method for large-scale provenance graph.
J. Netw. Comput. Appl., 2025

ThreatCog: An adaptive and lightweight mobile user authentication system with enhanced motion sensory signals.
J. Inf. Secur. Appl., 2025

VulnTrace: Tracking and Detecting Code Vulnerabilities with Historical Commits and Semantic Embeddings.
Int. J. Softw. Eng. Knowl. Eng., 2025

LinTracer: An efficient tracking system for cyberattack chains fusing entity and event semantics.
Comput. Secur., 2025

MIRDETECTOR: Applying malicious intent representation for enhanced APT anomaly detection.
Comput. Secur., 2025

HER-PT: An intelligent penetration testing framework with Hindsight Experience Replay.
Comput. Secur., 2025

PDCleaner: A multi-view collaborative data compression method for provenance graph-based APT detection systems.
Comput. Secur., 2025

Kellect: A Kernel-based efficient and lossless event log collector for windows security.
Comput. Secur., 2025

Provenance-Based Intrusion Detection via Multi-scale Graph Representation Learning.
Proceedings of the Information and Communications Security - 27th International Conference, 2025

Defense Against Model Stealing Based on Account-Aware Distribution Discrepancy.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs.
Cybersecur., December, 2024

TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy.
IEEE Trans. Mob. Comput., April, 2024

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters.
Comput. Secur., January, 2024

MultiKG: Multi-Source Threat Intelligence Aggregation for High-Quality Knowledge Graph Representation of Attack Techniques.
CoRR, 2024

CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports.
CoRR, 2024

SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-time.
CoRR, 2024

TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning.
CoRR, 2024

TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends.
Comput. Secur., December, 2023

EdgeCog: A Real-Time Bearing Fault Diagnosis System Based on Lightweight Edge Computing.
IEEE Trans. Instrum. Meas., 2023

APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts.
IEEE Trans. Dependable Secur. Comput., 2023

2022
EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment.
IEEE Trans. Mob. Comput., 2022

Private Cell-ID Trajectory Prediction Using Multi-Graph Embedding and Encoder-Decoder Network.
IEEE Trans. Mob. Comput., 2022

PowerCog: A Practical Method for Recognizing Power Quality Disturbances Accurately in a Noisy Environment.
IEEE Trans. Ind. Informatics, 2022

Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency.
IEEE Trans. Dependable Secur. Comput., 2022

Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts.
Frontiers Inf. Technol. Electron. Eng., 2022

Kellect: a Kernel-Based Efficient and Lossless Event Log Collector.
CoRR, 2022

2021
Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction.
IEEE Trans. Intell. Transp. Syst., 2021

General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis.
IEEE Trans. Inf. Forensics Secur., 2021

One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering.
IEEE Trans. Inf. Forensics Secur., 2021

APTSHIELD: A Stable, Efficient and Real-time APT Detection System for Linux Hosts.
CoRR, 2021

A Heterogeneous Graph Learning Model for Cyber-Attack Detection.
CoRR, 2021

2020
RiskCog: Unobtrusive Real-Time User Authentication on Mobile Devices in the Wild.
IEEE Trans. Mob. Comput., 2020

WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data Augmentation.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2016
Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates.
IEEE/ACM Trans. Netw., 2016

2014
AutoCog: Measuring the Description-to-permission Fidelity in Android Applications.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014


  Loading...