Publications

You can also find my articles on my Google Scholar profile.

Publications

PentestAgent: Incorporating LLM Agents to Automated Penetration Testing [arxiv] [code]
To appear in Proceedings of the 20th ACM Asia Conference on Computer and Communications Security (AsiaCCS'25)
Xiangmin Shen, Lingzhi Wang, Zhenyuan Li, Yan Chen, Wencheng Zhao, Dawei Sun, Jiashui Wang, Wei Ruan

Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection [paper] [code]
Published in Network and Distributed System Security Symposium 2025 (NDSS'25)
Lingzhi Wang, Xiangmin Shen, Weijian Li, Zhenyuan Li, R. Sekar, Han Liu, Yan Chen

Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments [paper] [code]
Published in Proceedings of the 19th ACM Asia Conference on Computer and Communications Security (AsiaCCS'24)
Xiangmin Shen, Zhenyuan Li, Graham Burleigh, Lingzhi Wang, Yan Chen

Root-cause metric location for microservice systems via log anomaly detection [paper]
Published in 2020 IEEE International Conference on Web Services (ICWS'20)
Lingzhi Wang, Nengwen Zhao, Junjie Chen, Pinnong Li, Wenchi Zhang, Kaixin Sui

Papers Under Review

From Sands to Mansions: Enabling Automatic Full-Life-Cycle Cyberattack Construction with LLM [arxiv]
Lingzhi Wang, Jiahui Wang, Kyle Jung, Kedar Thiagarajan, Emily Wei, Xiangmin Shen, Yan Chen, Zhenyuan Li

Marlin: Knowledge-Driven Analysis of Provenance Graphs for Efficient and Robust Detection of Cyber Attacks [arxiv]
Zhenyuan Li, Yangyang Wei, Xiangmin Shen, Lingzhi Wang, Yan Chen, Haitao Xu, Shouling Ji, Fan Zhang