Publications

You can also find my articles on my Google Scholar profile.

Publications

From Sands to Mansions: Enabling Automatic Full-Life-Cycle Cyberattack Construction with LLM [arxiv]
To appear in The 24th International Conference on Applied Cryptography and Network Security (ACNS 2026)
Lingzhi Wang, Zhenyuan LI, Yi Jiang, Zhengkai Wang, Xiangmin Shen, Wei Ruan, Yan Chen

GraphFaaS: Serverless GNN Inference for Burst-Resilient, Real-Time Intrusion Detection [arxiv]
To appear in The Workshop on ML for Systems at NeurIPS 2025
Lingzhi Wang, Vinod Yegneswaran, Xinyi Shi, Ziyu Li, Ashish Gehani, Yan Chen

Incorporating Gradients to Rules: Towards Online, Adaptive Provenance-based Intrusion Detection [paper]
Published in IEEE Transactions on Dependable and Secure Computing (IEEE TDSC)
Zhenyuan Li, Lingzhi Wang, Zhengkai Wang, Xiangmin Shen, Haitao Xu, Yan Chen, Shouling Ji

PentestAgent: Incorporating LLM Agents to Automated Penetration Testing [arxiv] [code]
To appear in Proceedings of the 20th ACM Asia Conference on Computer and Communications Security (AsiaCCS'25)
Xiangmin Shen, Lingzhi Wang, Zhenyuan Li, Yan Chen, Wencheng Zhao, Dawei Sun, Jiashui Wang, Wei Ruan

Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection [paper] [code]
Published in Network and Distributed System Security Symposium 2025 (NDSS'25)
Lingzhi Wang, Xiangmin Shen, Weijian Li, Zhenyuan Li, R. Sekar, Han Liu, Yan Chen

Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments [paper] [code]
Published in Proceedings of the 19th ACM Asia Conference on Computer and Communications Security (AsiaCCS'24)
Xiangmin Shen, Zhenyuan Li, Graham Burleigh, Lingzhi Wang, Yan Chen

Root-cause metric location for microservice systems via log anomaly detection [paper]
Published in 2020 IEEE International Conference on Web Services (ICWS'20)
Lingzhi Wang, Nengwen Zhao, Junjie Chen, Pinnong Li, Wenchi Zhang, Kaixin Sui

Papers Under Review

Marlin: Knowledge-Driven Analysis of Provenance Graphs for Efficient and Robust Detection of Cyber Attacks [arxiv]
Zhenyuan Li, Yangyang Wei, Xiangmin Shen, Lingzhi Wang, Yan Chen, Haitao Xu, Shouling Ji, Fan Zhang