Zhenyuan Li

Orcid: 0000-0002-7712-0292

According to our database1, Zhenyuan Li authored at least 12 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events.
CoRR, 2024

Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments.
CoRR, 2024

2022
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows.
IEEE Trans. Dependable Secur. Comput., 2022

Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts.
Frontiers Inf. Technol. Electron. Eng., 2022

A Method for Residual Network Image Classification with Multi-scale Feature Fusion.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Two-Phase Deep Reinforcement Learning of Dynamic Resource Allocation and Client Selection for Hierarchical Federated Learning.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Threat detection and investigation with system-level provenance graphs: A survey.
Comput. Secur., 2021

A Data Processing Method for Load Data of Electric Boiler with Heat Reservoir.
Proceedings of the Intelligent Computing Theories and Application, 2021

2020
Threat Detection and Investigation with System-level Provenance Graphs: A Survey.
CoRR, 2020

Research on Ultra-Short-Term Wind Power Prediction Considering Source Relevance.
IEEE Access, 2020

2019
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019


  Loading...