Search

Your search keyword '"Li, Zhenyuan"' showing total 321 results

Search Constraints

Start Over You searched for: Author "Li, Zhenyuan" Remove constraint Author: "Li, Zhenyuan"
321 results on '"Li, Zhenyuan"'

Search Results

1. From Sands to Mansions: Enabling Automatic Full-Life-Cycle Cyberattack Construction with LLM

2. Towards Dynamic Resource Allocation and Client Scheduling in Hierarchical Federated Learning: A Two-Phase Deep Reinforcement Learning Approach

3. Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection

4. Marlin: Knowledge-Driven Analysis of Provenance Graphs for Efficient and Robust Detection of Cyber Attacks

5. Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments

9. Journeying through VET: A Case Study of Foundation Skills Learners. Research Report

16. AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports

18. A Method for Residual Network Image Classification with Multi-scale Feature Fusion

21. Threat Detection and Investigation with System-level Provenance Graphs: A Survey

28. AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports

41. Economic Dispatch Strategy of Solar Thermal-Wind Power System Considering Conditional Value-at-Risk

42. A Data Processing Method for Load Data of Electric Boiler with Heat Reservoir

43. Protopanaxadiol prevents cisplatin-induced acute kidney injury by regulating ferroptosis.

48. Discovery of Natural Ah Receptor Antagonists from Salvia miltiorrhiza Bunge and Synthesis of Analogs for Tumor Immunotherapy

Catalog

Books, media, physical & digital resources