Publications for Zhichun Li

  • Collaborative Alert Ranking for Anomaly Detection

    Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM 2018)
    pp. 1987-1995, 2018

    Ying Lin, Zhengzhang Chen, Kai Zhang, Cheng Cao, Lu-An Tang, Wei Cheng, Zhichun Li
  • Behavior-based Community Detection: Application to Host Assessment in Enterprise Information Networks

    Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM 2018)
    pp. 1977-1985, 2018

    Cheng Cao, Zhengzhang Chen, James Caverlee, Lu-An Tang, Chen Luo, Zhichun Li
  • NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis

    Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2018)
    pp. 1324-1337, 2018

    Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Junghwan Rhee, Zhenyu Wu, Xusheng Xiao, Fengyuan Xu, Qun Li
  • TINET: Transferring Knowledge between Invariant Networks

    KDD 2018 - 24th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
    pp. 1890-1899, 2018

    Chen Luo, Zhengzhang Chen, Lu-An Tang, Anshumali Shrivastava, Jieping Ying, Zhichun Li, Haifeng Chen
  • SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection

    The 27th USENIX Security Symposium (USENIX Security 2018)
    pp. 639-656, 2018

    Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal
  • AIQL: Enabling Efficient Attack Investigation from System Monitoring Data

    Proceedings of the 2018 USENIX Annual Technical Conference (ATC ’18)
    pp. 113-125, USENIX 2018

    Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal
  • Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems

    Proceedings of the 2017 ACM on Conference on Information and Knowledge Management (CIKM 2017), Pan Pacific, Singapore
    pp. 707-715, 2017

    Boxiang Dong, Zhengzhang Chen, Hui (Wendy) Wang, Lu-An Tang, Kai Zhang, Ying Lin, Wei Cheng, Zhichun Li, Haifeng Chen
  • High Fidelity Data Reduction for Big Data Security Dependency Analyses

    The 23rd ACM Conference on Computer and Communications Security (CCS 2016)
    pp. 504-516, 2016

    Zhang Xu, Zhenyu Wu, Zhichun Li, Xusheng Xiao, Kangkook Jee, Junghwan Rhee, Fengyuan Xu, Haining Wang, Guofei Jiang
  • Detecting Stack Layout Corruptions with Robust Stack Unwinding

    The 19th International Symposium on Research in Attacks (RAID 2016)
    Springer Publishing ISBN: 978-3-319-45719-2; pp. 71-94, 2016

    Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang
  • Behavior Query Discovery in System-Generated Temporal Graphs

    The 42nd International Conference on Bery Large Data Bases (VLDB 2016)
    Vol. 9, No. 4; pp. 240-251, 2015

    Bo Zong, Xusheng Xiao, Zhichun Li, Zhenyu Wu, Zhiyun Qian, Xifen Yan, Ambuj Singh , Guofei Jiang
  • SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps

    Proceedings of the 24th USENIX Security Symposium, Washington, DC
    pp. 977-992, 2015

    Jianjun Huang , Zhichun Li , Xusheng Xiao , Zhenyu Wu , Kangjie Lu , Xiangyu Zhang , Guofei Jiang
  • Discover and Tame Long-running Idling Processes in Enterprise Systems

    ASIACCS 2015 -- 10th ACM Symposium on Information, Computer and Communications Security , Singapore, China
    ACM 978-1-4503-3245-3/15/04; pp. 543-554, 2015

    Jun Wang, Zhiyun Qian, Zhichun Li, Zhenyu Wu, Junghwan Rhee , Xia Ning, Peng Liu, Guofei Jiang
  • Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting

    NDSS Symposium 2015 -- The 2015 Network and Distributed System Security , San Diego, CA
    Proceedings of the NDSS 2015 Symposium

    Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang
  • CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities

    Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012)
    ACM, pp. 229-240; 2012

    Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang

NetShield: Matching with a Large Vulnerability Signature Ruleset for High Performance Network Defense
Zhichun Li and Gao Xia and Hongyu Gao and Yi Tang and Yan Chen and Bin Liu and Junchen Jiang and Yuezhou Lv