Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency C Xiong, T Zhu, W Dong, L Ruan, R Yang, Y Cheng, Y Chen, S Cheng, ... IEEE Transactions on Dependable and Secure Computing 19 (1), 551-565, 2020 | 103 | 2020 |
{PROGRAPHER}: An anomaly detection system based on provenance graph embedding F Yang, J Xu, C Xiong, Z Li, K Zhang 32nd USENIX Security Symposium (USENIX Security 23), 4355-4372, 2023 | 53 | 2023 |
Effective and light-weight deobfuscation and semantic-aware attack detection for powershell scripts Z Li, QA Chen, C Xiong, Y Chen, T Zhu, H Yang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 50 | 2019 |
General, efficient, and real-time data compaction strategy for apt forensic analysis T Zhu, J Wang, L Ruan, C Xiong, J Yu, Y Li, Y Chen, M Lv, T Chen IEEE Transactions on Information Forensics and Security 16, 3312-3325, 2021 | 36 | 2021 |
APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts T Zhu, J Yu, C Xiong, W Cheng, Q Yuan, J Ying, T Chen, J Zhang, M Lv, ... IEEE Transactions on Dependable and Secure Computing 20 (6), 5247-5264, 2023 | 26 | 2023 |
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows R Yang, X Chen, H Xu, Y Cheng, C Xiong, L Ruan, M Kavousi, Z Li, L Xu, ... IEEE Transactions on Dependable and Secure Computing 19 (3), 1621-1638, 2020 | 19 | 2020 |
Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts C Xiong, Z Li, Y Chen, T Zhu, J Wang, H Yang, W Ruan Frontiers of Information Technology & Electronic Engineering 23 (3), 361-381, 2022 | 8 | 2022 |
System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends T Chen, C Zheng, T Zhu, C Xiong, J Ying, Q Yuan, W Cheng, M Lv Computers & Security 135, 103485, 2023 | 5 | 2023 |
Sparse: Semantic tracking and path analysis for attack investigation in real-time J Ying, T Zhu, W Cheng, Q Yuan, M Ma, C Xiong, T Chen, M Lv, Y Chen arXiv preprint arXiv:2405.02629, 2024 | 2 | 2024 |
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports W Cheng, T Zhu, T Chen, Q Yuan, J Ying, H Li, C Xiong, M Li, M Lv, ... arXiv preprint arXiv:2410.11209, 2024 | 1 | 2024 |
TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy J Ying, T Zhu, Q Liu, C Xiong, Z Weng, T Chen, L Fu, M Lv, H Wu, T Wang, ... IEEE Transactions on Mobile Computing 23 (4), 2832-2848, 2023 | 1 | 2023 |
ActMiner: Applying Causality Tracking and Increment Aligning for Graph-based Cyber Threat Hunting M Ma, T Zhu, T Chen, S Li, J Ying, C Xiong, M Lv, Y Chen arXiv preprint arXiv:2501.05793, 2025 | | 2025 |
MultiKG: Multi-Source Threat Intelligence Aggregation for High-Quality Knowledge Graph Representation of Attack Techniques J Wang, T Zhu, C Xiong, Y Chen arXiv preprint arXiv:2411.08359, 2024 | | 2024 |
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports T Zhu, J Ying, T Chen, C Xiong, W Cheng, Q Yuan, A Zheng, M Lv, ... IEEE Transactions on Dependable and Secure Computing, 2024 | | 2024 |
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors C Xiong, Z Weng, J Liu, L Gu, F Alqahtani, A Gafar, PK Sharma CMES-Computer Modeling in Engineering and Sciences 138 (3), 3013-3032, 2023 | | 2023 |
通用, 有效且轻量的 PowerShell 解混淆和语义敏感的攻击检测方法 C Xiong, Z Li, Y Chen, T Zhu, J Wang, H Yang, W Ruan, AC XIONG, AZ LI, ... Frontiers 23 (3), 361-381, 2022 | | 2022 |
SSLINT: A Tool for Detecting TLS Certificate Validation Vulnerabilities B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, C Xiong, R Yang, ... | | 2016 |