default search action
Qiujian Lv
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Zijun Cheng, Qiujian Lv, Jinyuan Liang, Yan Wang, Degang Sun, Thomas Pasquier, Xueyuan Han:
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance. SP 2024: 3533-3551 - [i2]Xingyuan Wei, Ce Li, Qiujian Lv, Ning Li, Degang Sun, Yan Wang:
Mitigating the Impact of Malware Evolution on API Sequence-based Windows Malware Detector. CoRR abs/2408.01661 (2024) - 2023
- [j5]Leiqi Wang, Xiu Ma, Ning Li, Qiujian Lv, Yan Wang, Weiqing Huang, Haiyan Chen:
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks. Comput. Secur. 135: 103466 (2023) - [c22]Leiqi Wang, Zijun Cheng, Qiujian Lv, Yan Wang, Shixiang Zhang, Weiqing Huang:
ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks. CSCWD 2023: 47-52 - [c21]Zijun Cheng, Rujie Dai, Leiqi Wang, Ziyang Yu, Qiujian Lv, Yan Wang, Degang Sun:
GHunter: A Fast Subgraph Matching Method for Threat Hunting. CSCWD 2023: 1014-1019 - [c20]Leiqi Wang, Xu Wang, Qiujian Lv, Yan Wang, Xinxing Zhou, Weiqing Huang:
CTP: Defending Against Data Poisoning in Attack Traffic Detection Based Deep Neural Networks. IC-NIDC 2023: 414-420 - [c19]Xu Wang, Jianguo Jiang, Yan Wang, Qiujian Lv, Leiqi Wang:
UAG: User Action Graph Based on System Logs for Insider Threat Detection. ISCC 2023: 1027-1032 - [c18]Degang Sun, Guokun Xu, Weijie Wang, Yan Wang, Qiujian Lv, Xinxing Zhou, Zhiqi Li:
LWVN: A Lightweight Virtual Network View Method to Defend Lateral Movement. TrustCom 2023: 1214-1221 - [c17]Weijie Wang, Yan Wang, Guokun Xu, Qiujian Lv, Zuxin Chen, Siyuan Li:
VN-SMT: An SMT-based Construction Method on Virtual Network to Defend Insider Reconnaissance. WCNC 2023: 1-6 - [i1]Zijun Cheng, Qiujian Lv, Jinyuan Liang, Yan Wang, Degang Sun, Thomas Pasquier, Xueyuan Han:
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance. CoRR abs/2308.05034 (2023) - 2022
- [j4]Ce Li, Qiujian Lv, Ning Li, Yan Wang, Degang Sun, Yuanyuan Qiao:
A novel deep framework for dynamic malware detection based on API sequence intrinsic features. Comput. Secur. 116: 102686 (2022) - [j3]Ce Li, Zijun Cheng, He Zhu, Leiqi Wang, Qiujian Lv, Yan Wang, Ning Li, Degang Sun:
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning. Comput. Secur. 122: 102872 (2022) - [c16]Xiu Ma, Leiqi Wang, Qiujian Lv, Yan Wang, Qi Zhang, Jianguo Jiang:
CyEvent2vec: Attributed Heterogeneous Information Network based Event Embedding Framework for Cyber Security Events Analysis. IJCNN 2022: 1-8 - [c15]Zijun Cheng, Degang Sun, Leiqi Wang, Qiujian Lv, Yan Wang:
MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios. ISCC 2022: 1-6 - [c14]Yan Wang, Xiaowei Hou, Xiu Ma, Qiujian Lv:
A Software Security Entity Relationships Prediction Framework Based on Knowledge Graph Embedding Using Sentence-Bert. WASA (2) 2022: 501-513 - 2021
- [c13]Tingting Wang, Xufeng Zhao, Qiujian Lv, Bo Hu, Degang Sun:
Density Weighted Diversity Based Query Strategy for Active Learning. CSCWD 2021: 156-161 - [c12]Tingting Wang, Qiujian Lv, Bo Hu, Degang Sun:
A Few-Shot Class-Incremental Learning Approach for Intrusion Detection. ICCCN 2021: 1-8 - [c11]Dongqing Yu, Xiaowei Hou, Ce Li, Qiujian Lv, Yan Wang, Ning Li:
Anomaly Detection in Unstructured Logs Using Attention-based Bi-LSTM Network. IC-NIDC 2021: 403-407 - [c10]Weiqing Huang, He Zhu, Ce Li, Qiujian Lv, Yan Wang, Haitian Yang:
ITDBERT: Temporal-semantic Representation for Insider Threat Detection. ISCC 2021: 1-7 - [c9]Jianguo Jiang, Xu Wang, Yan Wang, Qiujian Lv, Meichen Liu, Tingting Wang, Leiqi Wang:
GSketch: A Comprehensive Graph Analytic Approach for Masquerader Detection Based on File Access Graph. ISCC 2021: 1-6 - [c8]Leiqi Wang, Weiqing Huang, Qiujian Lv, Yan Wang, Haiyan Chen:
AOPL: Attention Enhanced Oversampling and Parallel Deep Learning Model for Attack Detection in Imbalanced Network Traffic. WASA (2) 2021: 84-95
2010 – 2019
- 2019
- [c7]Degang Sun, Zhengrong Wu, Yan Wang, Qiujian Lv, Bo Hu:
Risk Prediction for Imbalanced Data in Cyber Security : A Siamese Network-based Deep Learning Classification Framework. IJCNN 2019: 1-8 - [c6]Degang Sun, Zhengrong Wu, Yan Wang, Qiujian Lv, Bo Hu:
Cyber Profiles Based Risk Prediction of Application Systems for Effective Access Control. ISCC 2019: 1-7 - 2018
- [j2]Qiujian Lv, Yuanyuan Qiao, Yi Zhang, Fehmi Ben Abdesslem, Wenhui Lin, Jie Yang:
Measuring Geospatial Properties: Relating Online Content Browsing Behaviors to Users' Points of Interest. Wirel. Pers. Commun. 101(3): 1469-1498 (2018) - [c5]Bin Lv, Dan Wang, Yan Wang, Qiujian Lv, Dan Lu:
A Hybrid Model Based on Multi-dimensional Features for Insider Threat Detection. WASA 2018: 333-344 - 2017
- [j1]Qiujian Lv, Yuanyuan Qiao, Nirwan Ansari, Jun Liu, Jie Yang:
Big Data Driven Hidden Markov Model Based Individual Mobility Prediction at Points of Interest. IEEE Trans. Veh. Technol. 66(6): 5204-5216 (2017) - [c4]Yan Wu, Qiujian Lv, Yuanyuan Qiao, Jie Yang:
Linking Virtual Identities across Service Domains: An Online Behavior Modeling Approach. Intelligent Environments 2017: 122-129 - [c3]Yao Guo, Qiujian Lv, Fang Liu, Jie Yang, Zhe Gao:
A Comprehensive Analysis of Video Service Quality on IQIYI from Large-Scale Data Sets. QSHINE 2017: 83-93 - 2015
- [c2]Qiujian Lv, Yufei Di, Yuanyuan Qiao, Zhenming Lei, Chao Dong:
Spatial and temporal mobility analysis in LTE mobile network. WCNC 2015: 795-800 - 2014
- [c1]Qiujian Lv, Zongshan Mei, Yuanyuan Qiao, Yufei Zhong, Zhenming Lei:
Hidden Markov Model based user mobility analysis in LTE network. WPMC 2014: 379-384
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint