TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks L Wang, X Ma, N Li, Q Lv, Y Wang, W Huang, H Chen Computers & Security 135, 103466, 2023 | | 2023 |
CTP: Defending Against Data Poisoning in Attack Traffic Detection Based Deep Neural Networks L Wang, X Wang, Q Lv, Y Wang, X Zhou, W Huang 2023 8th IEEE International Conference on Network Intelligence and Digital …, 2023 | | 2023 |
Kairos:: Practical Intrusion Detection and Investigation using Whole-system Provenance Z Cheng, Q Lv, J Liang, Y Wang, D Sun, T Pasquier, X Han arXiv preprint arXiv:2308.05034, 2023 | 2 | 2023 |
UAG: User action graph based on system logs for insider threat detection X Wang, J Jiang, Y Wang, Q Lv, L Wang 2023 IEEE Symposium on Computers and Communications (ISCC), 1027-1032, 2023 | 1 | 2023 |
GHunter: A Fast Subgraph Matching Method for Threat Hunting Z Cheng, R Dai, L Wang, Z Yu, Q Lv, Y Wang, D Sun 2023 26th International Conference on Computer Supported Cooperative Work in …, 2023 | | 2023 |
ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks L Wang, Z Cheng, Q Lv, Y Wang, S Zhang, W Huang 2023 26th International Conference on Computer Supported Cooperative Work in …, 2023 | 1 | 2023 |
VN-SMT: An SMT-based Construction Method on Virtual Network to Defend Insider Reconnaissance W Wang, Y Wang, G Xu, Q Lv, Z Chen, S Li 2023 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2023 | | 2023 |
A Software Security Entity Relationships Prediction Framework Based on Knowledge Graph Embedding Using Sentence-Bert Y Wang, X Hou, X Ma, Q Lv International Conference on Wireless Algorithms, Systems, and Applications …, 2022 | | 2022 |
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning C Li, Z Cheng, H Zhu, L Wang, Q Lv, Y Wang, N Li, D Sun Computers & Security 122, 102872, 2022 | 26 | 2022 |
Cyevent2vec: Attributed heterogeneous information network based event embedding framework for cyber security events analysis X Ma, L Wang, Q Lv, Y Wang, Q Zhang, J Jiang 2022 International Joint Conference on Neural Networks (IJCNN), 01-08, 2022 | 4 | 2022 |
MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios Z Cheng, D Sun, L Wang, Q Lv, Y Wang 2022 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2022 | 2 | 2022 |
A novel deep framework for dynamic malware detection based on API sequence intrinsic features C Li, Q Lv, N Li, Y Wang, D Sun, Y Qiao Computers & Security 116, 102686, 2022 | 47 | 2022 |
Anomaly detection in unstructured logs using attention-based Bi-LSTM network D Yu, X Hou, C Li, Q Lv, Y Wang, N Li 2021 7th IEEE International Conference on Network Intelligence and Digital …, 2021 | 6 | 2021 |
Itdbert: Temporal-semantic representation for insider threat detection W Huang, H Zhu, C Li, Q Lv, Y Wang, H Yang 2021 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2021 | 15 | 2021 |
Gsketch: A comprehensive graph analytic approach for masquerader detection based on file access graph J Jiang, X Wang, Y Wang, Q Lv, MC Liu, TT Wang, LQ Wang 2021 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2021 | 2 | 2021 |
A few-shot class-incremental learning approach for intrusion detection T Wang, Q Lv, B Hu, D Sun 2021 International Conference on Computer Communications and Networks (ICCCN …, 2021 | 19 | 2021 |
Density weighted diversity based query strategy for active learning T Wang, X Zhao, Q Lv, B Hu, D Sun 2021 IEEE 24th International Conference on Computer Supported Cooperative …, 2021 | 5 | 2021 |
AOPL: attention enhanced oversampling and parallel deep learning model for attack detection in imbalanced network traffic L Wang, W Huang, Q Lv, Y Wang, HY Chen Wireless Algorithms, Systems, and Applications: 16th International …, 2021 | 1 | 2021 |
CVSS-based multi-factor dynamic risk assessment model for network system T Wang, Q Lv, B Hu, D Sun 2020 IEEE 10th International Conference on Electronics Information and …, 2020 | 10 | 2020 |
Risk prediction for imbalanced data in cyber security: a Siamese network-based deep learning classification framework D Sun, Z Wu, Y Wang, Q Lv, B Hu 2019 international joint conference on neural networks (IJCNN), 1-8, 2019 | 21 | 2019 |