Are we there yet? an industrial viewpoint on provenance-based endpoint detection and response tools F Dong, S Li, P Jiang, D Li, H Wang, L Huang, X Xiao, J Chen, X Luo, ... Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 18 | 2023 |
Nodlink: An online system for fine-grained apt attack detection and investigation S Li, F Dong, X Xiao, H Wang, F Shao, J Chen, Y Guo, X Chen, D Li arXiv preprint arXiv:2311.02331, 2023 | 12 | 2023 |
Adonis: Practical and Efficient Control Flow Recovery through OS-level Traces X Liu, C Yang, D Li, Y Zhou, S Li, J Chen, Z Chen ACM Transactions on Software Engineering and Methodology 33 (1), 1-27, 2023 | 1 | 2023 |
Query Provenance Analysis: Efficient and Robust Defense against Query-based Black-box Attacks S Li, Z Zhang, H Jia, Y Guo, X Chen, D Li 2025 IEEE Symposium on Security and Privacy (SP), 72-72, 2024 | | 2024 |