BibTeX records: Zhichun Li

download as .bib file

@article{DBLP:journals/access/LiLGYWY24,
  author       = {Lingbo Li and
                  Zhichun Li and
                  Fusen Guo and
                  Haoyu Yang and
                  Jingtian Wei and
                  Zhengyi Yang},
  title        = {Prototype Comparison Convolutional Networks for One-Shot Segmentation},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {54978--54990},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3387742},
  doi          = {10.1109/ACCESS.2024.3387742},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiLGYWY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MukherjeeW0KRWL24,
  author       = {Kunal Mukherjee and
                  Joshua Wiedemeier and
                  Qi Wang and
                  Junpei Kamimura and
                  Junghwan John Rhee and
                  James Wei and
                  Zhichun Li and
                  Xiao Yu and
                  Lu{-}An Tang and
                  Jiaping Gui and
                  Kangkook Jee},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud
                  Security},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {241--268},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8\_10},
  doi          = {10.1007/978-3-031-54776-8\_10},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/MukherjeeW0KRWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/GaoLT024,
  author       = {Ruihao Gao and
                  Zhichun Li and
                  Guangming Tan and
                  Xueqi Li},
  editor       = {Rajiv Gupta and
                  Nael B. Abu{-}Ghazaleh and
                  Madan Musuvathi and
                  Dan Tsafrir},
  title        = {BeeZip: Towards An Organized and Scalable Architecture for Data Compression},
  booktitle    = {Proceedings of the 29th {ACM} International Conference on Architectural
                  Support for Programming Languages and Operating Systems, Volume 3,
                  {ASPLOS} 2024, La Jolla, CA, USA, 27 April 2024- 1 May 2024},
  pages        = {133--148},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3620666.3651323},
  doi          = {10.1145/3620666.3651323},
  timestamp    = {Thu, 25 Apr 2024 09:21:33 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/GaoLT024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/NanLZCCDZTHQ23,
  author       = {Guoshun Nan and
                  Zhichun Li and
                  Jinli Zhai and
                  Qimei Cui and
                  Gong Chen and
                  Xin Du and
                  Xuefei Zhang and
                  Xiaofeng Tao and
                  Zhu Han and
                  Tony Q. S. Quek},
  title        = {Physical-Layer Adversarial Robustness for Deep Learning-Based Semantic
                  Communications},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {41},
  number       = {8},
  pages        = {2592--2608},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSAC.2023.3288249},
  doi          = {10.1109/JSAC.2023.3288249},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/NanLZCCDZTHQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/XiaoGLZJZ23,
  author       = {Jianjun Xiao and
                  Changsheng Gao and
                  Zhichun Li and
                  Kai Zhang and
                  Jia Jia and
                  Dan Zhang},
  title        = {Research on Electromagnetic Effect Generated by {DC} Converter on
                  Human Body in Electric Vehicle},
  booktitle    = {97th {IEEE} Vehicular Technology Conference, {VTC} Spring 2023, Florence,
                  Italy, June 20-23, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VTC2023-Spring57618.2023.10199698},
  doi          = {10.1109/VTC2023-SPRING57618.2023.10199698},
  timestamp    = {Fri, 25 Aug 2023 08:20:01 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/XiaoGLZJZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-08365,
  author       = {Kun Li and
                  Zhichun Li and
                  Yuetao Chen and
                  Zixuan Wang and
                  Yiwei Zhang and
                  Liang Yuan and
                  Haipeng Jia and
                  Yunquan Zhang and
                  Ting Cao and
                  Mao Yang},
  title        = {Gamify Stencil Dwarf on Cloud for Democratizing Scientific Computing},
  journal      = {CoRR},
  volume       = {abs/2303.08365},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.08365},
  doi          = {10.48550/ARXIV.2303.08365},
  eprinttype    = {arXiv},
  eprint       = {2303.08365},
  timestamp    = {Mon, 20 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-08365.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/LiJLZYS22,
  author       = {Zhichun Li and
                  Yu Jiang and
                  Xiaochen Liu and
                  Yuhang Zhao and
                  Chun Yu and
                  Yuanchun Shi},
  title        = {Enhancing Revisitation in Touchscreen Reading for Visually Impaired
                  People with Semantic Navigation Design},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {6},
  number       = {3},
  pages        = {126:1--126:22},
  year         = {2022},
  url          = {https://doi.org/10.1145/3550290},
  doi          = {10.1145/3550290},
  timestamp    = {Sun, 18 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imwut/LiJLZYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/LiZNLCT22,
  author       = {Zeju Li and
                  Jinfei Zhou and
                  Guoshun Nan and
                  Zhichun Li and
                  Qimei Cui and
                  Xiaofeng Tao},
  title        = {SemBAT: Physical Layer Black-box Adversarial Attacks for Deep Learning-based
                  Semantic Communication Systems},
  booktitle    = {96th Vehicular Technology Conference, {VTC} Fall 2022, London, United
                  Kingdom, September 26-29, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VTC2022-Fall57202.2022.10012766},
  doi          = {10.1109/VTC2022-FALL57202.2022.10012766},
  timestamp    = {Tue, 24 Jan 2023 16:39:10 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/LiZNLCT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/DongCTCWZLL21,
  author       = {Boxiang Dong and
                  Zhengzhang Chen and
                  Lu{-}An Tang and
                  Haifeng Chen and
                  Hui Wang and
                  Kai Zhang and
                  Ying Lin and
                  Zhichun Li},
  title        = {Anomalous Event Sequence Detection},
  journal      = {{IEEE} Intell. Syst.},
  volume       = {36},
  number       = {3},
  pages        = {5--13},
  year         = {2021},
  url          = {https://doi.org/10.1109/MIS.2020.3041174},
  doi          = {10.1109/MIS.2020.3041174},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/expert/DongCTCWZLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LiWW0LJRC21,
  author       = {Yue Li and
                  Zhenyu Wu and
                  Haining Wang and
                  Kun Sun and
                  Zhichun Li and
                  Kangkook Jee and
                  Junghwan Rhee and
                  Haifeng Chen},
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {UTrack: Enterprise User Tracking Based on OS-Level Audit Logs},
  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  pages        = {161--172},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337.3447831},
  doi          = {10.1145/3422337.3447831},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/LiWW0LJRC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HassanLJ0ZWCLRG20,
  author       = {Wajih Ul Hassan and
                  Ding Li and
                  Kangkook Jee and
                  Xiao Yu and
                  Kexuan Zou and
                  Dawei Wang and
                  Zhengzhang Chen and
                  Zhichun Li and
                  Junghwan Rhee and
                  Jiaping Gui and
                  Adam Bates},
  title        = {This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting
                  using Suspicion-Based Hierarchical Storage},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {165--178},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427255},
  doi          = {10.1145/3427228.3427255},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HassanLJ0ZWCLRG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/SunJSLLKWRKCM20,
  author       = {Yixin Sun and
                  Kangkook Jee and
                  Suphannee Sivakorn and
                  Zhichun Li and
                  Cristian Lumezanu and
                  Lauri Korts{-}P{\"{a}}rn and
                  Zhenyu Wu and
                  Junghwan Rhee and
                  Chung Hwan Kim and
                  Mung Chiang and
                  Prateek Mittal},
  title        = {Detecting Malware Injection with Program-DNS Behavior},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2020, Genoa, Italy, September 7-11, 2020},
  pages        = {552--568},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSP48549.2020.00042},
  doi          = {10.1109/EUROSP48549.2020.00042},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/SunJSLLKWRKCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/GuiLCRX0JLC20,
  author       = {Jiaping Gui and
                  Ding Li and
                  Zhengzhang Chen and
                  Junghwan Rhee and
                  Xusheng Xiao and
                  Mu Zhang and
                  Kangkook Jee and
                  Zhichun Li and
                  Haifeng Chen},
  title        = {APTrace: {A} Responsive System for Agile Enterprise Level Causality
                  Analysis},
  booktitle    = {36th {IEEE} International Conference on Data Engineering, {ICDE} 2020,
                  Dallas, TX, USA, April 20-24, 2020},
  pages        = {1701--1712},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICDE48307.2020.00151},
  doi          = {10.1109/ICDE48307.2020.00151},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icde/GuiLCRX0JLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/GaoXLJXKM19,
  author       = {Peng Gao and
                  Xusheng Xiao and
                  Zhichun Li and
                  Kangkook Jee and
                  Fengyuan Xu and
                  Sanjeev R. Kulkarni and
                  Prateek Mittal},
  title        = {A Query System for Efficiently Investigating Complex Attack Behaviors
                  for Enterprise Security},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {12},
  number       = {12},
  pages        = {1802--1805},
  year         = {2019},
  url          = {http://www.vldb.org/pvldb/vol12/p1802-gao.pdf},
  doi          = {10.14778/3352063.3352070},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/GaoXLJXKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/JeonRKLPLW19,
  author       = {Yuseok Jeon and
                  Junghwan Rhee and
                  Chung Hwan Kim and
                  Zhichun Li and
                  Mathias Payer and
                  Byoungyoung Lee and
                  Zhenyu Wu},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls
                  in Legacy Applications},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {209--220},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300028},
  doi          = {10.1145/3292006.3300028},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/JeonRKLPLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/WangCYLNTGLCY19,
  author       = {Shen Wang and
                  Zhengzhang Chen and
                  Xiao Yu and
                  Ding Li and
                  Jingchao Ni and
                  Lu{-}An Tang and
                  Jiaping Gui and
                  Zhichun Li and
                  Haifeng Chen and
                  Philip S. Yu},
  editor       = {Sarit Kraus},
  title        = {Heterogeneous Graph Matching Networks for Unknown Malware Detection},
  booktitle    = {Proceedings of the Twenty-Eighth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16,
                  2019},
  pages        = {3762--3770},
  publisher    = {ijcai.org},
  year         = {2019},
  url          = {https://doi.org/10.24963/ijcai.2019/522},
  doi          = {10.24963/IJCAI.2019/522},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcai/WangCYLNTGLCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HassanGLCJL019,
  author       = {Wajih Ul Hassan and
                  Shengjian Guo and
                  Ding Li and
                  Zhengzhang Chen and
                  Kangkook Jee and
                  Zhichun Li and
                  Adam Bates},
  title        = {NoDoze: Combatting Threat Alert Fatigue with Automated Provenance
                  Triage},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/nodoze-combatting-threat-alert-fatigue-with-automated-provenance-triage/},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/HassanGLCJL019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SivakornJSKLLWT19,
  author       = {Suphannee Sivakorn and
                  Kangkook Jee and
                  Yixin Sun and
                  Lauri Korts{-}P{\"{a}}rn and
                  Zhichun Li and
                  Cristian Lumezanu and
                  Zhenyu Wu and
                  Lu{-}An Tang and
                  Ding Li},
  title        = {Countering Malicious Processes with Process-DNS Association},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/countering-malicious-processes-with-process-dns-association/},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SivakornJSKLLWT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdm/WangCLLTNRCY19,
  author       = {Shen Wang and
                  Zhengzhang Chen and
                  Ding Li and
                  Zhichun Li and
                  Lu{-}An Tang and
                  Jingchao Ni and
                  Junghwan Rhee and
                  Haifeng Chen and
                  Philip S. Yu},
  editor       = {Tanya Y. Berger{-}Wolf and
                  Nitesh V. Chawla},
  title        = {Attentional Heterogeneous Graph Neural Network: Application to Program
                  Reidentification},
  booktitle    = {Proceedings of the 2019 {SIAM} International Conference on Data Mining,
                  {SDM} 2019, Calgary, Alberta, Canada, May 2-4, 2019},
  pages        = {693--701},
  publisher    = {{SIAM}},
  year         = {2019},
  url          = {https://doi.org/10.1137/1.9781611975673.78},
  doi          = {10.1137/1.9781611975673.78},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdm/WangCLLTNRCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-08159,
  author       = {Peng Gao and
                  Xusheng Xiao and
                  Ding Li and
                  Zhichun Li and
                  Kangkook Jee and
                  Zhenyu Wu and
                  Chung Hwan Kim and
                  Sanjeev R. Kulkarni and
                  Prateek Mittal},
  title        = {A Stream-based Query System for Efficiently Detecting Abnormal System
                  Behaviors for Enterprise Security},
  journal      = {CoRR},
  volume       = {abs/1903.08159},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.08159},
  eprinttype    = {arXiv},
  eprint       = {1903.08159},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-08159.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-03679,
  author       = {Shen Wang and
                  Zhengzhang Chen and
                  Jingchao Ni and
                  Xiao Yu and
                  Zhichun Li and
                  Haifeng Chen and
                  Philip S. Yu},
  title        = {Adversarial Defense Framework for Graph Neural Network},
  journal      = {CoRR},
  volume       = {abs/1905.03679},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.03679},
  eprinttype    = {arXiv},
  eprint       = {1905.03679},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-03679.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-08074,
  author       = {Shen Wang and
                  Zhengzhang Chen and
                  Xiao Yu and
                  Ding Li and
                  Jingchao Ni and
                  Lu{-}An Tang and
                  Jiaping Gui and
                  Zhichun Li and
                  Haifeng Chen and
                  Philip S. Yu},
  title        = {Heterogeneous Graph Matching Networks},
  journal      = {CoRR},
  volume       = {abs/1910.08074},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.08074},
  eprinttype    = {arXiv},
  eprint       = {1910.08074},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-08074.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TangLLZJXWRXL18,
  author       = {Yutao Tang and
                  Ding Li and
                  Zhichun Li and
                  Mu Zhang and
                  Kangkook Jee and
                  Xusheng Xiao and
                  Zhenyu Wu and
                  Junghwan Rhee and
                  Fengyuan Xu and
                  Qun Li},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality
                  Analysis},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1324--1337},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243763},
  doi          = {10.1145/3243734.3243763},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TangLLZJXWRXL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/CaoCCTLL18,
  author       = {Cheng Cao and
                  Zhengzhang Chen and
                  James Caverlee and
                  Lu{-}An Tang and
                  Chen Luo and
                  Zhichun Li},
  editor       = {Alfredo Cuzzocrea and
                  James Allan and
                  Norman W. Paton and
                  Divesh Srivastava and
                  Rakesh Agrawal and
                  Andrei Z. Broder and
                  Mohammed J. Zaki and
                  K. Sel{\c{c}}uk Candan and
                  Alexandros Labrinidis and
                  Assaf Schuster and
                  Haixun Wang},
  title        = {Behavior-based Community Detection: Application to Host Assessment
                  In Enterprise Information Networks},
  booktitle    = {Proceedings of the 27th {ACM} International Conference on Information
                  and Knowledge Management, {CIKM} 2018, Torino, Italy, October 22-26,
                  2018},
  pages        = {1977--1985},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3269206.3272022},
  doi          = {10.1145/3269206.3272022},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cikm/CaoCCTLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/LinCCT0CL18,
  author       = {Ying Lin and
                  Zhengzhang Chen and
                  Cheng Cao and
                  Lu{-}An Tang and
                  Kai Zhang and
                  Wei Cheng and
                  Zhichun Li},
  editor       = {Alfredo Cuzzocrea and
                  James Allan and
                  Norman W. Paton and
                  Divesh Srivastava and
                  Rakesh Agrawal and
                  Andrei Z. Broder and
                  Mohammed J. Zaki and
                  K. Sel{\c{c}}uk Candan and
                  Alexandros Labrinidis and
                  Assaf Schuster and
                  Haixun Wang},
  title        = {Collaborative Alert Ranking for Anomaly Detection},
  booktitle    = {Proceedings of the 27th {ACM} International Conference on Information
                  and Knowledge Management, {CIKM} 2018, Torino, Italy, October 22-26,
                  2018},
  pages        = {1987--1995},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3269206.3272013},
  doi          = {10.1145/3269206.3272013},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cikm/LinCCT0CL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/LuoCTSLCY18,
  author       = {Chen Luo and
                  Zhengzhang Chen and
                  Lu{-}An Tang and
                  Anshumali Shrivastava and
                  Zhichun Li and
                  Haifeng Chen and
                  Jieping Ye},
  editor       = {Yike Guo and
                  Faisal Farooq},
  title        = {{TINET:} Learning Invariant Networks via Knowledge Transfer},
  booktitle    = {Proceedings of the 24th {ACM} {SIGKDD} International Conference on
                  Knowledge Discovery {\&} Data Mining, {KDD} 2018, London, UK,
                  August 19-23, 2018},
  pages        = {1890--1899},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3219819.3220003},
  doi          = {10.1145/3219819.3220003},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/LuoCTSLCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiuZLJLWRM18,
  author       = {Yushan Liu and
                  Mu Zhang and
                  Ding Li and
                  Kangkook Jee and
                  Zhichun Li and
                  Zhenyu Wu and
                  Junghwan Rhee and
                  Prateek Mittal},
  title        = {Towards a Timely Causality Analysis for Enterprise Security},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_07B-3\_Liu\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LiuZLJLWRM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tei/WangLLMX18,
  author       = {Meng Wang and
                  Kehua Lei and
                  Zhichun Li and
                  Haipeng Mi and
                  Yingqing Xu},
  editor       = {Ylva Fernaeus and
                  Donald McMillan and
                  Martin Jonsson and
                  Audrey Girouard and
                  Jakob Tholander},
  title        = {TwistBlocks: Pluggable and Twistable Modular {TUI} for Armature Interaction
                  in 3D Design},
  booktitle    = {Proceedings of the Twelfth International Conference on Tangible, Embedded,
                  and Embodied Interaction, {TEI} 2018, Stockholm, Sweden, March 18-21,
                  2018},
  pages        = {19--26},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3173225.3173231},
  doi          = {10.1145/3173225.3173231},
  timestamp    = {Mon, 27 Feb 2023 08:37:14 +0100},
  biburl       = {https://dblp.org/rec/conf/tei/WangLLMX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/GaoXLXKM18,
  author       = {Peng Gao and
                  Xusheng Xiao and
                  Zhichun Li and
                  Fengyuan Xu and
                  Sanjeev R. Kulkarni and
                  Prateek Mittal},
  editor       = {Haryadi S. Gunawi and
                  Benjamin C. Reed},
  title        = {{AIQL:} Enabling Efficient Attack Investigation from System Monitoring
                  Data},
  booktitle    = {2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston,
                  MA, USA, July 11-13, 2018},
  pages        = {113--126},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/atc18/presentation/gao},
  timestamp    = {Sat, 25 Feb 2023 23:39:37 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/GaoXLXKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GaoXLLJWKKM18,
  author       = {Peng Gao and
                  Xusheng Xiao and
                  Ding Li and
                  Zhichun Li and
                  Kangkook Jee and
                  Zhenyu Wu and
                  Chung Hwan Kim and
                  Sanjeev R. Kulkarni and
                  Prateek Mittal},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {{SAQL:} {A} Stream-based Query System for Real-Time Abnormal System
                  Behavior Detection},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {639--656},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/gao-peng},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GaoXLLJWKKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-02290,
  author       = {Peng Gao and
                  Xusheng Xiao and
                  Zhichun Li and
                  Kangkook Jee and
                  Fengyuan Xu and
                  Sanjeev R. Kulkarni and
                  Prateek Mittal},
  title        = {{AIQL:} Enabling Efficient Attack Investigation from System Monitoring
                  Data},
  journal      = {CoRR},
  volume       = {abs/1806.02290},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.02290},
  eprinttype    = {arXiv},
  eprint       = {1806.02290},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-02290.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-09339,
  author       = {Peng Gao and
                  Xusheng Xiao and
                  Ding Li and
                  Zhichun Li and
                  Kangkook Jee and
                  Zhenyu Wu and
                  Chung Hwan Kim and
                  Sanjeev R. Kulkarni and
                  Prateek Mittal},
  title        = {{SAQL:} {A} Stream-based Query System for Real-Time Abnormal System
                  Behavior Detection},
  journal      = {CoRR},
  volume       = {abs/1806.09339},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.09339},
  eprinttype    = {arXiv},
  eprint       = {1806.09339},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-09339.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-03464,
  author       = {Peng Gao and
                  Xusheng Xiao and
                  Zhichun Li and
                  Kangkook Jee and
                  Fengyuan Xu and
                  Sanjeev R. Kulkarni and
                  Prateek Mittal},
  title        = {A Query Tool for Efficiently Investigating Risky Software Behaviors},
  journal      = {CoRR},
  volume       = {abs/1810.03464},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.03464},
  eprinttype    = {arXiv},
  eprint       = {1810.03464},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-03464.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-04064,
  author       = {Shen Wang and
                  Zhengzhang Chen and
                  Ding Li and
                  Lu{-}An Tang and
                  Jingchao Ni and
                  Zhichun Li and
                  Junghwan Rhee and
                  Haifeng Chen and
                  Philip S. Yu},
  title        = {Deep Program Reidentification: {A} Graph Neural Network Solution},
  journal      = {CoRR},
  volume       = {abs/1812.04064},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.04064},
  eprinttype    = {arXiv},
  eprint       = {1812.04064},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-04064.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/DongCWT0LLC17,
  author       = {Boxiang Dong and
                  Zhengzhang Chen and
                  Wendy Hui Wang and
                  Lu{-}An Tang and
                  Kai Zhang and
                  Ying Lin and
                  Zhichun Li and
                  Haifeng Chen},
  editor       = {Ee{-}Peng Lim and
                  Marianne Winslett and
                  Mark Sanderson and
                  Ada Wai{-}Chee Fu and
                  Jimeng Sun and
                  J. Shane Culpepper and
                  Eric Lo and
                  Joyce C. Ho and
                  Debora Donato and
                  Rakesh Agrawal and
                  Yu Zheng and
                  Carlos Castillo and
                  Aixin Sun and
                  Vincent S. Tseng and
                  Chenliang Li},
  title        = {Efficient Discovery of Abnormal Event Sequences in Enterprise Security
                  Systems},
  booktitle    = {Proceedings of the 2017 {ACM} on Conference on Information and Knowledge
                  Management, {CIKM} 2017, Singapore, November 06 - 10, 2017},
  pages        = {707--715},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3132847.3132854},
  doi          = {10.1145/3132847.3132854},
  timestamp    = {Tue, 29 Aug 2023 16:24:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/DongCWT0LLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-07867,
  author       = {Chen Luo and
                  Zhengzhang Chen and
                  Lu{-}An Tang and
                  Anshumali Shrivastava and
                  Zhichun Li},
  title        = {Accelerating Dependency Graph Learning from Heterogeneous Categorical
                  Event Streams via Knowledge Transfer},
  journal      = {CoRR},
  volume       = {abs/1708.07867},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.07867},
  eprinttype    = {arXiv},
  eprint       = {1708.07867},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-07867.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuWLJRXXWJ16,
  author       = {Zhang Xu and
                  Zhenyu Wu and
                  Zhichun Li and
                  Kangkook Jee and
                  Junghwan Rhee and
                  Xusheng Xiao and
                  Fengyuan Xu and
                  Haining Wang and
                  Guofei Jiang},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {High Fidelity Data Reduction for Big Data Security Dependency Analyses},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {504--516},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978378},
  doi          = {10.1145/2976749.2978378},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuWLJRXXWJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FuRLL0J16,
  author       = {Yangchun Fu and
                  Junghwan Rhee and
                  Zhiqiang Lin and
                  Zhichun Li and
                  Hui Zhang and
                  Guofei Jiang},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Detecting Stack Layout Corruptions with Robust Stack Unwinding},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {71--94},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_4},
  doi          = {10.1007/978-3-319-45719-2\_4},
  timestamp    = {Fri, 27 Dec 2019 21:24:31 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/FuRLL0J16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/ZongXLWQYSJ15,
  author       = {Bo Zong and
                  Xusheng Xiao and
                  Zhichun Li and
                  Zhenyu Wu and
                  Zhiyun Qian and
                  Xifeng Yan and
                  Ambuj K. Singh and
                  Guofei Jiang},
  title        = {Behavior Query Discovery in System-Generated Temporal Graphs},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {9},
  number       = {4},
  pages        = {240--251},
  year         = {2015},
  url          = {http://www.vldb.org/pvldb/vol9/p240-zong.pdf},
  doi          = {10.14778/2856318.2856320},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/ZongXLWQYSJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangQLWRNLJ15,
  author       = {Jun Wang and
                  Zhiyun Qian and
                  Zhichun Li and
                  Zhenyu Wu and
                  Junghwan Rhee and
                  Xia Ning and
                  Peng Liu and
                  Guofei Jiang},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Discover and Tame Long-running Idling Processes in Enterprise Systems},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {543--554},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714613},
  doi          = {10.1145/2714576.2714613},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangQLWRNLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LuLKWLZQLJ15,
  author       = {Kangjie Lu and
                  Zhichun Li and
                  Vasileios P. Kemerlis and
                  Zhenyu Wu and
                  Long Lu and
                  Cong Zheng and
                  Zhiyun Qian and
                  Wenke Lee and
                  Guofei Jiang},
  title        = {Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced
                  Data-flow Analysis and Peer Voting},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/checking-more-and-alerting-less-detecting-privacy-leakages-enhanced-data-flow-analysis-and-peer},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LuLKWLZQLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HuangLXWLZJ15,
  author       = {Jianjun Huang and
                  Zhichun Li and
                  Xusheng Xiao and
                  Zhenyu Wu and
                  Kangjie Lu and
                  Xiangyu Zhang and
                  Guofei Jiang},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {{SUPOR:} Precise and Scalable Sensitive User Input Detection for Android
                  Apps},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {977--992},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/huang},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HuangLXWLZJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZongXLWQYSJ15,
  author       = {Bo Zong and
                  Xusheng Xiao and
                  Zhichun Li and
                  Zhenyu Wu and
                  Zhiyun Qian and
                  Xifeng Yan and
                  Ambuj K. Singh and
                  Guofei Jiang},
  title        = {Behavior Query Discovery in System-Generated Temporal Graphs},
  journal      = {CoRR},
  volume       = {abs/1511.05911},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.05911},
  eprinttype    = {arXiv},
  eprint       = {1511.05911},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZongXLWQYSJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgec/LiZ14,
  author       = {Zhichun Li and
                  Yong Zheng},
  editor       = {Hui Sun and
                  Chin{-}Yu Yang and
                  Chun{-}Wei Lin and
                  Jeng{-}Shyang Pan and
                  V{\'{a}}clav Sn{\'{a}}sel and
                  Ajith Abraham},
  title        = {Seismic Qualification of Telecommunication System in Nuclear Power
                  Plant},
  booktitle    = {Genetic and Evolutionary Computing - Proceeding of the Eighth International
                  Conference on Genetic and Evolutionary Computing, {ICGEC} 2014, October
                  18-20, 2014, Nanchang, China},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {329},
  pages        = {353--358},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12286-1\_36},
  doi          = {10.1007/978-3-319-12286-1\_36},
  timestamp    = {Wed, 07 Dec 2022 23:12:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icgec/LiZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/CaoRLCM13,
  author       = {Yinzhi Cao and
                  Vaibhav Rastogi and
                  Zhichun Li and
                  Yan Chen and
                  Alexander Moshchuk},
  title        = {Redefining web browser principals with a Configurable Origin Policy},
  booktitle    = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
  pages        = {1--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/DSN.2013.6575317},
  doi          = {10.1109/DSN.2013.6575317},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/CaoRLCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaoLRCW12,
  author       = {Yinzhi Cao and
                  Zhichun Li and
                  Vaibhav Rastogi and
                  Yan Chen and
                  Xitao Wen},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Virtual browser: a virtualized browser to sandbox third-party JavaScripts
                  with enhanced security},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {8--9},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414460},
  doi          = {10.1145/2414456.2414460},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaoLRCW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuLWLJ12,
  author       = {Long Lu and
                  Zhichun Li and
                  Zhenyu Wu and
                  Wenke Lee and
                  Guofei Jiang},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {{CHEX:} statically vetting Android apps for component hijacking vulnerabilities},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {229--240},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382223},
  doi          = {10.1145/2382196.2382223},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LuLWLJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/LiGCK11,
  author       = {Zhichun Li and
                  Anup Goyal and
                  Yan Chen and
                  Aleksandar Kuzmanovic},
  title        = {Measurement and diagnosis of address misconfigured {P2P} traffic},
  journal      = {{IEEE} Netw.},
  volume       = {25},
  number       = {3},
  pages        = {22--28},
  year         = {2011},
  url          = {https://doi.org/10.1109/MNET.2011.5772057},
  doi          = {10.1109/MNET.2011.5772057},
  timestamp    = {Sun, 14 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/LiGCK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiGCP11,
  author       = {Zhichun Li and
                  Anup Goyal and
                  Yan Chen and
                  Vern Paxson},
  title        = {Towards Situational Awareness of Large-Scale Botnet Probing Events},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {6},
  number       = {1},
  pages        = {175--188},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIFS.2010.2086445},
  doi          = {10.1109/TIFS.2010.2086445},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiGCP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuGLC11,
  author       = {Jun Hu and
                  Hongyu Gao and
                  Zhichun Li and
                  Yan Chen},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: {CUD:} crowdsourcing for {URL} spam detection},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {785--788},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093493},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HuGLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiTCRCLS11,
  author       = {Zhichun Li and
                  Yi Tang and
                  Yinzhi Cao and
                  Vaibhav Rastogi and
                  Yan Chen and
                  Bin Liu and
                  Clint Sbisa},
  title        = {WebShield: Enabling Various Web Defense Techniques without Client
                  Side Modifications},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/webshield-enabling-various-web-defense-techniques-without-client-side-modifications},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LiTCRCLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LiGC10,
  author       = {Zhichun Li and
                  Yan Gao and
                  Yan Chen},
  title        = {HiFIND: {A} high-speed flow-level intrusion detection approach with
                  DoS resiliency},
  journal      = {Comput. Networks},
  volume       = {54},
  number       = {8},
  pages        = {1282--1299},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.comnet.2009.10.016},
  doi          = {10.1016/J.COMNET.2009.10.016},
  timestamp    = {Wed, 22 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/LiGC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/WangLCFL10,
  author       = {Lanjia Wang and
                  Zhichun Li and
                  Yan Chen and
                  Zhi Fu and
                  Xing Li},
  title        = {Thwarting zero-day polymorphic worms with network-level length-based
                  signature generation},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {18},
  number       = {1},
  pages        = {53--66},
  year         = {2010},
  url          = {http://doi.acm.org/10.1145/1816288.1816293},
  doi          = {10.1145/1816288.1816293},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/WangLCFL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaoLRC10,
  author       = {Yinzhi Cao and
                  Zhichun Li and
                  Vaibhav Rastogi and
                  Yan Chen},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Virtual browser: a web-level sandbox to secure third-party JavaScript
                  without sacrificing functionality},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {654--656},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866387},
  doi          = {10.1145/1866307.1866387},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaoLRC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GaoHWLCZ10,
  author       = {Hongyu Gao and
                  Jun Hu and
                  Christo Wilson and
                  Zhichun Li and
                  Yan Chen and
                  Ben Y. Zhao},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Detecting and characterizing social spam campaigns},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {681--683},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866396},
  doi          = {10.1145/1866307.1866396},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GaoHWLCZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/GaoHWLCZ10,
  author       = {Hongyu Gao and
                  Jun Hu and
                  Christo Wilson and
                  Zhichun Li and
                  Yan Chen and
                  Ben Y. Zhao},
  editor       = {Mark Allman},
  title        = {Detecting and characterizing social spam campaigns},
  booktitle    = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2010, Melbourne, Australia - November 1-3, 2010},
  pages        = {35--47},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1879141.1879147},
  doi          = {10.1145/1879141.1879147},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/GaoHWLCZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiGCK10,
  author       = {Zhichun Li and
                  Anup Goyal and
                  Yan Chen and
                  Aleksandar Kuzmanovic},
  title        = {Measurement and Diagnosis of Address Misconfigured {P2P} Traffic},
  booktitle    = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  15-19 March 2010, San Diego, CA, {USA}},
  pages        = {1091--1099},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/INFCOM.2010.5461939},
  doi          = {10.1109/INFCOM.2010.5461939},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiGCK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/LiZZCGW10,
  author       = {Zhichun Li and
                  Ming Zhang and
                  Zhaosheng Zhu and
                  Yan Chen and
                  Albert G. Greenberg and
                  Yi{-}Min Wang},
  title        = {WebProphet: Automating Performance Prediction for Web Services},
  booktitle    = {Proceedings of the 7th {USENIX} Symposium on Networked Systems Design
                  and Implementation, {NSDI} 2010, April 28-30, 2010, San Jose, CA,
                  {USA}},
  pages        = {143--158},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/nsdi10/tech/full\_papers/li.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/LiZZCGW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/LiXGTCLJL10,
  author       = {Zhichun Li and
                  Gao Xia and
                  Hongyu Gao and
                  Yi Tang and
                  Yan Chen and
                  Bin Liu and
                  Junchen Jiang and
                  Yuezhou Lv},
  editor       = {Shivkumar Kalyanaraman and
                  Venkata N. Padmanabhan and
                  K. K. Ramakrishnan and
                  Rajeev Shorey and
                  Geoffrey M. Voelker},
  title        = {NetShield: massive semantics-based vulnerability signature matching
                  for high-speed networks},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2010 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communications,
                  New Delhi, India, August 30 -September 3, 2010},
  pages        = {279--290},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1851182.1851216},
  doi          = {10.1145/1851182.1851216},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/LiXGTCLJL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BarfordCGLPY10,
  author       = {Paul Barford and
                  Yan Chen and
                  Anup Goyal and
                  Zhichun Li and
                  Vern Paxson and
                  Vinod Yegneswaran},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Employing Honeynets For Network Situational Awareness},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {71--102},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_5},
  doi          = {10.1007/978-1-4419-0140-8\_5},
  timestamp    = {Wed, 25 Sep 2019 17:41:05 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BarfordCGLPY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiGCP09,
  author       = {Zhichun Li and
                  Anup Goyal and
                  Yan Chen and
                  Vern Paxson},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Automating analysis of large-scale botnet probing events},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {11--22},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533063},
  doi          = {10.1145/1533057.1533063},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiGCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LiGC08,
  author       = {Zhichun Li and
                  Anup Goyal and
                  Yan Chen},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Honeynet-based Botnet Scan Traffic Analysis},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {25--44},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_2},
  doi          = {10.1007/978-0-387-68768-1\_2},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LiGC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/SchwellerLCGGZDKM07,
  author       = {Robert T. Schweller and
                  Zhichun Li and
                  Yan Chen and
                  Yan Gao and
                  Ashish Gupta and
                  Yin Zhang and
                  Peter A. Dinda and
                  Ming{-}Yang Kao and
                  Gokhan Memik},
  title        = {Reversible sketches: enabling monitoring and analysis over high-speed
                  data streams},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {15},
  number       = {5},
  pages        = {1059--1072},
  year         = {2007},
  url          = {http://doi.acm.org/10.1145/1322413.1322420},
  doi          = {10.1145/1322413.1322420},
  timestamp    = {Wed, 22 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/SchwellerLCGGZDKM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/LiWCF07,
  author       = {Zhichun Li and
                  Lanjia Wang and
                  Yan Chen and
                  Zhi Fu},
  title        = {Network-based and Attack-resilient Length Signature Generation for
                  Zero-day Polymorphic Worms},
  booktitle    = {Proceedings of the {IEEE} International Conference on Network Protocols,
                  {ICNP} 2007, October 16-19, 2007, Beijing, China},
  pages        = {164--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNP.2007.4375847},
  doi          = {10.1109/ICNP.2007.4375847},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/LiWCF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cga/RenGLCW06,
  author       = {Pin Ren and
                  Yan Gao and
                  Zhichun Li and
                  Yan Chen and
                  Benjamin Watson},
  title        = {IDGraphs: Intrusion Detection and Analysis Using Stream Compositing},
  journal      = {{IEEE} Computer Graphics and Applications},
  volume       = {26},
  number       = {2},
  pages        = {28--39},
  year         = {2006},
  url          = {https://doi.org/10.1109/MCG.2006.36},
  doi          = {10.1109/MCG.2006.36},
  timestamp    = {Fri, 02 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cga/RenGLCW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/GaoLC06,
  author       = {Yan Gao and
                  Zhichun Li and
                  Yan Chen},
  title        = {A DoS Resilient Flow-level Intrusion Detection Approach for High-speed
                  Networks},
  booktitle    = {26th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal},
  pages        = {39},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICDCS.2006.6},
  doi          = {10.1109/ICDCS.2006.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/GaoLC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/SchwellerLCGGZDKM06,
  author       = {Robert T. Schweller and
                  Zhichun Li and
                  Yan Chen and
                  Yan Gao and
                  Ashish Gupta and
                  Yin Zhang and
                  Peter A. Dinda and
                  Ming{-}Yang Kao and
                  Gokhan Memik},
  title        = {Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation,
                  and Applications},
  booktitle    = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  23-29 April 2006, Barcelona, Catalunya, Spain},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/INFOCOM.2006.203},
  doi          = {10.1109/INFOCOM.2006.203},
  timestamp    = {Wed, 22 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/SchwellerLCGGZDKM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/LiCB06,
  author       = {Zhichun Li and
                  Yan Chen and
                  Aaron Beach},
  title        = {Towards scalable and robust distributed intrusion alert fusion with
                  good load balancing},
  booktitle    = {Proceedings of the 2006 {SIGCOMM} Workshop on Large-Scale Attack Defense,
                  {LSAD} '06, Pisa, Italy, September 11-15, 2006},
  pages        = {115--122},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1162666.1162669},
  doi          = {10.1145/1162666.1162669},
  timestamp    = {Thu, 03 Feb 2022 15:46:18 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/LiCB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiSCKC06,
  author       = {Zhichun Li and
                  Manan Sanghi and
                  Yan Chen and
                  Ming{-}Yang Kao and
                  Brian Chavez},
  title        = {Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with
                  Provable Attack Resilience},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {32--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.18},
  doi          = {10.1109/SP.2006.18},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LiSCKC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/RenGLCW05,
  author       = {Pin Ren and
                  Yan Gao and
                  Zhichun Li and
                  Yan Chen and
                  Benjamin Watson},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {IDGraphs: Intrusion Detection and Analysis Using Histographs},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {5},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.7},
  doi          = {10.1109/VIZSEC.2005.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/RenGLCW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics