Publications

  • Collaborative Alert Ranking for Anomaly Detection

    Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM 2018)
    pp. 1987-1995, 2018

    Ying Lin, Zhengzhang Chen, Kai Zhang, Cheng Cao, Lu-An Tang, Wei Cheng, Zhichun Li
    10/26/2018
  • Behavior-based Community Detection: Application to Host Assessment in Enterprise Information Networks

    Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM 2018)
    pp. 1977-1985, 2018

    Cheng Cao, Zhengzhang Chen, James Caverlee, Lu-An Tang, Chen Luo, Zhichun Li
    10/26/2018
  • NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis

    Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2018)
    pp. 1324-1337, 2018

    Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Junghwan Rhee, Zhenyu Wu, Xusheng Xiao, Fengyuan Xu, Qun Li
    10/19/2018
  • TINET: Transferring Knowledge between Invariant Networks

    KDD 2018 - 24th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
    pp. 1890-1899, 2018

    Chen Luo, Zhengzhang Chen, Lu-An Tang, Anshumali Shrivastava, Jieping Ying, Zhichun Li, Haifeng Chen
    08/23/2018
  • SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection

    The 27th USENIX Security Symposium (USENIX Security 2018)
    pp. 639-656, 2018

    Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal
    08/17/2018
  • AIQL: Enabling Efficient Attack Investigation from System Monitoring Data

    Proceedings of the 2018 USENIX Annual Technical Conference (ATC ’18)
    pp. 113-125, USENIX 2018

    Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal
    07/13/2018
  • Towards A Timely Causality Analysis in Homogeneous Enterprise Hosts

    Proceedings of Network and Distributed Systems Security (NDSS) Symposium 2018
    1-15, 2018

    Yushan Liu, Mu Zhang, Kangkook Jee, Ding Li, Zhenyu Wu, Junghwan Rhee, Prateek Mittal
    02/21/2018
  • Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems

    Proceedings of the 2017 ACM on Conference on Information and Knowledge Management (CIKM 2017), Pan Pacific, Singapore
    pp. 707-715, 2017

    Boxiang Dong, Zhengzhang Chen, Hui (Wendy) Wang, Lu-An Tang, Kai Zhang, Ying Lin, Wei Cheng, Zhichun Li, Haifeng Chen
    11/27/2017
  • PerfGuard: Binary-Centric Application Performance Monitoring in Production Environments

    The 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2016)
    pp. 595-606, 2016

    Chung Hwan Kim , Junghwan Rhee , Kyu Hyung Lee , Xiangyu Zhang , Dongyan Xu
    11/18/2016
  • High Fidelity Data Reduction for Big Data Security Dependency Analyses

    The 23rd ACM Conference on Computer and Communications Security (CCS 2016)
    pp. 504-516, 2016

    Zhang Xu, Zhenyu Wu, Zhichun Li, Xusheng Xiao, Kangkook Jee, Junghwan Rhee, Fengyuan Xu, Haining Wang, Guofei Jiang
    10/28/2016
  • Detecting Stack Layout Corruptions with Robust Stack Unwinding

    The 19th International Symposium on Research in Attacks (RAID 2016)
    Springer Publishing ISBN: 978-3-319-45719-2; pp. 71-94, 2016

    Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang
    09/21/2016
  • Behavior Query Discovery in System-Generated Temporal Graphs

    The 42nd International Conference on Bery Large Data Bases (VLDB 2016)
    Vol. 9, No. 4; pp. 240-251, 2015

    Bo Zong, Xusheng Xiao, Zhichun Li, Zhenyu Wu, Zhiyun Qian, Xifen Yan, Ambuj Singh , Guofei Jiang
    09/09/2016
  • Entity Embedding-based Anomaly Detection for Heterogeneous Categorical Events

    The 25th International Joint Conference on Artificial Intelligence (IJCAI 2016)
    AAAI Press, pp. 1396-1403, 2016

    Ting Chen, Lu-An Tang, Yizhou Sun, Zhengzhang Chen, Kai Zhang
    07/15/2016
  • Integrating Community and Role Detection in Information Networks

    2016 SIAM International Conference on Data Mining (SDM 2016)
    pp. 72-80, 2016

    Ting Chen, NEC Laboratories America, Lu-An Tang, Yizhou Sun, Zhengzhang Chen, Haifeng Chen, Guofei Jiang
    05/07/2016
  • Extract Me If You Can: Abusing PDF Parsers in Malware Detectors

    Proceedings of The Network and Distributed System Security Symposium 2016 (NDSS 2016)
    pp. 1-15, 2016

    Curtis Carmony, Mu Zhang, Xunchao Hu, Abhishek Vasisht Bhaskar, Heng Yin
    02/24/2016
  • Towards Automatic Generation of Security-Centric Descriptions for Android Apps

    Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS 2015)
    pp. 518-529 - 2015

    Mu Zhang , Yue Duan, Qian Feng , Heng Yin
    11/23/2015
  • SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps

    Proceedings of the 24th USENIX Security Symposium, Washington, DC
    pp. 977-992, 2015

    Jianjun Huang , Zhichun Li , Xusheng Xiao , Zhenyu Wu , Kangjie Lu , Xiangyu Zhang , Guofei Jiang
    08/12/2015
  • AppContext: Differentiating Malicious and Benign Mobile App Behaviors Under Context

    Proceedings of the IEEE/ACM 37th International Conference on Software Engineering (ICSE 2015)
    pp. 303-313, 2015

    Wei Yang, Xusheng Xiao, Benjamin Andow, Sihan Li, Tao Xie, William Enck
    05/24/2015
  • Discover and Tame Long-running Idling Processes in Enterprise Systems

    ASIACCS 2015 -- 10th ACM Symposium on Information, Computer and Communications Security , Singapore, China
    ACM 978-1-4503-3245-3/15/04; pp. 543-554, 2015

    Jun Wang, Zhiyun Qian, Zhichun Li, Zhenyu Wu, Junghwan Rhee , Xia Ning, Peng Liu, Guofei Jiang
    04/15/2015
  • Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting

    NDSS Symposium 2015 -- The 2015 Network and Distributed System Security , San Diego, CA
    Proceedings of the NDSS 2015 Symposium

    Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang
    02/09/2015
  • IntroPerf: Transparent Context-Aware Multi-Layer Performance Inference using System Stack Traces

    Proceedings of The 2014 ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS 2014), Austin, TX
    ACM, New York, NY, pp. 235-247

    Chung Hwan Kim, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Xiangyu Zhang, Dongyan Xu
    06/16/2014
  • DeltaPath: Precise and Scalable Calling Context Encoding

    2014 International Symposium on Code Generation and Optimization (CGO 2014)
    pp. 109-119, 2014

    Qiang Zeng, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Peng Liu
    02/17/2014
  • Automating Cloud Network Optimization and Evolution

    IEEE Journal on Selected Areas in Communications
    31(12):pp. 2620-2631, 2013

    Zhenyu Wu, Yueping Zhang, Vishal Singh, Guofei Jiang, Haining Wang
    12/01/2013
  • CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities

    Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012)
    ACM, pp. 229-240; 2012

    Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang
    10/16/2012
  • NetDEO: Automating Network Design, Evolution, and Optimization

    Proceedings of the 20th International Workshop on Quality of Serivce (IEEE/ACM IWQoS 2012), Coimbra, Portugal
    2012 IEEE, 978-1-4673-1298-1/12

    Zhenyu Wu, Yueping Zhang, Vishal Singh, Guofei Jiang, Haining Wang
    06/04/2012