Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports., , , and . CoRR, (2021)A Method for Residual Network Image Classification with Multi-scale Feature Fusion., , , and . ML4CS (3), volume 13657 of Lecture Notes in Computer Science, page 427-438. Springer, (2022)RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows., , , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1621-1638 (2022)Two-Phase Deep Reinforcement Learning of Dynamic Resource Allocation and Client Selection for Hierarchical Federated Learning., , , , , , and . ICCC, page 518-523. IEEE, (2022)Threat Detection and Investigation with System-level Provenance Graphs: A Survey., , , and . CoRR, (2020)Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts., , , , , , and . Frontiers Inf. Technol. Electron. Eng., 23 (3): 361-381 (2022)Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments., , , , and . CoRR, (2024)Threat detection and investigation with system-level provenance graphs: A survey., , , , and . Comput. Secur., (2021)A Data Processing Method for Load Data of Electric Boiler with Heat Reservoir., , , , , , and . ICIC (2), volume 12837 of Lecture Notes in Computer Science, page 395-405. Springer, (2021)Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts., , , , , and . ACM Conference on Computer and Communications Security, page 1831-1847. ACM, (2019)