publications

publications by categories in reversed chronological order. generated by jekyll-scholar.

2025

  1. malware_arch.jpg
    Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples
    Adrian Shuai Li, Arun Iyengar, Ashish Kundu, and Elisa Bertino
    In Network and Distributed System Security (NDSS) Symposium, 2025

2024

  1. US Patent App.
    Autoencoder with generative adversarial networks for transfer learning between domains
    Mark Wegman, Yuhai Tu, Xuan-Hong Dang, Ankush Singla, and 1 more author
    US Patent App. 18/129,540 , 2024
  2. Mind_Map.jpg
    Transfer Learning for Security: Challenges and Future Directions
    Adrian Shuai Li, Arun Iyengar, Ashish Kundu, and Elisa Bertino
    arXiv preprint arXiv:2403.00935, 2024
  3. cs.jpg
    Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation
    Sonam Bhardwaj, Adrian Shuai Li, Mayank Dave, and Elisa Bertino
    Computers & Security, 2024
  4. cutting.jpg
    Adversarial Domain Adaptation for Metal Cutting Sound Detection: Leveraging Abundant Lab Data for Scarce Industry Data
    Mir Imtiaz Mostafiz, Eunseob Kim, Adrian Shuai Li, Elisa Bertino, and 2 more authors
    In 2024 IEEE 22nd International Conference on Industrial Informatics (INDIN), 2024

2023

  1. generative.jpg
    Building Manufacturing Deep Learning Models with Minimal and Imbalanced Training Data Using Domain Adaptation and Data Augmentation
    Adrian Shuai Li, Elisa Bertino, Rih-Teng Wu, and Ting-Yan Wu
    In 2023 IEEE International Conference on Industrial Technology (ICIT), 2023
  2. book.jpg
    Machine Learning Techniques for Cybersecurity
    Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, and 5 more authors
    Springer Nature Synthesis Lectures on Information Security, Privacy, and Trust , 2023
  3. Max.jpg
    Maximal Domain Independent Representations Improve Transfer Learning
    Adrian Shuai Li, Elisa Bertino, Xuan-Hong Dang, Ankush Singla, and 2 more authors
    arXiv preprint arXiv:2306.00262, 2023

2022

  1. example.jpg
    A capability-based distributed authorization system to enforce context-aware permission sequences
    Adrian Shuai Li, Reihaneh Safavi-Naini, and Philip WL Fong
    In Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, 2022

2020

  1. crash.jpg
    Secure logging with security against adaptive crash attack
    Sepideh Avizheh, Reihaneh Safavi-Naini, and Shuai Li
    In Foundations and Practice of Security: 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers 12, 2020

2018

  1. reshub.jpg
    Towards a resilient smart home
    Tam Thanh Doan, Reihaneh Safavi-Naini, Shuai Li, Sepideh Avizheh, and 2 more authors
    In Proceedings of the 2018 workshop on IoT security and privacy, 2018