Tiantian Zhu

Orcid: 0000-0002-8657-662X

Affiliations:
  • Zhejiang University of Technology, China


According to our database1, Tiantian Zhu authored at least 48 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
GANDACOG: Implicit Mobile User Authentication in Multi Environments With Scarce Data.
IEEE Internet Things J., July, 2025

SoK: Knowledge is All You Need: Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs.
CoRR, March, 2025

ActMiner: Applying Causality Tracking and Increment Aligning for Graph-based Cyber Threat Hunting.
CoRR, January, 2025

METANOIA: A Lifelong Intrusion Detection and Investigation System for Mitigating Concept Drift.
CoRR, January, 2025

Dehydrator: Enhancing Provenance Graph Storage via Hierarchical Encoding and Sequence Generation.
IEEE Trans. Inf. Forensics Secur., 2025

TAGAPT: Toward Automatic Generation of APT Samples With Provenance-Level Granularity.
IEEE Trans. Inf. Forensics Secur., 2025

Nip in the Bud: Forecasting and Interpreting Post- Exploitation Attacks in Real-Time Through Cyber Threat Intelligence Reports.
IEEE Trans. Dependable Secur. Comput., 2025

CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports.
IEEE Trans. Dependable Secur. Comput., 2025

Actminer: Applying causality tracking and increment aligning for graph-based threat hunting.
Knowl. Based Syst., 2025

RT-APT: A real-time APT anomaly detection method for large-scale provenance graph.
J. Netw. Comput. Appl., 2025

ThreatCog: An adaptive and lightweight mobile user authentication system with enhanced motion sensory signals.
J. Inf. Secur. Appl., 2025

VulnTrace: Tracking and Detecting Code Vulnerabilities with Historical Commits and Semantic Embeddings.
Int. J. Softw. Eng. Knowl. Eng., 2025

ProvADShield: A Multimodel Ensemble Defender Against Adversarial Attacks on Provenance Graph Host Intrusion Detector.
IET Inf. Secur., 2025

An Interpretable Network Intrusion Detection Model via Decision Tree Enhanced Deep Attention Network.
IET Inf. Secur., 2025

LinTracer: An efficient tracking system for cyberattack chains fusing entity and event semantics.
Comput. Secur., 2025

MIRDETECTOR: Applying malicious intent representation for enhanced APT anomaly detection.
Comput. Secur., 2025

HER-PT: An intelligent penetration testing framework with Hindsight Experience Replay.
Comput. Secur., 2025

PDCleaner: A multi-view collaborative data compression method for provenance graph-based APT detection systems.
Comput. Secur., 2025

Kellect: A Kernel-based efficient and lossless event log collector for windows security.
Comput. Secur., 2025

Provenance-Based Intrusion Detection via Multi-scale Graph Representation Learning.
Proceedings of the Information and Communications Security - 27th International Conference, 2025

Poster: Leveraging Large Language Models to Effectively and Efficiently Identify Vulnerability Patches for WordPress Plugins.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

Defense Against Model Stealing Based on Account-Aware Distribution Discrepancy.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs.
Cybersecur., December, 2024

TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy.
IEEE Trans. Mob. Comput., April, 2024

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters.
Comput. Secur., January, 2024

MultiKG: Multi-Source Threat Intelligence Aggregation for High-Quality Knowledge Graph Representation of Attack Techniques.
CoRR, 2024

SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-time.
CoRR, 2024

TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning.
CoRR, 2024

TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends.
Comput. Secur., December, 2023

EdgeCog: A Real-Time Bearing Fault Diagnosis System Based on Lightweight Edge Computing.
IEEE Trans. Instrum. Meas., 2023

APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts.
IEEE Trans. Dependable Secur. Comput., 2023

2022
EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment.
IEEE Trans. Mob. Comput., 2022

Private Cell-ID Trajectory Prediction Using Multi-Graph Embedding and Encoder-Decoder Network.
IEEE Trans. Mob. Comput., 2022

PowerCog: A Practical Method for Recognizing Power Quality Disturbances Accurately in a Noisy Environment.
IEEE Trans. Ind. Informatics, 2022

Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency.
IEEE Trans. Dependable Secur. Comput., 2022

Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts.
Frontiers Inf. Technol. Electron. Eng., 2022

Kellect: a Kernel-Based Efficient and Lossless Event Log Collector.
CoRR, 2022

2021
Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction.
IEEE Trans. Intell. Transp. Syst., 2021

General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis.
IEEE Trans. Inf. Forensics Secur., 2021

One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering.
IEEE Trans. Inf. Forensics Secur., 2021

APTSHIELD: A Stable, Efficient and Real-time APT Detection System for Linux Hosts.
CoRR, 2021

A Heterogeneous Graph Learning Model for Cyber-Attack Detection.
CoRR, 2021

2020
RiskCog: Unobtrusive Real-Time User Authentication on Mobile Devices in the Wild.
IEEE Trans. Mob. Comput., 2020

WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data Augmentation.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2016
Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates.
IEEE/ACM Trans. Netw., 2016

2014
AutoCog: Measuring the Description-to-permission Fidelity in Android Applications.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014


  Loading...