Deepaid: Interpreting and improving deep learning-based anomaly detection in security applications D Han, Z Wang, W Chen, Y Zhong, S Wang, H Zhang, J Yang, X Shi, ... Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 98 | 2021 |
Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning S Wang, Z Wang, T Zhou, H Sun, X Yin, D Han, H Zhang, X Shi, J Yang IEEE Transactions on Information Forensics and Security 17, 3972-3987, 2022 | 86 | 2022 |
Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation. D Han, Z Wang, W Chen, K Wang, R Yu, S Wang, H Zhang, Z Wang, M Jin, ... NDSS, 2023 | 51 | 2023 |
An Unsupervised Two-Layer Multi-Step Network Attack Detector S Wang, Z Wang, X Yin, X Shi IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 2 | 2020 |
Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications D Han, Z Wang, R Feng, M Jin, W Chen, K Wang, S Wang, J Yang, X Shi, ... Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | | 2024 |
AudiTrim: A Real-time, General, Efficient, and Low-overhead Data Compaction System for Intrusion Detection H Sun, S Wang, Z Wang, Z Jiang, D Han, J Yang Proceedings of the 27th International Symposium on Research in Attacks …, 2024 | | 2024 |