Publications

You can also find my articles on my Google Scholar profile.

Publications

Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection [arxiv] [code]
To appear in Network and Distributed System Security Symposium 2025 (NDSS'25)
Lingzhi Wang, Xiangmin Shen, Weijian Li, Zhenyuan Li, R. Sekar, Han Liu, Yan Chen

Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments [paper] [code]
Published in Proceedings of the 19th ACM Asia Conference on Computer and Communications Security (AsiaCCS'24)
Xiangmin Shen, Zhenyuan Li, Graham Burleigh, Lingzhi Wang, Yan Chen

Root-cause metric location for microservice systems via log anomaly detection [paper]
Published in 2020 IEEE International Conference on Web Services (ICWS'20)
Lingzhi Wang, Nengwen Zhao, Junjie Chen, Pinnong Li, Wenchi Zhang, Kaixin Sui

Working Papers

From Sands to Mansions: Enabling Automatic Full-Life-Cycle Cyberattack Construction with LLM [arxiv]
Lingzhi Wang, Jiahui Wang, Kyle Jung, Kedar Thiagarajan, Emily Wei, Xiangmin Shen, Yan Chen, Zhenyuan Li

Marlin: Knowledge-Driven Analysis of Provenance Graphs for Efficient and Robust Detection of Cyber Attacks [arxiv]
Zhenyuan Li, Yangyang Wei, Xiangmin Shen, Lingzhi Wang, Yan Chen, Haitao Xu, Shouling Ji, Fan Zhang