Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View li-zhenyuan's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report li-zhenyuan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
li-zhenyuan/README.md

I am a Researcher in the Zhejiang University, Schoolof Software Technology . Before joining ZJU, I worked at Huawei, 2012 Lab as a Senior Engineer. I graduated from Department of Computer Science and Technology, Zhejiang University with a Ph.D. degreed.

My research interests lie in system security, intrustion detection and cyber threat analysis techniques. I am now working towards to design practical intrusion detection and attack investigation systems. I work closely with my PhD advisor Prof. Yan Chen from Northwestern University and Prof. Shouling Ji from Zhejiang University.

"Contact me for intrusion detection systems research that are in line with the industry!!!"(持续招收对安全研究有兴趣的硕士研究生和本科生!)

🔥 News

  • 2025.05: Our paper "The Case for Learned Provenance-based System Behavior Baseline" is accepted by ICML'25.
  • 2025.04: Our paper "PentestAgent: Incorporating LLM Agents to Automated Penetration Testing" is accepted by AsiaCCS'25.
  • 2025.03:指导作品“海量日志流中高隐蔽威胁在线检测系统”获软件创新大赛-软件系统安全赛-华东区域一等奖,并入围全国赛,恭喜参与同学。 [Notification Link]
  • 2025.02: Our poster “LLM-Driven Automated Exploit Assessment for Penetration Testing” will appear in NDSS'25 poster session.
  • 2024.12: Granted "Leading Goose" R&D Program of Zhejiang as PI.
  • 2024.12: Our paper "Understanding the Business of Online Affiliate Marketing: An Empirical Study" is accepted by INFOCOM'25.
  • 2024.09: Awarded Ningbo "YongJiang" Talent Programme (Youth Program).
  • 2024.08: Granted National Natural Science Foundation of China (Youth Program).
  • 2024.08: Our paper "Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection" is accepted by NDSS'25.

Pinned Loading

  1. MarineYY/MARLIN MarineYY/MARLIN Public

    Java 5

  2. Knowledge-enhanced-Attack-Graph Knowledge-enhanced-Attack-Graph Public archive

    AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports

    Jupyter Notebook 182 42

  3. Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts Public archive

    C# 22 5

  4. atomic-red-team atomic-red-team Public

    Forked from redcanaryco/atomic-red-team

    Small and highly portable detection tests based on MITRE's ATT&CK.

    PowerShell 2

  5. EXTRACTOR EXTRACTOR Public

    Forked from ksatvat/EXTRACTOR

    Python 2 1

  6. TTPDrill-0.5 TTPDrill-0.5 Public

    Forked from KaiLiu-Leo/TTPDrill-0.5

    TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TTPs) from commonly available CTI sources in order to timely i…

    Python 7 1