Zhenyuan Li

Orcid: 0000-0002-7712-0292

According to our database1, Zhenyuan Li authored at least 25 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
AEAS: Actionable Exploit Assessment System.
CoRR, September, 2025

Towards Scalable and Interpretable Mobile App Risk Analysis via Large Language Models.
CoRR, August, 2025

AutoSeg: Automatic micro-segmentation policy generation via configuration analysis.
Comput. Secur., 2025

Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

Understanding the Business of Online Affiliate Marketing: An Empirical Study.
Proceedings of the IEEE INFOCOM 2025, 2025

PentestAgent: Incorporating LLM Agents to Automated Penetration Testing.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
Toward Dynamic Resource Allocation and Client Scheduling in Hierarchical Federated Learning: A Two-Phase Deep Reinforcement Learning Approach.
IEEE Trans. Commun., December, 2024

From Sands to Mansions: Enabling Automatic Full-Life-Cycle Cyberattack Construction with LLM.
CoRR, 2024

Towards Dynamic Resource Allocation and Client Scheduling in Hierarchical Federated Learning: A Two-Phase Deep Reinforcement Learning Approach.
CoRR, 2024

TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events.
CoRR, 2024

Formal Verification Techniques for Post-quantum Cryptography: A Systematic Review.
Proceedings of the Engineering of Complex Computer Systems - 28th International Conference, 2024

An Automated Alert Cross-Verification System with Graph Neural Networks for IDS Events.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Expensive Optimization Based on Evolutionary Multi-Tasking and Hybrid Restart Strategy.
Proceedings of the IEEE Congress on Evolutionary Computation, 2024

Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Exploring Depths of WebAudio: Advancing Greybox Fuzzing for Vulnerability Detection in Safari.
Proceedings of the 31st Asia-Pacific Software Engineering Conference, 2024

2022
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows.
IEEE Trans. Dependable Secur. Comput., 2022

Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts.
Frontiers Inf. Technol. Electron. Eng., 2022

A Method for Residual Network Image Classification with Multi-scale Feature Fusion.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Two-Phase Deep Reinforcement Learning of Dynamic Resource Allocation and Client Selection for Hierarchical Federated Learning.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Threat detection and investigation with system-level provenance graphs: A survey.
Comput. Secur., 2021

A Data Processing Method for Load Data of Electric Boiler with Heat Reservoir.
Proceedings of the Intelligent Computing Theories and Application, 2021

2020
Threat Detection and Investigation with System-level Provenance Graphs: A Survey.
CoRR, 2020

Research on Ultra-Short-Term Wind Power Prediction Considering Source Relevance.
IEEE Access, 2020

2019
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019


  Loading...