Следене
Chunlin Xiong
Chunlin Xiong
联通(广东)产业互联网有限公司
Потвърден имейл адрес: sangfor.com.cn
Заглавие
Позовавания
Позовавания
Година
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency
C Xiong, T Zhu, W Dong, L Ruan, R Yang, Y Cheng, Y Chen, S Cheng, ...
IEEE Transactions on Dependable and Secure Computing 19 (1), 551-565, 2020
1032020
{PROGRAPHER}: An anomaly detection system based on provenance graph embedding
F Yang, J Xu, C Xiong, Z Li, K Zhang
32nd USENIX Security Symposium (USENIX Security 23), 4355-4372, 2023
532023
Effective and light-weight deobfuscation and semantic-aware attack detection for powershell scripts
Z Li, QA Chen, C Xiong, Y Chen, T Zhu, H Yang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
502019
General, efficient, and real-time data compaction strategy for apt forensic analysis
T Zhu, J Wang, L Ruan, C Xiong, J Yu, Y Li, Y Chen, M Lv, T Chen
IEEE Transactions on Information Forensics and Security 16, 3312-3325, 2021
362021
APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts
T Zhu, J Yu, C Xiong, W Cheng, Q Yuan, J Ying, T Chen, J Zhang, M Lv, ...
IEEE Transactions on Dependable and Secure Computing 20 (6), 5247-5264, 2023
262023
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows
R Yang, X Chen, H Xu, Y Cheng, C Xiong, L Ruan, M Kavousi, Z Li, L Xu, ...
IEEE Transactions on Dependable and Secure Computing 19 (3), 1621-1638, 2020
192020
Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts
C Xiong, Z Li, Y Chen, T Zhu, J Wang, H Yang, W Ruan
Frontiers of Information Technology & Electronic Engineering 23 (3), 361-381, 2022
82022
System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends
T Chen, C Zheng, T Zhu, C Xiong, J Ying, Q Yuan, W Cheng, M Lv
Computers & Security 135, 103485, 2023
52023
Sparse: Semantic tracking and path analysis for attack investigation in real-time
J Ying, T Zhu, W Cheng, Q Yuan, M Ma, C Xiong, T Chen, M Lv, Y Chen
arXiv preprint arXiv:2405.02629, 2024
22024
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports
W Cheng, T Zhu, T Chen, Q Yuan, J Ying, H Li, C Xiong, M Li, M Lv, ...
arXiv preprint arXiv:2410.11209, 2024
12024
TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy
J Ying, T Zhu, Q Liu, C Xiong, Z Weng, T Chen, L Fu, M Lv, H Wu, T Wang, ...
IEEE Transactions on Mobile Computing 23 (4), 2832-2848, 2023
12023
ActMiner: Applying Causality Tracking and Increment Aligning for Graph-based Cyber Threat Hunting
M Ma, T Zhu, T Chen, S Li, J Ying, C Xiong, M Lv, Y Chen
arXiv preprint arXiv:2501.05793, 2025
2025
MultiKG: Multi-Source Threat Intelligence Aggregation for High-Quality Knowledge Graph Representation of Attack Techniques
J Wang, T Zhu, C Xiong, Y Chen
arXiv preprint arXiv:2411.08359, 2024
2024
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports
T Zhu, J Ying, T Chen, C Xiong, W Cheng, Q Yuan, A Zheng, M Lv, ...
IEEE Transactions on Dependable and Secure Computing, 2024
2024
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
C Xiong, Z Weng, J Liu, L Gu, F Alqahtani, A Gafar, PK Sharma
CMES-Computer Modeling in Engineering and Sciences 138 (3), 3013-3032, 2023
2023
通用, 有效且轻量的 PowerShell 解混淆和语义敏感的攻击检测方法
C Xiong, Z Li, Y Chen, T Zhu, J Wang, H Yang, W Ruan, AC XIONG, AZ LI, ...
Frontiers 23 (3), 361-381, 2022
2022
SSLINT: A Tool for Detecting TLS Certificate Validation Vulnerabilities
B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, C Xiong, R Yang, ...
2016
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–17