​
Login / Signup
Qiujian Lv
ORCID
Publication Activity (10 Years)
Years Active: 2014-2023
Publications (10 Years): 26
Top Topics
Deep Learning
Intrusion Detection
Lightweight
Semantic Representation
Top Venues
ISCC
Comput. Secur.
CSCWD
WCNC
</>
Publications
</>
Zijun Cheng
,
Qiujian Lv
,
Jinyuan Liang
,
Yan Wang
,
Degang Sun
,
Thomas Pasquier
,
Xueyuan Han
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance.
CoRR
(2023)
Leiqi Wang
,
Xu Wang
,
Qiujian Lv
,
Yan Wang
,
Xinxing Zhou
,
Weiqing Huang
CTP: Defending Against Data Poisoning in Attack Traffic Detection Based Deep Neural Networks.
IC-NIDC
(2023)
Xu Wang
,
Jianguo Jiang
,
Yan Wang
,
Qiujian Lv
,
Leiqi Wang
UAG: User Action Graph Based on System Logs for Insider Threat Detection.
ISCC
(2023)
Zijun Cheng
,
Rujie Dai
,
Leiqi Wang
,
Ziyang Yu
,
Qiujian Lv
,
Yan Wang
,
Degang Sun
GHunter: A Fast Subgraph Matching Method for Threat Hunting.
CSCWD
(2023)
Leiqi Wang
,
Zijun Cheng
,
Qiujian Lv
,
Yan Wang
,
Shixiang Zhang
,
Weiqing Huang
ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks.
CSCWD
(2023)
Weijie Wang
,
Yan Wang
,
Guokun Xu
,
Qiujian Lv
,
Zuxin Chen
,
Siyuan Li
VN-SMT: An SMT-based Construction Method on Virtual Network to Defend Insider Reconnaissance.
WCNC
(2023)
Degang Sun
,
Guokun Xu
,
Weijie Wang
,
Yan Wang
,
Qiujian Lv
,
Xinxing Zhou
,
Zhiqi Li
LWVN: A Lightweight Virtual Network View Method to Defend Lateral Movement.
TrustCom
(2023)
Leiqi Wang
,
Xiu Ma
,
Ning Li
,
Qiujian Lv
,
Yan Wang
,
Weiqing Huang
,
Haiyan Chen
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks.
Comput. Secur.
135 (2023)
Xiu Ma
,
Leiqi Wang
,
Qiujian Lv
,
Yan Wang
,
Qi Zhang
,
Jianguo Jiang
CyEvent2vec: Attributed Heterogeneous Information Network based Event Embedding Framework for Cyber Security Events Analysis.
IJCNN
(2022)
Ce Li
,
Zijun Cheng
,
He Zhu
,
Leiqi Wang
,
Qiujian Lv
,
Yan Wang
,
Ning Li
,
Degang Sun
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning.
Comput. Secur.
122 (2022)
Zijun Cheng
,
Degang Sun
,
Leiqi Wang
,
Qiujian Lv
,
Yan Wang
MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios.
ISCC
(2022)
Ce Li
,
Qiujian Lv
,
Ning Li
,
Yan Wang
,
Degang Sun
,
Yuanyuan Qiao
A novel deep framework for dynamic malware detection based on API sequence intrinsic features.
Comput. Secur.
116 (2022)
Yan Wang
,
Xiaowei Hou
,
Xiu Ma
,
Qiujian Lv
A Software Security Entity Relationships Prediction Framework Based on Knowledge Graph Embedding Using Sentence-Bert.
WASA (2)
(2022)
Tingting Wang
,
Qiujian Lv
,
Bo Hu
,
Degang Sun
A Few-Shot Class-Incremental Learning Approach for Intrusion Detection.
ICCCN
(2021)
Weiqing Huang
,
He Zhu
,
Ce Li
,
Qiujian Lv
,
Yan Wang
,
Haitian Yang
ITDBERT: Temporal-semantic Representation for Insider Threat Detection.
ISCC
(2021)
Leiqi Wang
,
Weiqing Huang
,
Qiujian Lv
,
Yan Wang
,
Haiyan Chen
AOPL: Attention Enhanced Oversampling and Parallel Deep Learning Model for Attack Detection in Imbalanced Network Traffic.
WASA (2)
(2021)
Jianguo Jiang
,
Xu Wang
,
Yan Wang
,
Qiujian Lv
,
Meichen Liu
,
Tingting Wang
,
Leiqi Wang
GSketch: A Comprehensive Graph Analytic Approach for Masquerader Detection Based on File Access Graph.
ISCC
(2021)
Dongqing Yu
,
Xiaowei Hou
,
Ce Li
,
Qiujian Lv
,
Yan Wang
,
Ning Li
Anomaly Detection in Unstructured Logs Using Attention-based Bi-LSTM Network.
IC-NIDC
(2021)
Tingting Wang
,
Xufeng Zhao
,
Qiujian Lv
,
Bo Hu
,
Degang Sun
Density Weighted Diversity Based Query Strategy for Active Learning.
CSCWD
(2021)
Degang Sun
,
Zhengrong Wu
,
Yan Wang
,
Qiujian Lv
,
Bo Hu
Cyber Profiles Based Risk Prediction of Application Systems for Effective Access Control.
ISCC
(2019)
Degang Sun
,
Zhengrong Wu
,
Yan Wang
,
Qiujian Lv
,
Bo Hu
Risk Prediction for Imbalanced Data in Cyber Security : A Siamese Network-based Deep Learning Classification Framework.
IJCNN
(2019)
Qiujian Lv
,
Yuanyuan Qiao
,
Yi Zhang
,
Fehmi Ben Abdesslem
,
Wenhui Lin
,
Jie Yang
Measuring Geospatial Properties: Relating Online Content Browsing Behaviors to Users' Points of Interest.
Wirel. Pers. Commun.
101 (3) (2018)
Bin Lv
,
Dan Wang
,
Yan Wang
,
Qiujian Lv
,
Dan Lu
A Hybrid Model Based on Multi-dimensional Features for Insider Threat Detection.
WASA
(2018)
Yao Guo
,
Qiujian Lv
,
Fang Liu
,
Jie Yang
,
Zhe Gao
A Comprehensive Analysis of Video Service Quality on IQIYI from Large-Scale Data Sets.
QSHINE
(2017)
Yan Wu
,
Qiujian Lv
,
Yuanyuan Qiao
,
Jie Yang
Linking Virtual Identities across Service Domains: An Online Behavior Modeling Approach.
Intelligent Environments
(2017)
Qiujian Lv
,
Yuanyuan Qiao
,
Nirwan Ansari
,
Jun Liu
,
Jie Yang
Big Data Driven Hidden Markov Model Based Individual Mobility Prediction at Points of Interest.
IEEE Trans. Veh. Technol.
66 (6) (2017)
Qiujian Lv
,
Yufei Di
,
Yuanyuan Qiao
,
Zhenming Lei
,
Chao Dong
Spatial and temporal mobility analysis in LTE mobile network.
WCNC
(2015)
Qiujian Lv
,
Zongshan Mei
,
Yuanyuan Qiao
,
Yufei Zhong
,
Zhenming Lei
Hidden Markov Model based user mobility analysis in LTE network.
WPMC
(2014)