​
Login / Signup
Zhenyuan Li
ORCID
Publication Activity (10 Years)
Years Active: 2019-2024
Publications (10 Years): 19
Top Topics
Bipartite Graph
Reinforcement Learning
Dynamic Resource Allocation
Lightweight
Top Venues
CoRR
ICIC (2)
CSCWD
AsiaCCS
</>
Publications
</>
Lingzhi Wang
,
Xiangmin Shen
,
Weijian Li
,
Zhenyuan Li
,
R. Sekar
,
Han Liu
,
Yan Chen
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection.
CoRR
(2024)
Xiangmin Shen
,
Zhenyuan Li
,
Graham Burleigh
,
Lingzhi Wang
,
Yan Chen
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments.
AsiaCCS
(2024)
Zhenyuan Li
,
Yangyang Wei
,
Xiangmin Shen
,
Lingzhi Wang
,
Yan Chen
,
Haitao Xu
,
Shouling Ji
,
Fan Zhang
TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events.
CoRR
(2024)
Lingzhi Wang
,
Jiahui Wang
,
Kyle Jung
,
Kedar Thiagarajan
,
Emily Wei
,
Xiangmin Shen
,
Yan Chen
,
Zhenyuan Li
From Sands to Mansions: Enabling Automatic Full-Life-Cycle Cyberattack Construction with LLM.
CoRR
(2024)
Liang Li
,
Yuanhui He
,
Feiyang Huang
,
Ziming Zhao
,
Zhuoxue Song
,
Tong Zhou
,
Zhenyuan Li
,
Fan Zhang
An Automated Alert Cross-Verification System with Graph Neural Networks for IDS Events.
CSCWD
(2024)
Xiaojing Chen
,
Zhenyuan Li
,
Wei Ni
,
Xin Wang
,
Shunqing Zhang
,
Yanzan Sun
,
Shugong Xu
,
Qingqi Pei
Towards Dynamic Resource Allocation and Client Scheduling in Hierarchical Federated Learning: A Two-Phase Deep Reinforcement Learning Approach.
CoRR
(2024)
Xiangmin Shen
,
Zhenyuan Li
,
Graham Burleigh
,
Lingzhi Wang
,
Yan Chen
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments.
CoRR
(2024)
Zhenyuan Li
,
Xiaoliang Ma
,
Zexuan Zhu
,
Yueyue Li
Expensive Optimization Based on Evolutionary Multi-Tasking and Hybrid Restart Strategy.
CEC
(2024)
Runqing Yang
,
Xutong Chen
,
Haitao Xu
,
Yueqiang Cheng
,
Chunlin Xiong
,
Linqi Ruan
,
Mohammad Kavousi
,
Zhenyuan Li
,
Liheng Xu
,
Yan Chen
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows.
IEEE Trans. Dependable Secur. Comput.
19 (3) (2022)
Guo Ru
,
Peng Sheng
,
Anyang Tong
,
Zhenyuan Li
A Method for Residual Network Image Classification with Multi-scale Feature Fusion.
ML4CS (3)
(2022)
Chunlin Xiong
,
Zhenyuan Li
,
Yan Chen
,
Tiantian Zhu
,
Jian Wang
,
Hai Yang
,
Wei Ruan
Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts.
Frontiers Inf. Technol. Electron. Eng.
23 (3) (2022)
Zhenyuan Li
,
Jun Zeng
,
Yan Chen
,
Zhenkai Liang
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
ESORICS (1)
(2022)
Xiaojing Chen
,
Zhenyuan Li
,
Wei Ni
,
Xin Wang
,
Shunqing Zhang
,
Shugong Xu
,
Qingqi Pei
Two-Phase Deep Reinforcement Learning of Dynamic Resource Allocation and Client Selection for Hierarchical Federated Learning.
ICCC
(2022)
Feng Xiao
,
Zhenyuan Li
,
Baoju Li
,
Chang Liu
,
Yuhang Qiu
,
Shang Wang
,
Tao Peng
A Data Processing Method for Load Data of Electric Boiler with Heat Reservoir.
ICIC (2)
(2021)
Zhenyuan Li
,
Qi Alfred Chen
,
Runqing Yang
,
Yan Chen
,
Wei Ruan
Threat detection and investigation with system-level provenance graphs: A survey.
Comput. Secur.
106 (2021)
Zhenyuan Li
,
Jun Zeng
,
Yan Chen
,
Zhenkai Liang
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
CoRR
(2021)
Yong Sun
,
Zhenyuan Li
,
Xinnan Yu
,
Baoju Li
,
Mao Yang
Research on Ultra-Short-Term Wind Power Prediction Considering Source Relevance.
IEEE Access
8 (2020)
Zhenyuan Li
,
Qi Alfred Chen
,
Runqing Yang
,
Yan Chen
Threat Detection and Investigation with System-level Provenance Graphs: A Survey.
CoRR
(2020)
Zhenyuan Li
,
Qi Alfred Chen
,
Chunlin Xiong
,
Yan Chen
,
Tiantian Zhu
,
Hai Yang
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
CCS
(2019)