Follow
Liya Su
Liya Su
University of Chinese Academy of Sciences
Verified email at iie.ac.cn - Homepage
Title
Cited by
Cited by
Year
Evil under the sun: Understanding and discovering attacks on ethereum decentralized applications
L Su, X Shen, X Du, X Liao, XF Wang, L Xing, B Liu
30th USENIX Security Symposium (USENIX Security 21), 1307-1324, 2021
502021
Hierarchical clustering based network traffic data reduction for improving suspicious flow detection
L Su, Y Yao, N Li, J Liu, Z Lu, B Liu
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
272018
A novel approach for identifying lateral movement attacks based on network embedding
M Chen, Y Yao, J Liu, B Jiang, L Su, Z Lu
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
262018
DeepGFL: Deep feature learning via graph for attack detection on flow-based network traffic
Y Yao, L Su, Z Lu
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 579-584, 2018
252018
Stdeepgraph: Spatial-temporal deep learning on communication graphs for long-term network attack detection
Y Yao, L Su, Z Lu, B Liu
2019 18th IEEE International Conference on Trust, Security And Privacy In …, 2019
152019
Marrying graph kernel with deep neural network: A case study for network anomaly detection
Y Yao, L Su, C Zhang, Z Lu, B Liu
Computational Science–ICCS 2019: 19th International Conference, Faro …, 2019
132019
Understanding the influence of graph Kernels on deep learning architecture: a case study of flow-based network attack detection
L Su, Y Yao, Z Lu, B Liu
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
32019
An improved method to unveil malware’s hidden behavior
Q Li, Y Zhang, L Su, Y Wu, X Ma, Z Yang
Information Security and Cryptology: 13th International Conference, Inscrypt …, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–8