AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports Z Li, J Zeng, Y Chen, Z Liang European Symposium on Research in Computer Security (ESORICS), 2022 | 112 | 2022 |
SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records J Zeng, X Wang, J Liu, Y Chen, Z Liang, TS Chua, ZL Chua 2022 IEEE Symposium on Security and Privacy (SP), 2022 | 103 | 2022 |
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics J Zeng, ZL Chua, Y Chen, K Ji, Z Liang, J Mao Network and Distributed Systems Security Symposium (NDSS), 2021 | 100 | 2021 |
Empowering Practical Root Cause Analysis by Large Language Models for Cloud Incidents Y Chen, H Xie, M Ma, Y Kang, X Gao, L Shi, Y Cao, X Gao, H Fan, M Wen, ... The European Conference on Computer Systems (EuroSys), 2024 | 24 | 2024 |
TeLL: Log Level Suggestions via Modeling Multi-level Code Block Information J Liu, J Zeng, X Wang, K Ji, Z Liang ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2022 | 18 | 2022 |
Learning Graph-based Code Representations for Source-level Functional Similarity Detection J Liu, J Zeng, X Wang, Z Liang 45th International Conference on Software Engineering (ICSE), 2023 | 14 | 2023 |
Enhancing SSD performance with LDPC-aware garbage collection Y Du, Y Jia, M Zhang, J Zeng, CJ Xue 2017 IEEE 6th Non-Volatile Memory Systems and Applications Symposium (NVMSA …, 2017 | 10 | 2017 |
PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability J Zeng, C Zhang, Z Liang ACM Conference on Computer and Communications Security (CCS), 2022 | 9 | 2022 |
FlowMatrix:GPU-Assisted Information-Flow Analysis through Matrix-Based Representation K Ji, J Zeng, Y Jiang, Z Liang, ZL Chua, P Saxena, A Roychoudhury 31st USENIX Security Symposium (USENIX Security), 2022 | 5 | 2022 |
Unraveling the Key of Machine Learning Solutions for Android Malware Detection J Liu, J Zeng, F Pierazzi, L Cavallaro, Z Liang arXiv preprint arXiv:2402.02953, 2024 | 4 | 2024 |
MaskDroid: Robust Android Malware Detection with Masked Graph Representations J Zheng, J Liu, A Zhang, J Zeng, Z Yang, Z Liang, TS Chua IEEE/ACM International Conference on Automated Software Engineering (ASE), 2024 | | 2024 |
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches C Zhang, J Zeng, Y Zhang, A Ahmad, F Zhang, H Jin, Z Liang ACM Conference on Computer and Communications Security (CCS), 2024 | | 2024 |
UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation J Li, J Mao, J Zeng, Q Lin, S Feng, Z Liang 33rd USENIX Security Symposium (USENIX Security), 2024 | | 2024 |