Tiantian Zhu
Orcid: 0000-0002-8657-662XAffiliations:
- Zhejiang University of Technology, China
According to our database1,
Tiantian Zhu
authored at least 45 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
GANDACOG: Implicit Mobile User Authentication in Multi Environments With Scarce Data.
IEEE Internet Things J., July, 2025
SoK: Knowledge is All You Need: Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs.
CoRR, March, 2025
ActMiner: Applying Causality Tracking and Increment Aligning for Graph-based Cyber Threat Hunting.
CoRR, January, 2025
METANOIA: A Lifelong Intrusion Detection and Investigation System for Mitigating Concept Drift.
CoRR, January, 2025
Dehydrator: Enhancing Provenance Graph Storage via Hierarchical Encoding and Sequence Generation.
IEEE Trans. Inf. Forensics Secur., 2025
TAGAPT: Toward Automatic Generation of APT Samples With Provenance-Level Granularity.
IEEE Trans. Inf. Forensics Secur., 2025
Nip in the Bud: Forecasting and Interpreting Post- Exploitation Attacks in Real-Time Through Cyber Threat Intelligence Reports.
IEEE Trans. Dependable Secur. Comput., 2025
Actminer: Applying causality tracking and increment aligning for graph-based threat hunting.
Knowl. Based Syst., 2025
J. Netw. Comput. Appl., 2025
ThreatCog: An adaptive and lightweight mobile user authentication system with enhanced motion sensory signals.
J. Inf. Secur. Appl., 2025
VulnTrace: Tracking and Detecting Code Vulnerabilities with Historical Commits and Semantic Embeddings.
Int. J. Softw. Eng. Knowl. Eng., 2025
LinTracer: An efficient tracking system for cyberattack chains fusing entity and event semantics.
Comput. Secur., 2025
MIRDETECTOR: Applying malicious intent representation for enhanced APT anomaly detection.
Comput. Secur., 2025
HER-PT: An intelligent penetration testing framework with Hindsight Experience Replay.
Comput. Secur., 2025
PDCleaner: A multi-view collaborative data compression method for provenance graph-based APT detection systems.
Comput. Secur., 2025
Kellect: A Kernel-based efficient and lossless event log collector for windows security.
Comput. Secur., 2025
Proceedings of the Information and Communications Security - 27th International Conference, 2025
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs.
Cybersecur., December, 2024
TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy.
IEEE Trans. Mob. Comput., April, 2024
CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters.
Comput. Secur., January, 2024
MultiKG: Multi-Source Threat Intelligence Aggregation for High-Quality Knowledge Graph Representation of Attack Techniques.
CoRR, 2024
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends.
Comput. Secur., December, 2023
EdgeCog: A Real-Time Bearing Fault Diagnosis System Based on Lightweight Edge Computing.
IEEE Trans. Instrum. Meas., 2023
IEEE Trans. Dependable Secur. Comput., 2023
2022
EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment.
IEEE Trans. Mob. Comput., 2022
Private Cell-ID Trajectory Prediction Using Multi-Graph Embedding and Encoder-Decoder Network.
IEEE Trans. Mob. Comput., 2022
PowerCog: A Practical Method for Recognizing Power Quality Disturbances Accurately in a Noisy Environment.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Dependable Secur. Comput., 2022
Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts.
Frontiers Inf. Technol. Electron. Eng., 2022
2021
IEEE Trans. Intell. Transp. Syst., 2021
General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
CoRR, 2021
2020
IEEE Trans. Mob. Comput., 2020
WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data Augmentation.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2016
IEEE/ACM Trans. Netw., 2016
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014