Follow
Jun ZENG
Jun ZENG
Verified email at comp.nus.edu.sg - Homepage
Title
Cited by
Cited by
Year
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports
Z Li, J Zeng, Y Chen, Z Liang
European Symposium on Research in Computer Security (ESORICS), 2022
1122022
SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records
J Zeng, X Wang, J Liu, Y Chen, Z Liang, TS Chua, ZL Chua
2022 IEEE Symposium on Security and Privacy (SP), 2022
1032022
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics
J Zeng, ZL Chua, Y Chen, K Ji, Z Liang, J Mao
Network and Distributed Systems Security Symposium (NDSS), 2021
1002021
Empowering Practical Root Cause Analysis by Large Language Models for Cloud Incidents
Y Chen, H Xie, M Ma, Y Kang, X Gao, L Shi, Y Cao, X Gao, H Fan, M Wen, ...
The European Conference on Computer Systems (EuroSys), 2024
242024
TeLL: Log Level Suggestions via Modeling Multi-level Code Block Information
J Liu, J Zeng, X Wang, K Ji, Z Liang
ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2022
182022
Learning Graph-based Code Representations for Source-level Functional Similarity Detection
J Liu, J Zeng, X Wang, Z Liang
45th International Conference on Software Engineering (ICSE), 2023
142023
Enhancing SSD performance with LDPC-aware garbage collection
Y Du, Y Jia, M Zhang, J Zeng, CJ Xue
2017 IEEE 6th Non-Volatile Memory Systems and Applications Symposium (NVMSA …, 2017
102017
PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability
J Zeng, C Zhang, Z Liang
ACM Conference on Computer and Communications Security (CCS), 2022
92022
FlowMatrix:GPU-Assisted Information-Flow Analysis through Matrix-Based Representation
K Ji, J Zeng, Y Jiang, Z Liang, ZL Chua, P Saxena, A Roychoudhury
31st USENIX Security Symposium (USENIX Security), 2022
52022
Unraveling the Key of Machine Learning Solutions for Android Malware Detection
J Liu, J Zeng, F Pierazzi, L Cavallaro, Z Liang
arXiv preprint arXiv:2402.02953, 2024
42024
MaskDroid: Robust Android Malware Detection with Masked Graph Representations
J Zheng, J Liu, A Zhang, J Zeng, Z Yang, Z Liang, TS Chua
IEEE/ACM International Conference on Automated Software Engineering (ASE), 2024
2024
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches
C Zhang, J Zeng, Y Zhang, A Ahmad, F Zhang, H Jin, Z Liang
ACM Conference on Computer and Communications Security (CCS), 2024
2024
UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation
J Li, J Mao, J Zeng, Q Lin, S Feng, Z Liang
33rd USENIX Security Symposium (USENIX Security), 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–13