


default search action
Tiantian Zhu 0001
Person information
- affiliation: Zhejiang University of Technology, China
Other persons with the same name
- Tiantian Zhu — disambiguation page
- Tiantian Zhu 0002
— Harbin Institute of Technology (Shenzhen), Shenzhen, Guangdong, China - Tiantian Zhu 0003
— Hunan Institute of Science and Technology, Yueyang, Hunan, China - Tiantian Zhu 0004
— UiT, The Arctic University of Norway, Tromsø, Norway
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j29]Tieming Chen
, Qijie Song
, Tiantian Zhu
, Xuebo Qiu, Zhiling Zhu
, Mingqi Lv:
Kellect: A Kernel-based efficient and lossless event log collector for windows security. Comput. Secur. 150: 104203 (2025)
[j28]Mingda Li, Tiantian Zhu
, Haoqi Yan, Tieming Chen
, Mingqi Lv
:
HER-PT: An intelligent penetration testing framework with Hindsight Experience Replay. Comput. Secur. 152: 104357 (2025)
[j27]Jiaobo Jin, Tiantian Zhu
, Qixuan Yuan, Tieming Chen
, Mingqi Lv, Chenbin Zheng, Jian-Ping Mei, Xiang Pan:
PDCleaner: A multi-view collaborative data compression method for provenance graph-based APT detection systems. Comput. Secur. 152: 104359 (2025)
[j26]Tiantian Zhu
, Wenya He, Tieming Chen
, Jiabo Zhang, Mingqi Lv
, Hongmei Li
, Aohan Zheng, Jie Zheng, Mingjun Ma, Xiangyang Zheng, Zhengqiu Weng, Shuying Wu:
LinTracer: An efficient tracking system for cyberattack chains fusing entity and event semantics. Comput. Secur. 154: 104413 (2025)
[j25]Hongmei Li, Tiantian Zhu
, Jie Ying, Tieming Chen
, Mingqi Lv, Jian-Ping Mei, Zhengqiu Weng, Lili Shi:
MIRDETECTOR: Applying malicious intent representation for enhanced APT anomaly detection. Comput. Secur. 157: 104588 (2025)
[j24]Qijie Song, Jiaobo Jin, Tiantian Zhu
, Tieming Chen
, Mingqi Lv, Licheng Pan, Jian-Ping Mei, Xiang Pan:
VulnTrace: Tracking and Detecting Code Vulnerabilities with Historical Commits and Semantic Embeddings. Int. J. Softw. Eng. Knowl. Eng. 35(5): 679-706 (2025)
[j23]Tiantian Zhu
, Jiayuan Chen, Mingjun Ma, Tieming Chen
, Mingqi Lv
, Zhengqiu Weng, Suyu Zhang:
GANDACOG: Implicit Mobile User Authentication in Multi Environments With Scarce Data. IEEE Internet Things J. 12(14): 28074-28091 (2025)
[j22]Mingjun Ma, Tiantian Zhu, Jie Ying, Yu Cheng, Jiayuan Chen, Jian-Ping Mei, Xue Leng
, Xiangyang Zheng, Zhengqiu Weng:
ThreatCog: An adaptive and lightweight mobile user authentication system with enhanced motion sensory signals. J. Inf. Secur. Appl. 93: 104142 (2025)
[j21]Zhengqiu Weng
, Weinuo Zhang
, Tiantian Zhu
, Zhenhao Dou, Haofei Sun, Zhanxiang Ye, Ye Tian:
RT-APT: A real-time APT anomaly detection method for large-scale provenance graph. J. Netw. Comput. Appl. 233: 104036 (2025)
[j20]Mingjun Ma, Tiantian Zhu
, Shuang Li, Tieming Chen
, Mingqi Lv, Zhengqiu Weng, Guolang Chen:
Actminer: Applying causality tracking and increment aligning for graph-based threat hunting. Knowl. Based Syst. 327: 114169 (2025)
[j19]Tiantian Zhu
, Jie Ying
, Tieming Chen
, Chunlin Xiong
, Wenrui Cheng
, Qixuan Yuan
, Aohan Zheng, Mingqi Lv
, Yan Chen
:
Nip in the Bud: Forecasting and Interpreting Post- Exploitation Attacks in Real-Time Through Cyber Threat Intelligence Reports. IEEE Trans. Dependable Secur. Comput. 22(2): 1431-1447 (2025)
[j18]Wenrui Cheng
, Qixuan Yuan
, Tiantian Zhu
, Tieming Chen
, Jie Ying
, Aohan Zheng, Mingjun Ma, Chunlin Xiong
, Mingqi Lv
, Yan Chen
:
TAGAPT: Toward Automatic Generation of APT Samples With Provenance-Level Granularity. IEEE Trans. Inf. Forensics Secur. 20: 4137-4151 (2025)
[j17]Jie Ying
, Tiantian Zhu
, Tieming Chen
, Mingqi Lv
:
Dehydrator: Enhancing Provenance Graph Storage via Hierarchical Encoding and Sequence Generation. IEEE Trans. Inf. Forensics Secur. 20: 7853-7866 (2025)
[c6]Jian-Ping Mei, Weibin Zhang, Jie Chen, Xuyun Zhang, Tiantian Zhu:
Defense Against Model Stealing Based on Account-Aware Distribution Discrepancy. AAAI 2025: 604-611
[c5]Xuebo Qiu, Mingqi Lv, Tieming Chen, Tiantian Zhu, Qijie Song:
Provenance-Based Intrusion Detection via Multi-scale Graph Representation Learning. ICICS (2) 2025: 531-549
[i13]Jie Ying, Tiantian Zhu, Aohan Zheng, Tieming Chen
, Mingqi Lv, Yan Chen:
METANOIA: A Lifelong Intrusion Detection and Investigation System for Mitigating Concept Drift. CoRR abs/2501.00438 (2025)
[i12]Jie Ying, Tiantian Zhu, Mingqi Lv, Tieming Chen
:
DEHYDRATOR: Enhancing Provenance Graph Storage via Hierarchical Encoding and Sequence Generation. CoRR abs/2501.00446 (2025)
[i11]Mingjun Ma, Tiantian Zhu, Tieming Chen
, Shuang Li, Jie Ying, Chunlin Xiong, Mingqi Lv, Yan Chen:
ActMiner: Applying Causality Tracking and Increment Aligning for Graph-based Cyber Threat Hunting. CoRR abs/2501.05793 (2025)
[i10]Wenrui Cheng, Tiantian Zhu, Chunlin Xiong, Haofei Sun, Zijun Wang, Shunan Jing, Mingqi Lv, Yan Chen:
SoK: Knowledge is All You Need: Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs. CoRR abs/2503.03108 (2025)
[i9]Jian-Ping Mei, Weibin Zhang, Jie Chen, Xuyun Zhang, Tiantian Zhu:
Defense Against Model Stealing Based on Account-Aware Distribution Discrepancy. CoRR abs/2503.12497 (2025)- 2024
[j16]Tieming Chen
, Huan Zeng, Mingqi Lv
, Tiantian Zhu
:
CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters. Comput. Secur. 136: 103518 (2024)
[j15]Jingjie Xu, Ting Wang, Mingqi Lv, Tieming Chen
, Tiantian Zhu, Baiyang Ji:
MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs. Cybersecur. 7(1): 55 (2024)
[j14]Jie Ying
, Tiantian Zhu
, Qiang Liu
, Chunlin Xiong
, Zhengqiu Weng
, Tieming Chen
, Lei Fu
, Mingqi Lv
, Han Wu
, Ting Wang
, Yan Chen
:
TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy. IEEE Trans. Mob. Comput. 23(4): 2832-2848 (2024)
[c4]Mingqi Lv
, Hongzhe Gao
, Xuebo Qiu
, Tieming Chen
, Tiantian Zhu
, Jinyin Chen
, Shouling Ji
:
TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning. CCS 2024: 139-152
[i8]Mingqi Lv, Hongzhe Gao, Xuebo Qiu, Tieming Chen
, Tiantian Zhu:
TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning. CoRR abs/2402.15147 (2024)
[i7]Jie Ying, Tiantian Zhu, Wenrui Cheng, Qixuan Yuan, Mingjun Ma, Chunlin Xiong, Tieming Chen
, Mingqi Lv, Yan Chen:
SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-time. CoRR abs/2405.02629 (2024)
[i6]Tiantian Zhu, Jie Ying, Tieming Chen
, Chunlin Xiong, Wenrui Cheng, Qixuan Yuan, Aohan Zheng, Mingqi Lv, Yan Chen:
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports. CoRR abs/2405.02826 (2024)
[i5]Wenrui Cheng, Tiantian Zhu, Tieming Chen
, Qixuan Yuan, Jie Ying, Hongmei Li, Chunlin Xiong, Mingda Li, Mingqi Lv, Yan Chen:
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports. CoRR abs/2410.11209 (2024)
[i4]Jian Wang, Tiantian Zhu, Chunlin Xiong, Yan Chen:
MultiKG: Multi-Source Threat Intelligence Aggregation for High-Quality Knowledge Graph Representation of Attack Techniques. CoRR abs/2411.08359 (2024)- 2023
[j13]Tieming Chen
, Chenbin Zheng, Tiantian Zhu
, Chunlin Xiong
, Jie Ying
, Qixuan Yuan
, Wenrui Cheng, Mingqi Lv:
System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends. Comput. Secur. 135: 103485 (2023)
[j12]Tiantian Zhu
, Jinkai Yu, Chunlin Xiong
, Wenrui Cheng
, Qixuan Yuan
, Jie Ying
, Tieming Chen
, Jiabo Zhang, Mingqi Lv
, Yan Chen
, Ting Wang
, Yuan Fan:
APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts. IEEE Trans. Dependable Secur. Comput. 20(6): 5247-5264 (2023)
[j11]Lei Fu
, Ke Yan
, Yikun Zhang
, Ruien Chen
, Zepeng Ma
, Fang Xu
, Tiantian Zhu
:
EdgeCog: A Real-Time Bearing Fault Diagnosis System Based on Lightweight Edge Computing. IEEE Trans. Instrum. Meas. 72: 1-11 (2023)- 2022
[j10]Chunlin Xiong
, Zhenyuan Li, Yan Chen, Tiantian Zhu, Jian Wang, Hai Yang, Wei Ruan
:
Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts. Frontiers Inf. Technol. Electron. Eng. 23(3): 361-381 (2022)
[j9]Chunlin Xiong
, Tiantian Zhu
, Weihao Dong
, Linqi Ruan
, Runqing Yang
, Yueqiang Cheng
, Yan Chen, Shuai Cheng, Xutong Chen
:
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency. IEEE Trans. Dependable Secur. Comput. 19(1): 551-565 (2022)
[j8]Lei Fu
, Ke Yan
, Tiantian Zhu
:
PowerCog: A Practical Method for Recognizing Power Quality Disturbances Accurately in a Noisy Environment. IEEE Trans. Ind. Informatics 18(5): 3105-3113 (2022)
[j7]Tiantian Zhu
, Zhengqiu Weng, Qijie Song, Yuan Chen, Qiang Liu
, Yan Chen, Mingqi Lv
, Tieming Chen
:
EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment. IEEE Trans. Mob. Comput. 21(2): 555-572 (2022)
[j6]Mingqi Lv
, Dajian Zeng, Ling Chen
, Tieming Chen
, Tiantian Zhu
, Shouling Ji
:
Private Cell-ID Trajectory Prediction Using Multi-Graph Embedding and Encoder-Decoder Network. IEEE Trans. Mob. Comput. 21(8): 2967-2977 (2022)
[i3]Tieming Chen
, Qijie Song, Xuebo Qiu, Tiantian Zhu, Zhiling Zhu, Mingqi Lv:
Kellect: a Kernel-Based Efficient and Lossless Event Log Collector. CoRR abs/2207.11530 (2022)- 2021
[j5]Tiantian Zhu
, Lei Fu
, Qiang Liu
, Zi Lin
, Yan Chen, Tieming Chen
:
One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering. IEEE Trans. Inf. Forensics Secur. 16: 553-568 (2021)
[j4]Tiantian Zhu
, Jiayu Wang, Linqi Ruan
, Chunlin Xiong
, Jinkai Yu, Yaosheng Li, Yan Chen, Mingqi Lv
, Tieming Chen
:
General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis. IEEE Trans. Inf. Forensics Secur. 16: 3312-3325 (2021)
[j3]Mingqi Lv
, Zhaoxiong Hong
, Ling Chen
, Tieming Chen
, Tiantian Zhu
, Shouling Ji
:
Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction. IEEE Trans. Intell. Transp. Syst. 22(6): 3337-3348 (2021)
[i2]Mingqi Lv, Chengyu Dong, Tieming Chen, Tiantian Zhu, Qijie Song, Yuan Fan:
A Heterogeneous Graph Learning Model for Cyber-Attack Detection. CoRR abs/2112.08986 (2021)
[i1]Tiantian Zhu, Jinkai Yu, Tieming Chen, Jiayu Wang, Jie Ying, Ye Tian, Mingqi Lv, Yan Chen, Yuan Fan, Ting Wang:
APTSHIELD: A Stable, Efficient and Real-time APT Detection System for Linux Hosts. CoRR abs/2112.09008 (2021)- 2020
[j2]Tiantian Zhu
, Zhengyang Qu, Haitao Xu
, Jingsi Zhang, Zhengyue Shao, Yan Chen, Sandeep Prabhakar, Jianfeng Yang
:
RiskCog: Unobtrusive Real-Time User Authentication on Mobile Devices in the Wild. IEEE Trans. Mob. Comput. 19(2): 466-483 (2020)
[c3]Tieming Chen
, Zhengqiu Weng, YunPeng Chen, Chenqiang Jin, Mingqi Lv, Tiantian Zhu, Jianhong Lin:
WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data Augmentation. Inscrypt 2020: 193-201
2010 – 2019
- 2019
[c2]Zhenyuan Li
, Qi Alfred Chen, Chunlin Xiong, Yan Chen, Tiantian Zhu, Hai Yang:
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts. CCS 2019: 1831-1847- 2016
[j1]Tiantian Zhu, Hongyu Gao, Yi Yang, Kai Bu
, Yan Chen, Doug Downey, Kathy Lee, Alok N. Choudhary:
Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates. IEEE/ACM Trans. Netw. 24(6): 3856-3869 (2016)- 2014
[c1]Zhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian Zhu, Zhong Chen:
AutoCog: Measuring the Description-to-permission Fidelity in Android Applications. CCS 2014: 1354-1365
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-26 01:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







