default search action
Zhichun Li
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Lingbo Li, Zhichun Li, Fusen Guo, Haoyu Yang, Jingtian Wei, Zhengyi Yang:
Prototype Comparison Convolutional Networks for One-Shot Segmentation. IEEE Access 12: 54978-54990 (2024) - [j12]Haoxin Liang, Zhichun Li, Weijie Lin, Yuheng Xie, Shuo Zhang, Zhou Li, Hongyu Luo, Tian Li, Shuai Han:
Enhancing Gastrointestinal Stromal Tumor (GIST) Diagnosis: An Improved YOLOv8 Deep Learning Approach for Precise Mitotic Detection. IEEE Access 12: 116829-116840 (2024) - [c46]Kunal Mukherjee, Joshua Wiedemeier, Qi Wang, Junpei Kamimura, Junghwan John Rhee, James Wei, Zhichun Li, Xiao Yu, Lu-An Tang, Jiaping Gui, Kangkook Jee:
ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security. ACNS (3) 2024: 241-268 - [c45]Ruihao Gao, Zhichun Li, Guangming Tan, Xueqi Li:
BeeZip: Towards An Organized and Scalable Architecture for Data Compression. ASPLOS (3) 2024: 133-148 - 2023
- [j11]Guoshun Nan, Zhichun Li, Jinli Zhai, Qimei Cui, Gong Chen, Xin Du, Xuefei Zhang, Xiaofeng Tao, Zhu Han, Tony Q. S. Quek:
Physical-Layer Adversarial Robustness for Deep Learning-Based Semantic Communications. IEEE J. Sel. Areas Commun. 41(8): 2592-2608 (2023) - [c44]Jianjun Xiao, Changsheng Gao, Zhichun Li, Kai Zhang, Jia Jia, Dan Zhang:
Research on Electromagnetic Effect Generated by DC Converter on Human Body in Electric Vehicle. VTC2023-Spring 2023: 1-5 - [i10]Kun Li, Zhichun Li, Yuetao Chen, Zixuan Wang, Yiwei Zhang, Liang Yuan, Haipeng Jia, Yunquan Zhang, Ting Cao, Mao Yang:
Gamify Stencil Dwarf on Cloud for Democratizing Scientific Computing. CoRR abs/2303.08365 (2023) - 2022
- [j10]Zhichun Li, Yu Jiang, Xiaochen Liu, Yuhang Zhao, Chun Yu, Yuanchun Shi:
Enhancing Revisitation in Touchscreen Reading for Visually Impaired People with Semantic Navigation Design. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(3): 126:1-126:22 (2022) - [c43]Zeju Li, Jinfei Zhou, Guoshun Nan, Zhichun Li, Qimei Cui, Xiaofeng Tao:
SemBAT: Physical Layer Black-box Adversarial Attacks for Deep Learning-based Semantic Communication Systems. VTC Fall 2022: 1-5 - 2021
- [j9]Boxiang Dong, Zhengzhang Chen, Lu-An Tang, Haifeng Chen, Hui Wang, Kai Zhang, Ying Lin, Zhichun Li:
Anomalous Event Sequence Detection. IEEE Intell. Syst. 36(3): 5-13 (2021) - [c42]Yue Li, Zhenyu Wu, Haining Wang, Kun Sun, Zhichun Li, Kangkook Jee, Junghwan Rhee, Haifeng Chen:
UTrack: Enterprise User Tracking Based on OS-Level Audit Logs. CODASPY 2021: 161-172 - 2020
- [c41]Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Dawei Wang, Zhengzhang Chen, Zhichun Li, Junghwan Rhee, Jiaping Gui, Adam Bates:
This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage. ACSAC 2020: 165-178 - [c40]Yixin Sun, Kangkook Jee, Suphannee Sivakorn, Zhichun Li, Cristian Lumezanu, Lauri Korts-Pärn, Zhenyu Wu, Junghwan Rhee, Chung Hwan Kim, Mung Chiang, Prateek Mittal:
Detecting Malware Injection with Program-DNS Behavior. EuroS&P 2020: 552-568 - [c39]Jiaping Gui, Ding Li, Zhengzhang Chen, Junghwan Rhee, Xusheng Xiao, Mu Zhang, Kangkook Jee, Zhichun Li, Haifeng Chen:
APTrace: A Responsive System for Agile Enterprise Level Causality Analysis. ICDE 2020: 1701-1712
2010 – 2019
- 2019
- [j8]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security. Proc. VLDB Endow. 12(12): 1802-1805 (2019) - [c38]Yuseok Jeon, Junghwan Rhee, Chung Hwan Kim, Zhichun Li, Mathias Payer, Byoungyoung Lee, Zhenyu Wu:
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications. CODASPY 2019: 209-220 - [c37]Shen Wang, Zhengzhang Chen, Xiao Yu, Ding Li, Jingchao Ni, Lu-An Tang, Jiaping Gui, Zhichun Li, Haifeng Chen, Philip S. Yu:
Heterogeneous Graph Matching Networks for Unknown Malware Detection. IJCAI 2019: 3762-3770 - [c36]Wajih Ul Hassan, Shengjian Guo, Ding Li, Zhengzhang Chen, Kangkook Jee, Zhichun Li, Adam Bates:
NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage. NDSS 2019 - [c35]Suphannee Sivakorn, Kangkook Jee, Yixin Sun, Lauri Korts-Pärn, Zhichun Li, Cristian Lumezanu, Zhenyu Wu, Lu-An Tang, Ding Li:
Countering Malicious Processes with Process-DNS Association. NDSS 2019 - [c34]Shen Wang, Zhengzhang Chen, Ding Li, Zhichun Li, Lu-An Tang, Jingchao Ni, Junghwan Rhee, Haifeng Chen, Philip S. Yu:
Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification. SDM 2019: 693-701 - [i9]Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal:
A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security. CoRR abs/1903.08159 (2019) - [i8]Shen Wang, Zhengzhang Chen, Jingchao Ni, Xiao Yu, Zhichun Li, Haifeng Chen, Philip S. Yu:
Adversarial Defense Framework for Graph Neural Network. CoRR abs/1905.03679 (2019) - [i7]Shen Wang, Zhengzhang Chen, Xiao Yu, Ding Li, Jingchao Ni, Lu-An Tang, Jiaping Gui, Zhichun Li, Haifeng Chen, Philip S. Yu:
Heterogeneous Graph Matching Networks. CoRR abs/1910.08074 (2019) - 2018
- [c33]Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li:
NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. CCS 2018: 1324-1337 - [c32]Cheng Cao, Zhengzhang Chen, James Caverlee, Lu-An Tang, Chen Luo, Zhichun Li:
Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks. CIKM 2018: 1977-1985 - [c31]Ying Lin, Zhengzhang Chen, Cheng Cao, Lu-An Tang, Kai Zhang, Wei Cheng, Zhichun Li:
Collaborative Alert Ranking for Anomaly Detection. CIKM 2018: 1987-1995 - [c30]Chen Luo, Zhengzhang Chen, Lu-An Tang, Anshumali Shrivastava, Zhichun Li, Haifeng Chen, Jieping Ye:
TINET: Learning Invariant Networks via Knowledge Transfer. KDD 2018: 1890-1899 - [c29]Yushan Liu, Mu Zhang, Ding Li, Kangkook Jee, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Prateek Mittal:
Towards a Timely Causality Analysis for Enterprise Security. NDSS 2018 - [c28]Meng Wang, Kehua Lei, Zhichun Li, Haipeng Mi, Yingqing Xu:
TwistBlocks: Pluggable and Twistable Modular TUI for Armature Interaction in 3D Design. TEI 2018: 19-26 - [c27]Peng Gao, Xusheng Xiao, Zhichun Li, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. USENIX ATC 2018: 113-126 - [c26]Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal:
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection. USENIX Security Symposium 2018: 639-656 - [i6]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. CoRR abs/1806.02290 (2018) - [i5]Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal:
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection. CoRR abs/1806.09339 (2018) - [i4]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
A Query Tool for Efficiently Investigating Risky Software Behaviors. CoRR abs/1810.03464 (2018) - [i3]Shen Wang, Zhengzhang Chen, Ding Li, Lu-An Tang, Jingchao Ni, Zhichun Li, Junghwan Rhee, Haifeng Chen, Philip S. Yu:
Deep Program Reidentification: A Graph Neural Network Solution. CoRR abs/1812.04064 (2018) - 2017
- [c25]Boxiang Dong, Zhengzhang Chen, Wendy Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Zhichun Li, Haifeng Chen:
Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems. CIKM 2017: 707-715 - [i2]Chen Luo, Zhengzhang Chen, Lu-An Tang, Anshumali Shrivastava, Zhichun Li:
Accelerating Dependency Graph Learning from Heterogeneous Categorical Event Streams via Knowledge Transfer. CoRR abs/1708.07867 (2017) - 2016
- [c24]Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang:
High Fidelity Data Reduction for Big Data Security Dependency Analyses. CCS 2016: 504-516 - [c23]Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang:
Detecting Stack Layout Corruptions with Robust Stack Unwinding. RAID 2016: 71-94 - 2015
- [j7]Bo Zong, Xusheng Xiao, Zhichun Li, Zhenyu Wu, Zhiyun Qian, Xifeng Yan, Ambuj K. Singh, Guofei Jiang:
Behavior Query Discovery in System-Generated Temporal Graphs. Proc. VLDB Endow. 9(4): 240-251 (2015) - [c22]Jun Wang, Zhiyun Qian, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Xia Ning, Peng Liu, Guofei Jiang:
Discover and Tame Long-running Idling Processes in Enterprise Systems. AsiaCCS 2015: 543-554 - [c21]Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang:
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting. NDSS 2015 - [c20]Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, Guofei Jiang:
SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. USENIX Security Symposium 2015: 977-992 - [i1]Bo Zong, Xusheng Xiao, Zhichun Li, Zhenyu Wu, Zhiyun Qian, Xifeng Yan, Ambuj K. Singh, Guofei Jiang:
Behavior Query Discovery in System-Generated Temporal Graphs. CoRR abs/1511.05911 (2015) - 2014
- [c19]Zhichun Li, Yong Zheng:
Seismic Qualification of Telecommunication System in Nuclear Power Plant. ICGEC 2014: 353-358 - 2013
- [c18]Yinzhi Cao, Vaibhav Rastogi, Zhichun Li, Yan Chen, Alexander Moshchuk:
Redefining web browser principals with a Configurable Origin Policy. DSN 2013: 1-12 - 2012
- [c17]Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen, Xitao Wen:
Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security. AsiaCCS 2012: 8-9 - [c16]Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang:
CHEX: statically vetting Android apps for component hijacking vulnerabilities. CCS 2012: 229-240 - 2011
- [j6]Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzmanovic:
Measurement and diagnosis of address misconfigured P2P traffic. IEEE Netw. 25(3): 22-28 (2011) - [j5]Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson:
Towards Situational Awareness of Large-Scale Botnet Probing Events. IEEE Trans. Inf. Forensics Secur. 6(1): 175-188 (2011) - [c15]Jun Hu, Hongyu Gao, Zhichun Li, Yan Chen:
Poster: CUD: crowdsourcing for URL spam detection. CCS 2011: 785-788 - [c14]Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu, Clint Sbisa:
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications. NDSS 2011 - 2010
- [j4]Zhichun Li, Yan Gao, Yan Chen:
HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency. Comput. Networks 54(8): 1282-1299 (2010) - [j3]Lanjia Wang, Zhichun Li, Yan Chen, Zhi Fu, Xing Li:
Thwarting zero-day polymorphic worms with network-level length-based signature generation. IEEE/ACM Trans. Netw. 18(1): 53-66 (2010) - [c13]Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen:
Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality. CCS 2010: 654-656 - [c12]Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Ben Y. Zhao:
Detecting and characterizing social spam campaigns. CCS 2010: 681-683 - [c11]Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Ben Y. Zhao:
Detecting and characterizing social spam campaigns. Internet Measurement Conference 2010: 35-47 - [c10]Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzmanovic:
Measurement and Diagnosis of Address Misconfigured P2P Traffic. INFOCOM 2010: 1091-1099 - [c9]Zhichun Li, Ming Zhang, Zhaosheng Zhu, Yan Chen, Albert G. Greenberg, Yi-Min Wang:
WebProphet: Automating Performance Prediction for Web Services. NSDI 2010: 143-158 - [c8]Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen, Bin Liu, Junchen Jiang, Yuezhou Lv:
NetShield: massive semantics-based vulnerability signature matching for high-speed networks. SIGCOMM 2010: 279-290 - [p2]Paul Barford, Yan Chen, Anup Goyal, Zhichun Li, Vern Paxson, Vinod Yegneswaran:
Employing Honeynets For Network Situational Awareness. Cyber Situational Awareness 2010: 71-102
2000 – 2009
- 2009
- [c7]Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson:
Automating analysis of large-scale botnet probing events. AsiaCCS 2009: 11-22 - 2008
- [p1]Zhichun Li, Anup Goyal, Yan Chen:
Honeynet-based Botnet Scan Traffic Analysis. Botnet Detection 2008: 25-44 - 2007
- [j2]Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao, Ashish Gupta, Yin Zhang, Peter A. Dinda, Ming-Yang Kao, Gokhan Memik:
Reversible sketches: enabling monitoring and analysis over high-speed data streams. IEEE/ACM Trans. Netw. 15(5): 1059-1072 (2007) - [c6]Zhichun Li, Lanjia Wang, Yan Chen, Zhi Fu:
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms. ICNP 2007: 164-173 - 2006
- [j1]Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson:
IDGraphs: Intrusion Detection and Analysis Using Stream Compositing. IEEE Computer Graphics and Applications 26(2): 28-39 (2006) - [c5]Yan Gao, Zhichun Li, Yan Chen:
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. ICDCS 2006: 39 - [c4]Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao, Ashish Gupta, Yin Zhang, Peter A. Dinda, Ming-Yang Kao, Gokhan Memik:
Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications. INFOCOM 2006 - [c3]Zhichun Li, Yan Chen, Aaron Beach:
Towards scalable and robust distributed intrusion alert fusion with good load balancing. LSAD@SIGCOMM 2006: 115-122 - [c2]Zhichun Li, Manan Sanghi, Yan Chen, Ming-Yang Kao, Brian Chavez:
Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience. S&P 2006: 32-47 - 2005
- [c1]Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson:
IDGraphs: Intrusion Detection and Analysis Using Histographs. VizSEC 2005: 5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-15 01:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint