Zhenyuan Li
Orcid: 0000-0002-7712-0292
According to our database1,
Zhenyuan Li
authored at least 23 papers
between 2019 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Proceedings of the IEEE INFOCOM 2025, 2025
2024
Toward Dynamic Resource Allocation and Client Scheduling in Hierarchical Federated Learning: A Two-Phase Deep Reinforcement Learning Approach.
IEEE Trans. Commun., December, 2024
From Sands to Mansions: Enabling Automatic Full-Life-Cycle Cyberattack Construction with LLM.
CoRR, 2024
Towards Dynamic Resource Allocation and Client Scheduling in Hierarchical Federated Learning: A Two-Phase Deep Reinforcement Learning Approach.
CoRR, 2024
TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events.
CoRR, 2024
Proceedings of the Engineering of Complex Computer Systems - 28th International Conference, 2024
An Automated Alert Cross-Verification System with Graph Neural Networks for IDS Events.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Expensive Optimization Based on Evolutionary Multi-Tasking and Hybrid Restart Strategy.
Proceedings of the IEEE Congress on Evolutionary Computation, 2024
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Exploring Depths of WebAudio: Advancing Greybox Fuzzing for Vulnerability Detection in Safari.
Proceedings of the 31st Asia-Pacific Software Engineering Conference, 2024
2022
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows.
IEEE Trans. Dependable Secur. Comput., 2022
Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts.
Frontiers Inf. Technol. Electron. Eng., 2022
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
Two-Phase Deep Reinforcement Learning of Dynamic Resource Allocation and Client Selection for Hierarchical Federated Learning.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Comput. Secur., 2021
Proceedings of the Intelligent Computing Theories and Application, 2021
2020
CoRR, 2020
IEEE Access, 2020
2019
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019