Evil under the sun: Understanding and discovering attacks on ethereum decentralized applications L Su, X Shen, X Du, X Liao, XF Wang, L Xing, B Liu 30th USENIX Security Symposium (USENIX Security 21), 1307-1324, 2021 | 56 | 2021 |
Hierarchical clustering based network traffic data reduction for improving suspicious flow detection L Su, Y Yao, N Li, J Liu, Z Lu, B Liu 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 30 | 2018 |
DeepGFL: Deep feature learning via graph for attack detection on flow-based network traffic Y Yao, L Su, Z Lu MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 579-584, 2018 | 28 | 2018 |
A novel approach for identifying lateral movement attacks based on network embedding M Chen, Y Yao, J Liu, B Jiang, L Su, Z Lu 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018 | 27 | 2018 |
Stdeepgraph: Spatial-temporal deep learning on communication graphs for long-term network attack detection Y Yao, L Su, Z Lu, B Liu 2019 18th IEEE International Conference on Trust, Security And Privacy In …, 2019 | 18 | 2019 |
Marrying graph kernel with deep neural network: A case study for network anomaly detection Y Yao, L Su, C Zhang, Z Lu, B Liu Computational Science–ICCS 2019: 19th International Conference, Faro …, 2019 | 14 | 2019 |
Understanding the influence of graph Kernels on deep learning architecture: a case study of flow-based network attack detection L Su, Y Yao, Z Lu, B Liu 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 5 | 2019 |
An improved method to unveil malware’s hidden behavior Q Li, Y Zhang, L Su, Y Wu, X Ma, Z Yang Information Security and Cryptology: 13th International Conference, Inscrypt …, 2018 | 3 | 2018 |
Can LLMs Deeply Detect Complex Malicious Queries? A Framework for Jailbreaking via Obfuscating Intent S Shang, X Zhao, Z Yao, Y Yao, L Su, Z Fan, X Zhang, Z Jiang arXiv preprint arXiv:2405.03654, 2024 | | 2024 |