1// Publications
2// Wei Qiao | # Co-first Author | * Corresponding Author
3
4// 2026
4
5
Cutting the Fuse: Actionable APT Attack Blocking in Provenance-based IDS.
Proceedings of the 35th USENIX Security Symposium (USENIX Security), 2026.
Proceedings of the 35th USENIX Security Symposium (USENIX Security), 2026.
6
7
Forge: A Robust Multi-tab Website Fingerprinting Attack via Blind Source Separation.
Proceedings of the ACM on Web Conference 2026 (WWW), 2026.
Proceedings of the ACM on Web Conference 2026 (WWW), 2026.
8
9
Btda: A Robust Framework for Encrypted Traffic Classification with Byte-Level TLS Data Augmentation.
2026 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2026.
2026 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2026.
10
11
TrafficMoE: Adaptive Multi-Perspective Feature Fusion for Enhancing Malicious Traffic General Detection Capability.
2026 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2026.
2026 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2026.
12
7
8// 2025
4
5
Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2025, pp. 963-977.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2025, pp. 963-977.
6
7
SauronEyes: Disentangling Voluminous Logs to Unveil Camouflaged Attack Intentions.
IEEE Transactions on Information Forensics and Security (TIFS), 2025.
IEEE Transactions on Information Forensics and Security (TIFS), 2025.
8
9
Chaos: Robust Spatio-Temporal Fusion for Generalizable APT Provenance Tracing.
International Conference on Data Security and Privacy Protection (DSPP), 2025, pp. 507-524. Best Paper Award
International Conference on Data Security and Privacy Protection (DSPP), 2025, pp. 507-524. Best Paper Award
10
11
Brewing Vodka: Distilling Pure Knowledge for Lightweight Threat Detection in Audit Logs.
Proceedings of the ACM on Web Conference 2025 (WWW), 2025, pp. 2172-2182.
Proceedings of the ACM on Web Conference 2025 (WWW), 2025, pp. 2172-2182.
12
13
Sentient: Multi-Scenario Behavioral Intent Analysis for Advanced Persistent Threat Detection.
AAAI Conference on Artificial Intelligence (AAAI), 2025.
AAAI Conference on Artificial Intelligence (AAAI), 2025.
14
15
Towards Effective Black-Box Attacks on DoH Tunnel Detection Systems.
Computer Networks, 2025, pp. 111524.
Computer Networks, 2025, pp. 111524.
18
19
PathWatcher: A Path-Based Behavior Detection Method for Attack Detection and Investigation.
Computers & Security, 2025, pp. 104563.
Computers & Security, 2025, pp. 104563.
20
21
PanThreat: Global Resource-Based Anomaly Detection for APTs.
28th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2025, pp. 135-140.
28th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2025, pp. 135-140.
22
23
DCASI: A Sequence-based Attack Investigation Method Using DTW Contrastive Learning.
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2025, pp. 1-5.
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2025, pp. 1-5.
24
25
LogWF: Anomaly Detection for Distributed Systems Based on Log Workflow Mining.
45th IEEE International Conference on Distributed Computing Systems WorkShop (ICDCSW), 2025.
45th IEEE International Conference on Distributed Computing Systems WorkShop (ICDCSW), 2025.
26
27// 2023
33
34
T-trace: Constructing the APTs Provenance Graphs through Multiple Syslogs Correlation.
IEEE Transactions on Dependable and Secure Computing (TDSC), 2023, vol. 21, no. 3, pp. 1179-1195.
IEEE Transactions on Dependable and Secure Computing (TDSC), 2023, vol. 21, no. 3, pp. 1179-1195.
35