DMalNet: Dynamic malware analysis based on API feature engineering and graph learning C Li, Z Cheng, H Zhu, L Wang, Q Lv, Y Wang, N Li, D Sun Computers & Security 122, 102872, 2022 | 45 | 2022 |
KAIROS: Practical intrusion detection and investigation using whole-system provenance Z Cheng, Q Lv, J Liang, Y Wang, D Sun, T Pasquier, X Han 2024 IEEE Symposium on Security and Privacy (SP), 3533-3551, 2024 | 16 | 2024 |
3D face recognition based on kinect depth data Z Cheng, T Shi, W Cui, Y Dong, X Fang 2017 4th International Conference on Systems and Informatics (ICSAI), 555-559, 2017 | 8 | 2017 |
GHunter: A Fast Subgraph Matching Method for Threat Hunting Z Cheng, R Dai, L Wang, Z Yu, Q Lv, Y Wang, D Sun 2023 26th International Conference on Computer Supported Cooperative Work in …, 2023 | 4 | 2023 |
ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks L Wang, Z Cheng, Q Lv, Y Wang, S Zhang, W Huang 2023 26th International Conference on Computer Supported Cooperative Work in …, 2023 | 2 | 2023 |
MMSP: A LSTM based framework for multi-step attack prediction in mixed scenarios Z Cheng, D Sun, L Wang, Q Lv, Y Wang 2022 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2022 | 2 | 2022 |