Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zhichun Li
@article{DBLP:journals/access/LiLGYWY24, author = {Lingbo Li and Zhichun Li and Fusen Guo and Haoyu Yang and Jingtian Wei and Zhengyi Yang}, title = {Prototype Comparison Convolutional Networks for One-Shot Segmentation}, journal = {{IEEE} Access}, volume = {12}, pages = {54978--54990}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3387742}, doi = {10.1109/ACCESS.2024.3387742}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiLGYWY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MukherjeeW0KRWL24, author = {Kunal Mukherjee and Joshua Wiedemeier and Qi Wang and Junpei Kamimura and Junghwan John Rhee and James Wei and Zhichun Li and Xiao Yu and Lu{-}An Tang and Jiaping Gui and Kangkook Jee}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {241--268}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8\_10}, doi = {10.1007/978-3-031-54776-8\_10}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/MukherjeeW0KRWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/GaoLT024, author = {Ruihao Gao and Zhichun Li and Guangming Tan and Xueqi Li}, editor = {Rajiv Gupta and Nael B. Abu{-}Ghazaleh and Madan Musuvathi and Dan Tsafrir}, title = {BeeZip: Towards An Organized and Scalable Architecture for Data Compression}, booktitle = {Proceedings of the 29th {ACM} International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3, {ASPLOS} 2024, La Jolla, CA, USA, 27 April 2024- 1 May 2024}, pages = {133--148}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3620666.3651323}, doi = {10.1145/3620666.3651323}, timestamp = {Thu, 25 Apr 2024 09:21:33 +0200}, biburl = {https://dblp.org/rec/conf/asplos/GaoLT024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/NanLZCCDZTHQ23, author = {Guoshun Nan and Zhichun Li and Jinli Zhai and Qimei Cui and Gong Chen and Xin Du and Xuefei Zhang and Xiaofeng Tao and Zhu Han and Tony Q. S. Quek}, title = {Physical-Layer Adversarial Robustness for Deep Learning-Based Semantic Communications}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {41}, number = {8}, pages = {2592--2608}, year = {2023}, url = {https://doi.org/10.1109/JSAC.2023.3288249}, doi = {10.1109/JSAC.2023.3288249}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/NanLZCCDZTHQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/XiaoGLZJZ23, author = {Jianjun Xiao and Changsheng Gao and Zhichun Li and Kai Zhang and Jia Jia and Dan Zhang}, title = {Research on Electromagnetic Effect Generated by {DC} Converter on Human Body in Electric Vehicle}, booktitle = {97th {IEEE} Vehicular Technology Conference, {VTC} Spring 2023, Florence, Italy, June 20-23, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VTC2023-Spring57618.2023.10199698}, doi = {10.1109/VTC2023-SPRING57618.2023.10199698}, timestamp = {Fri, 25 Aug 2023 08:20:01 +0200}, biburl = {https://dblp.org/rec/conf/vtc/XiaoGLZJZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-08365, author = {Kun Li and Zhichun Li and Yuetao Chen and Zixuan Wang and Yiwei Zhang and Liang Yuan and Haipeng Jia and Yunquan Zhang and Ting Cao and Mao Yang}, title = {Gamify Stencil Dwarf on Cloud for Democratizing Scientific Computing}, journal = {CoRR}, volume = {abs/2303.08365}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.08365}, doi = {10.48550/ARXIV.2303.08365}, eprinttype = {arXiv}, eprint = {2303.08365}, timestamp = {Mon, 20 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-08365.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/LiJLZYS22, author = {Zhichun Li and Yu Jiang and Xiaochen Liu and Yuhang Zhao and Chun Yu and Yuanchun Shi}, title = {Enhancing Revisitation in Touchscreen Reading for Visually Impaired People with Semantic Navigation Design}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {6}, number = {3}, pages = {126:1--126:22}, year = {2022}, url = {https://doi.org/10.1145/3550290}, doi = {10.1145/3550290}, timestamp = {Sun, 18 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imwut/LiJLZYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/LiZNLCT22, author = {Zeju Li and Jinfei Zhou and Guoshun Nan and Zhichun Li and Qimei Cui and Xiaofeng Tao}, title = {SemBAT: Physical Layer Black-box Adversarial Attacks for Deep Learning-based Semantic Communication Systems}, booktitle = {96th Vehicular Technology Conference, {VTC} Fall 2022, London, United Kingdom, September 26-29, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VTC2022-Fall57202.2022.10012766}, doi = {10.1109/VTC2022-FALL57202.2022.10012766}, timestamp = {Tue, 24 Jan 2023 16:39:10 +0100}, biburl = {https://dblp.org/rec/conf/vtc/LiZNLCT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/expert/DongCTCWZLL21, author = {Boxiang Dong and Zhengzhang Chen and Lu{-}An Tang and Haifeng Chen and Hui Wang and Kai Zhang and Ying Lin and Zhichun Li}, title = {Anomalous Event Sequence Detection}, journal = {{IEEE} Intell. Syst.}, volume = {36}, number = {3}, pages = {5--13}, year = {2021}, url = {https://doi.org/10.1109/MIS.2020.3041174}, doi = {10.1109/MIS.2020.3041174}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/expert/DongCTCWZLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LiWW0LJRC21, author = {Yue Li and Zhenyu Wu and Haining Wang and Kun Sun and Zhichun Li and Kangkook Jee and Junghwan Rhee and Haifeng Chen}, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {UTrack: Enterprise User Tracking Based on OS-Level Audit Logs}, booktitle = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, pages = {161--172}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337.3447831}, doi = {10.1145/3422337.3447831}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/LiWW0LJRC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HassanLJ0ZWCLRG20, author = {Wajih Ul Hassan and Ding Li and Kangkook Jee and Xiao Yu and Kexuan Zou and Dawei Wang and Zhengzhang Chen and Zhichun Li and Junghwan Rhee and Jiaping Gui and Adam Bates}, title = {This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {165--178}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427255}, doi = {10.1145/3427228.3427255}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HassanLJ0ZWCLRG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/SunJSLLKWRKCM20, author = {Yixin Sun and Kangkook Jee and Suphannee Sivakorn and Zhichun Li and Cristian Lumezanu and Lauri Korts{-}P{\"{a}}rn and Zhenyu Wu and Junghwan Rhee and Chung Hwan Kim and Mung Chiang and Prateek Mittal}, title = {Detecting Malware Injection with Program-DNS Behavior}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {552--568}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00042}, doi = {10.1109/EUROSP48549.2020.00042}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/SunJSLLKWRKCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/GuiLCRX0JLC20, author = {Jiaping Gui and Ding Li and Zhengzhang Chen and Junghwan Rhee and Xusheng Xiao and Mu Zhang and Kangkook Jee and Zhichun Li and Haifeng Chen}, title = {APTrace: {A} Responsive System for Agile Enterprise Level Causality Analysis}, booktitle = {36th {IEEE} International Conference on Data Engineering, {ICDE} 2020, Dallas, TX, USA, April 20-24, 2020}, pages = {1701--1712}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDE48307.2020.00151}, doi = {10.1109/ICDE48307.2020.00151}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icde/GuiLCRX0JLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/GaoXLJXKM19, author = {Peng Gao and Xusheng Xiao and Zhichun Li and Kangkook Jee and Fengyuan Xu and Sanjeev R. Kulkarni and Prateek Mittal}, title = {A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security}, journal = {Proc. {VLDB} Endow.}, volume = {12}, number = {12}, pages = {1802--1805}, year = {2019}, url = {http://www.vldb.org/pvldb/vol12/p1802-gao.pdf}, doi = {10.14778/3352063.3352070}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/GaoXLJXKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/JeonRKLPLW19, author = {Yuseok Jeon and Junghwan Rhee and Chung Hwan Kim and Zhichun Li and Mathias Payer and Byoungyoung Lee and Zhenyu Wu}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {209--220}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3300028}, doi = {10.1145/3292006.3300028}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/JeonRKLPLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/WangCYLNTGLCY19, author = {Shen Wang and Zhengzhang Chen and Xiao Yu and Ding Li and Jingchao Ni and Lu{-}An Tang and Jiaping Gui and Zhichun Li and Haifeng Chen and Philip S. Yu}, editor = {Sarit Kraus}, title = {Heterogeneous Graph Matching Networks for Unknown Malware Detection}, booktitle = {Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16, 2019}, pages = {3762--3770}, publisher = {ijcai.org}, year = {2019}, url = {https://doi.org/10.24963/ijcai.2019/522}, doi = {10.24963/IJCAI.2019/522}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcai/WangCYLNTGLCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HassanGLCJL019, author = {Wajih Ul Hassan and Shengjian Guo and Ding Li and Zhengzhang Chen and Kangkook Jee and Zhichun Li and Adam Bates}, title = {NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/nodoze-combatting-threat-alert-fatigue-with-automated-provenance-triage/}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/HassanGLCJL019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SivakornJSKLLWT19, author = {Suphannee Sivakorn and Kangkook Jee and Yixin Sun and Lauri Korts{-}P{\"{a}}rn and Zhichun Li and Cristian Lumezanu and Zhenyu Wu and Lu{-}An Tang and Ding Li}, title = {Countering Malicious Processes with Process-DNS Association}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/countering-malicious-processes-with-process-dns-association/}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SivakornJSKLLWT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdm/WangCLLTNRCY19, author = {Shen Wang and Zhengzhang Chen and Ding Li and Zhichun Li and Lu{-}An Tang and Jingchao Ni and Junghwan Rhee and Haifeng Chen and Philip S. Yu}, editor = {Tanya Y. Berger{-}Wolf and Nitesh V. Chawla}, title = {Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification}, booktitle = {Proceedings of the 2019 {SIAM} International Conference on Data Mining, {SDM} 2019, Calgary, Alberta, Canada, May 2-4, 2019}, pages = {693--701}, publisher = {{SIAM}}, year = {2019}, url = {https://doi.org/10.1137/1.9781611975673.78}, doi = {10.1137/1.9781611975673.78}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdm/WangCLLTNRCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-08159, author = {Peng Gao and Xusheng Xiao and Ding Li and Zhichun Li and Kangkook Jee and Zhenyu Wu and Chung Hwan Kim and Sanjeev R. Kulkarni and Prateek Mittal}, title = {A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security}, journal = {CoRR}, volume = {abs/1903.08159}, year = {2019}, url = {http://arxiv.org/abs/1903.08159}, eprinttype = {arXiv}, eprint = {1903.08159}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-08159.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-03679, author = {Shen Wang and Zhengzhang Chen and Jingchao Ni and Xiao Yu and Zhichun Li and Haifeng Chen and Philip S. Yu}, title = {Adversarial Defense Framework for Graph Neural Network}, journal = {CoRR}, volume = {abs/1905.03679}, year = {2019}, url = {http://arxiv.org/abs/1905.03679}, eprinttype = {arXiv}, eprint = {1905.03679}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-03679.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-08074, author = {Shen Wang and Zhengzhang Chen and Xiao Yu and Ding Li and Jingchao Ni and Lu{-}An Tang and Jiaping Gui and Zhichun Li and Haifeng Chen and Philip S. Yu}, title = {Heterogeneous Graph Matching Networks}, journal = {CoRR}, volume = {abs/1910.08074}, year = {2019}, url = {http://arxiv.org/abs/1910.08074}, eprinttype = {arXiv}, eprint = {1910.08074}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-08074.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TangLLZJXWRXL18, author = {Yutao Tang and Ding Li and Zhichun Li and Mu Zhang and Kangkook Jee and Xusheng Xiao and Zhenyu Wu and Junghwan Rhee and Fengyuan Xu and Qun Li}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1324--1337}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243763}, doi = {10.1145/3243734.3243763}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TangLLZJXWRXL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/CaoCCTLL18, author = {Cheng Cao and Zhengzhang Chen and James Caverlee and Lu{-}An Tang and Chen Luo and Zhichun Li}, editor = {Alfredo Cuzzocrea and James Allan and Norman W. Paton and Divesh Srivastava and Rakesh Agrawal and Andrei Z. Broder and Mohammed J. Zaki and K. Sel{\c{c}}uk Candan and Alexandros Labrinidis and Assaf Schuster and Haixun Wang}, title = {Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks}, booktitle = {Proceedings of the 27th {ACM} International Conference on Information and Knowledge Management, {CIKM} 2018, Torino, Italy, October 22-26, 2018}, pages = {1977--1985}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3269206.3272022}, doi = {10.1145/3269206.3272022}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cikm/CaoCCTLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/LinCCT0CL18, author = {Ying Lin and Zhengzhang Chen and Cheng Cao and Lu{-}An Tang and Kai Zhang and Wei Cheng and Zhichun Li}, editor = {Alfredo Cuzzocrea and James Allan and Norman W. Paton and Divesh Srivastava and Rakesh Agrawal and Andrei Z. Broder and Mohammed J. Zaki and K. Sel{\c{c}}uk Candan and Alexandros Labrinidis and Assaf Schuster and Haixun Wang}, title = {Collaborative Alert Ranking for Anomaly Detection}, booktitle = {Proceedings of the 27th {ACM} International Conference on Information and Knowledge Management, {CIKM} 2018, Torino, Italy, October 22-26, 2018}, pages = {1987--1995}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3269206.3272013}, doi = {10.1145/3269206.3272013}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cikm/LinCCT0CL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/LuoCTSLCY18, author = {Chen Luo and Zhengzhang Chen and Lu{-}An Tang and Anshumali Shrivastava and Zhichun Li and Haifeng Chen and Jieping Ye}, editor = {Yike Guo and Faisal Farooq}, title = {{TINET:} Learning Invariant Networks via Knowledge Transfer}, booktitle = {Proceedings of the 24th {ACM} {SIGKDD} International Conference on Knowledge Discovery {\&} Data Mining, {KDD} 2018, London, UK, August 19-23, 2018}, pages = {1890--1899}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3219819.3220003}, doi = {10.1145/3219819.3220003}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/LuoCTSLCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiuZLJLWRM18, author = {Yushan Liu and Mu Zhang and Ding Li and Kangkook Jee and Zhichun Li and Zhenyu Wu and Junghwan Rhee and Prateek Mittal}, title = {Towards a Timely Causality Analysis for Enterprise Security}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_07B-3\_Liu\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LiuZLJLWRM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tei/WangLLMX18, author = {Meng Wang and Kehua Lei and Zhichun Li and Haipeng Mi and Yingqing Xu}, editor = {Ylva Fernaeus and Donald McMillan and Martin Jonsson and Audrey Girouard and Jakob Tholander}, title = {TwistBlocks: Pluggable and Twistable Modular {TUI} for Armature Interaction in 3D Design}, booktitle = {Proceedings of the Twelfth International Conference on Tangible, Embedded, and Embodied Interaction, {TEI} 2018, Stockholm, Sweden, March 18-21, 2018}, pages = {19--26}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3173225.3173231}, doi = {10.1145/3173225.3173231}, timestamp = {Mon, 27 Feb 2023 08:37:14 +0100}, biburl = {https://dblp.org/rec/conf/tei/WangLLMX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/GaoXLXKM18, author = {Peng Gao and Xusheng Xiao and Zhichun Li and Fengyuan Xu and Sanjeev R. Kulkarni and Prateek Mittal}, editor = {Haryadi S. Gunawi and Benjamin C. Reed}, title = {{AIQL:} Enabling Efficient Attack Investigation from System Monitoring Data}, booktitle = {2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston, MA, USA, July 11-13, 2018}, pages = {113--126}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/atc18/presentation/gao}, timestamp = {Sat, 25 Feb 2023 23:39:37 +0100}, biburl = {https://dblp.org/rec/conf/usenix/GaoXLXKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GaoXLLJWKKM18, author = {Peng Gao and Xusheng Xiao and Ding Li and Zhichun Li and Kangkook Jee and Zhenyu Wu and Chung Hwan Kim and Sanjeev R. Kulkarni and Prateek Mittal}, editor = {William Enck and Adrienne Porter Felt}, title = {{SAQL:} {A} Stream-based Query System for Real-Time Abnormal System Behavior Detection}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {639--656}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/gao-peng}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GaoXLLJWKKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-02290, author = {Peng Gao and Xusheng Xiao and Zhichun Li and Kangkook Jee and Fengyuan Xu and Sanjeev R. Kulkarni and Prateek Mittal}, title = {{AIQL:} Enabling Efficient Attack Investigation from System Monitoring Data}, journal = {CoRR}, volume = {abs/1806.02290}, year = {2018}, url = {http://arxiv.org/abs/1806.02290}, eprinttype = {arXiv}, eprint = {1806.02290}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-02290.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-09339, author = {Peng Gao and Xusheng Xiao and Ding Li and Zhichun Li and Kangkook Jee and Zhenyu Wu and Chung Hwan Kim and Sanjeev R. Kulkarni and Prateek Mittal}, title = {{SAQL:} {A} Stream-based Query System for Real-Time Abnormal System Behavior Detection}, journal = {CoRR}, volume = {abs/1806.09339}, year = {2018}, url = {http://arxiv.org/abs/1806.09339}, eprinttype = {arXiv}, eprint = {1806.09339}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-09339.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-03464, author = {Peng Gao and Xusheng Xiao and Zhichun Li and Kangkook Jee and Fengyuan Xu and Sanjeev R. Kulkarni and Prateek Mittal}, title = {A Query Tool for Efficiently Investigating Risky Software Behaviors}, journal = {CoRR}, volume = {abs/1810.03464}, year = {2018}, url = {http://arxiv.org/abs/1810.03464}, eprinttype = {arXiv}, eprint = {1810.03464}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-03464.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-04064, author = {Shen Wang and Zhengzhang Chen and Ding Li and Lu{-}An Tang and Jingchao Ni and Zhichun Li and Junghwan Rhee and Haifeng Chen and Philip S. Yu}, title = {Deep Program Reidentification: {A} Graph Neural Network Solution}, journal = {CoRR}, volume = {abs/1812.04064}, year = {2018}, url = {http://arxiv.org/abs/1812.04064}, eprinttype = {arXiv}, eprint = {1812.04064}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-04064.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/DongCWT0LLC17, author = {Boxiang Dong and Zhengzhang Chen and Wendy Hui Wang and Lu{-}An Tang and Kai Zhang and Ying Lin and Zhichun Li and Haifeng Chen}, editor = {Ee{-}Peng Lim and Marianne Winslett and Mark Sanderson and Ada Wai{-}Chee Fu and Jimeng Sun and J. Shane Culpepper and Eric Lo and Joyce C. Ho and Debora Donato and Rakesh Agrawal and Yu Zheng and Carlos Castillo and Aixin Sun and Vincent S. Tseng and Chenliang Li}, title = {Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems}, booktitle = {Proceedings of the 2017 {ACM} on Conference on Information and Knowledge Management, {CIKM} 2017, Singapore, November 06 - 10, 2017}, pages = {707--715}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3132847.3132854}, doi = {10.1145/3132847.3132854}, timestamp = {Tue, 29 Aug 2023 16:24:43 +0200}, biburl = {https://dblp.org/rec/conf/cikm/DongCWT0LLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-07867, author = {Chen Luo and Zhengzhang Chen and Lu{-}An Tang and Anshumali Shrivastava and Zhichun Li}, title = {Accelerating Dependency Graph Learning from Heterogeneous Categorical Event Streams via Knowledge Transfer}, journal = {CoRR}, volume = {abs/1708.07867}, year = {2017}, url = {http://arxiv.org/abs/1708.07867}, eprinttype = {arXiv}, eprint = {1708.07867}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-07867.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuWLJRXXWJ16, author = {Zhang Xu and Zhenyu Wu and Zhichun Li and Kangkook Jee and Junghwan Rhee and Xusheng Xiao and Fengyuan Xu and Haining Wang and Guofei Jiang}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {High Fidelity Data Reduction for Big Data Security Dependency Analyses}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {504--516}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978378}, doi = {10.1145/2976749.2978378}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuWLJRXXWJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FuRLL0J16, author = {Yangchun Fu and Junghwan Rhee and Zhiqiang Lin and Zhichun Li and Hui Zhang and Guofei Jiang}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Detecting Stack Layout Corruptions with Robust Stack Unwinding}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {71--94}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_4}, doi = {10.1007/978-3-319-45719-2\_4}, timestamp = {Fri, 27 Dec 2019 21:24:31 +0100}, biburl = {https://dblp.org/rec/conf/raid/FuRLL0J16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/ZongXLWQYSJ15, author = {Bo Zong and Xusheng Xiao and Zhichun Li and Zhenyu Wu and Zhiyun Qian and Xifeng Yan and Ambuj K. Singh and Guofei Jiang}, title = {Behavior Query Discovery in System-Generated Temporal Graphs}, journal = {Proc. {VLDB} Endow.}, volume = {9}, number = {4}, pages = {240--251}, year = {2015}, url = {http://www.vldb.org/pvldb/vol9/p240-zong.pdf}, doi = {10.14778/2856318.2856320}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/ZongXLWQYSJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangQLWRNLJ15, author = {Jun Wang and Zhiyun Qian and Zhichun Li and Zhenyu Wu and Junghwan Rhee and Xia Ning and Peng Liu and Guofei Jiang}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Discover and Tame Long-running Idling Processes in Enterprise Systems}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {543--554}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714613}, doi = {10.1145/2714576.2714613}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangQLWRNLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LuLKWLZQLJ15, author = {Kangjie Lu and Zhichun Li and Vasileios P. Kemerlis and Zhenyu Wu and Long Lu and Cong Zheng and Zhiyun Qian and Wenke Lee and Guofei Jiang}, title = {Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/checking-more-and-alerting-less-detecting-privacy-leakages-enhanced-data-flow-analysis-and-peer}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LuLKWLZQLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HuangLXWLZJ15, author = {Jianjun Huang and Zhichun Li and Xusheng Xiao and Zhenyu Wu and Kangjie Lu and Xiangyu Zhang and Guofei Jiang}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {{SUPOR:} Precise and Scalable Sensitive User Input Detection for Android Apps}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {977--992}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/huang}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/HuangLXWLZJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZongXLWQYSJ15, author = {Bo Zong and Xusheng Xiao and Zhichun Li and Zhenyu Wu and Zhiyun Qian and Xifeng Yan and Ambuj K. Singh and Guofei Jiang}, title = {Behavior Query Discovery in System-Generated Temporal Graphs}, journal = {CoRR}, volume = {abs/1511.05911}, year = {2015}, url = {http://arxiv.org/abs/1511.05911}, eprinttype = {arXiv}, eprint = {1511.05911}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZongXLWQYSJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgec/LiZ14, author = {Zhichun Li and Yong Zheng}, editor = {Hui Sun and Chin{-}Yu Yang and Chun{-}Wei Lin and Jeng{-}Shyang Pan and V{\'{a}}clav Sn{\'{a}}sel and Ajith Abraham}, title = {Seismic Qualification of Telecommunication System in Nuclear Power Plant}, booktitle = {Genetic and Evolutionary Computing - Proceeding of the Eighth International Conference on Genetic and Evolutionary Computing, {ICGEC} 2014, October 18-20, 2014, Nanchang, China}, series = {Advances in Intelligent Systems and Computing}, volume = {329}, pages = {353--358}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12286-1\_36}, doi = {10.1007/978-3-319-12286-1\_36}, timestamp = {Wed, 07 Dec 2022 23:12:59 +0100}, biburl = {https://dblp.org/rec/conf/icgec/LiZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/CaoRLCM13, author = {Yinzhi Cao and Vaibhav Rastogi and Zhichun Li and Yan Chen and Alexander Moshchuk}, title = {Redefining web browser principals with a Configurable Origin Policy}, booktitle = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DSN.2013.6575317}, doi = {10.1109/DSN.2013.6575317}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/CaoRLCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaoLRCW12, author = {Yinzhi Cao and Zhichun Li and Vaibhav Rastogi and Yan Chen and Xitao Wen}, editor = {Heung Youl Youm and Yoojae Won}, title = {Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {8--9}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414460}, doi = {10.1145/2414456.2414460}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaoLRCW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuLWLJ12, author = {Long Lu and Zhichun Li and Zhenyu Wu and Wenke Lee and Guofei Jiang}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {{CHEX:} statically vetting Android apps for component hijacking vulnerabilities}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {229--240}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382223}, doi = {10.1145/2382196.2382223}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LuLWLJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/LiGCK11, author = {Zhichun Li and Anup Goyal and Yan Chen and Aleksandar Kuzmanovic}, title = {Measurement and diagnosis of address misconfigured {P2P} traffic}, journal = {{IEEE} Netw.}, volume = {25}, number = {3}, pages = {22--28}, year = {2011}, url = {https://doi.org/10.1109/MNET.2011.5772057}, doi = {10.1109/MNET.2011.5772057}, timestamp = {Sun, 14 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/LiGCK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiGCP11, author = {Zhichun Li and Anup Goyal and Yan Chen and Vern Paxson}, title = {Towards Situational Awareness of Large-Scale Botnet Probing Events}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {6}, number = {1}, pages = {175--188}, year = {2011}, url = {https://doi.org/10.1109/TIFS.2010.2086445}, doi = {10.1109/TIFS.2010.2086445}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiGCP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuGLC11, author = {Jun Hu and Hongyu Gao and Zhichun Li and Yan Chen}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: {CUD:} crowdsourcing for {URL} spam detection}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {785--788}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093493}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuGLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiTCRCLS11, author = {Zhichun Li and Yi Tang and Yinzhi Cao and Vaibhav Rastogi and Yan Chen and Bin Liu and Clint Sbisa}, title = {WebShield: Enabling Various Web Defense Techniques without Client Side Modifications}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/webshield-enabling-various-web-defense-techniques-without-client-side-modifications}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LiTCRCLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiGC10, author = {Zhichun Li and Yan Gao and Yan Chen}, title = {HiFIND: {A} high-speed flow-level intrusion detection approach with DoS resiliency}, journal = {Comput. Networks}, volume = {54}, number = {8}, pages = {1282--1299}, year = {2010}, url = {https://doi.org/10.1016/j.comnet.2009.10.016}, doi = {10.1016/J.COMNET.2009.10.016}, timestamp = {Wed, 22 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LiGC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WangLCFL10, author = {Lanjia Wang and Zhichun Li and Yan Chen and Zhi Fu and Xing Li}, title = {Thwarting zero-day polymorphic worms with network-level length-based signature generation}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {18}, number = {1}, pages = {53--66}, year = {2010}, url = {http://doi.acm.org/10.1145/1816288.1816293}, doi = {10.1145/1816288.1816293}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/WangLCFL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaoLRC10, author = {Yinzhi Cao and Zhichun Li and Vaibhav Rastogi and Yan Chen}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {654--656}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866387}, doi = {10.1145/1866307.1866387}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaoLRC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GaoHWLCZ10, author = {Hongyu Gao and Jun Hu and Christo Wilson and Zhichun Li and Yan Chen and Ben Y. Zhao}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Detecting and characterizing social spam campaigns}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {681--683}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866396}, doi = {10.1145/1866307.1866396}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GaoHWLCZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/GaoHWLCZ10, author = {Hongyu Gao and Jun Hu and Christo Wilson and Zhichun Li and Yan Chen and Ben Y. Zhao}, editor = {Mark Allman}, title = {Detecting and characterizing social spam campaigns}, booktitle = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2010, Melbourne, Australia - November 1-3, 2010}, pages = {35--47}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1879141.1879147}, doi = {10.1145/1879141.1879147}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/GaoHWLCZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiGCK10, author = {Zhichun Li and Anup Goyal and Yan Chen and Aleksandar Kuzmanovic}, title = {Measurement and Diagnosis of Address Misconfigured {P2P} Traffic}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {1091--1099}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5461939}, doi = {10.1109/INFCOM.2010.5461939}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiGCK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/LiZZCGW10, author = {Zhichun Li and Ming Zhang and Zhaosheng Zhu and Yan Chen and Albert G. Greenberg and Yi{-}Min Wang}, title = {WebProphet: Automating Performance Prediction for Web Services}, booktitle = {Proceedings of the 7th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2010, April 28-30, 2010, San Jose, CA, {USA}}, pages = {143--158}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/nsdi10/tech/full\_papers/li.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/LiZZCGW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/LiXGTCLJL10, author = {Zhichun Li and Gao Xia and Hongyu Gao and Yi Tang and Yan Chen and Bin Liu and Junchen Jiang and Yuezhou Lv}, editor = {Shivkumar Kalyanaraman and Venkata N. Padmanabhan and K. K. Ramakrishnan and Rajeev Shorey and Geoffrey M. Voelker}, title = {NetShield: massive semantics-based vulnerability signature matching for high-speed networks}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010}, pages = {279--290}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1851182.1851216}, doi = {10.1145/1851182.1851216}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/LiXGTCLJL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BarfordCGLPY10, author = {Paul Barford and Yan Chen and Anup Goyal and Zhichun Li and Vern Paxson and Vinod Yegneswaran}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Employing Honeynets For Network Situational Awareness}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {71--102}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_5}, doi = {10.1007/978-1-4419-0140-8\_5}, timestamp = {Wed, 25 Sep 2019 17:41:05 +0200}, biburl = {https://dblp.org/rec/series/ais/BarfordCGLPY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiGCP09, author = {Zhichun Li and Anup Goyal and Yan Chen and Vern Paxson}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Automating analysis of large-scale botnet probing events}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {11--22}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533063}, doi = {10.1145/1533057.1533063}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiGCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LiGC08, author = {Zhichun Li and Anup Goyal and Yan Chen}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Honeynet-based Botnet Scan Traffic Analysis}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {25--44}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_2}, doi = {10.1007/978-0-387-68768-1\_2}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LiGC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/SchwellerLCGGZDKM07, author = {Robert T. Schweller and Zhichun Li and Yan Chen and Yan Gao and Ashish Gupta and Yin Zhang and Peter A. Dinda and Ming{-}Yang Kao and Gokhan Memik}, title = {Reversible sketches: enabling monitoring and analysis over high-speed data streams}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {15}, number = {5}, pages = {1059--1072}, year = {2007}, url = {http://doi.acm.org/10.1145/1322413.1322420}, doi = {10.1145/1322413.1322420}, timestamp = {Wed, 22 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/SchwellerLCGGZDKM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/LiWCF07, author = {Zhichun Li and Lanjia Wang and Yan Chen and Zhi Fu}, title = {Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms}, booktitle = {Proceedings of the {IEEE} International Conference on Network Protocols, {ICNP} 2007, October 16-19, 2007, Beijing, China}, pages = {164--173}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICNP.2007.4375847}, doi = {10.1109/ICNP.2007.4375847}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/LiWCF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cga/RenGLCW06, author = {Pin Ren and Yan Gao and Zhichun Li and Yan Chen and Benjamin Watson}, title = {IDGraphs: Intrusion Detection and Analysis Using Stream Compositing}, journal = {{IEEE} Computer Graphics and Applications}, volume = {26}, number = {2}, pages = {28--39}, year = {2006}, url = {https://doi.org/10.1109/MCG.2006.36}, doi = {10.1109/MCG.2006.36}, timestamp = {Fri, 02 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cga/RenGLCW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/GaoLC06, author = {Yan Gao and Zhichun Li and Yan Chen}, title = {A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks}, booktitle = {26th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal}, pages = {39}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICDCS.2006.6}, doi = {10.1109/ICDCS.2006.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/GaoLC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/SchwellerLCGGZDKM06, author = {Robert T. Schweller and Zhichun Li and Yan Chen and Yan Gao and Ashish Gupta and Yin Zhang and Peter A. Dinda and Ming{-}Yang Kao and Gokhan Memik}, title = {Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications}, booktitle = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/INFOCOM.2006.203}, doi = {10.1109/INFOCOM.2006.203}, timestamp = {Wed, 22 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/SchwellerLCGGZDKM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/LiCB06, author = {Zhichun Li and Yan Chen and Aaron Beach}, title = {Towards scalable and robust distributed intrusion alert fusion with good load balancing}, booktitle = {Proceedings of the 2006 {SIGCOMM} Workshop on Large-Scale Attack Defense, {LSAD} '06, Pisa, Italy, September 11-15, 2006}, pages = {115--122}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1162666.1162669}, doi = {10.1145/1162666.1162669}, timestamp = {Thu, 03 Feb 2022 15:46:18 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/LiCB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiSCKC06, author = {Zhichun Li and Manan Sanghi and Yan Chen and Ming{-}Yang Kao and Brian Chavez}, title = {Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {32--47}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.18}, doi = {10.1109/SP.2006.18}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiSCKC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/RenGLCW05, author = {Pin Ren and Yan Gao and Zhichun Li and Yan Chen and Benjamin Watson}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {IDGraphs: Intrusion Detection and Analysis Using Histographs}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {5}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.7}, doi = {10.1109/VIZSEC.2005.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/RenGLCW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.