Author of the publication

Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.

, , , , , and . ACM Conference on Computer and Communications Security, page 1831-1847. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-Phase Deep Reinforcement Learning of Dynamic Resource Allocation and Client Selection for Hierarchical Federated Learning., , , , , , and . ICCC, page 518-523. IEEE, (2022)A Data Processing Method for Load Data of Electric Boiler with Heat Reservoir., , , , , , and . ICIC (2), volume 12837 of Lecture Notes in Computer Science, page 395-405. Springer, (2021)Towards Dynamic Resource Allocation and Client Scheduling in Hierarchical Federated Learning: A Two-Phase Deep Reinforcement Learning Approach., , , , , , , and . CoRR, (2024)A Method for Residual Network Image Classification with Multi-scale Feature Fusion., , , and . ML4CS (3), volume 13657 of Lecture Notes in Computer Science, page 427-438. Springer, (2022)An Automated Alert Cross-Verification System with Graph Neural Networks for IDS Events., , , , , , , and . CSCWD, page 2240-2245. IEEE, (2024)Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts., , , , , and . ACM Conference on Computer and Communications Security, page 1831-1847. ACM, (2019)AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports., , , and . ESORICS (1), volume 13554 of Lecture Notes in Computer Science, page 589-609. Springer, (2022)Research on Ultra-Short-Term Wind Power Prediction Considering Source Relevance., , , , and . IEEE Access, (2020)TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events., , , , , , , and . CoRR, (2024)Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection., , , , , , and . CoRR, (2024)