1 code implementation • 10 May 2023 • Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, Wenzhi Chen
We also explore some improvements that can maintain model utility and defend against MIAs more effectively.
no code implementations • 16 Dec 2021 • Mingqi Lv, chengyu dong, Tieming Chen, Tiantian Zhu, Qijie Song, Yuan Fan
To effective and efficient detect cyber-attacks from a huge number of system events in the provenance data, we firstly model the provenance data by a heterogeneous graph to capture the rich context information of each system entities (e. g., process, file, socket, etc.