IFS-P15.5
DebateCTI: Enhancing ATT&CK Technique Identification in CTI Reports via a Role-Specialized Multi-Agent Debate
Jinshen Xia, Ruijie Qi, Zhiqiang Lv, Zhenyu Song, Xiu Zhang, Chenchu Zhou, Jian Liu, Institute of Information Engineering, Chinese Academy of Sciences, China
Session:
IFS-P15: Defense Automation, Threat Intelligence, and Attack Detection Poster
Track:
Information Forensics and Security [IF]
Location:
Poster Area 23
Presentation Time:
Thu, 7 May, 16:30 - 18:30
Presentation
Discussion
Resources
No resources available.
Session IFS-P15
IFS-P15.1: Multi-Agent Honeypot-Based Request-Response Context Dataset for Improved SQL Injection Detection Performance
Hao Yu, Hui Li, FengYuan Shi, Wenjie Yu, School of Electronic and Computer Engineering, Peking University, China; PinHan Ho, Department of Electrical and Computer Engineering, The University of Waterloo, Canada; Zehua Wang, Department of Electrical and Computer Engineering, The University of British Columbia, Canada; Bin Wang, School of Electronic and Computer Engineering, Peking University, China
IFS-P15.2: PENPLAN-PDDL: A MULTI-AGENT FRAMEWORK FOR AUTOMATED PENETRATION TESTING PLANNING WITH PDDL-BASED VERIFICATION
Yu Qiao, Lun Li, Jiayu Zhang, Yimo Ren, Jin Gao, Dahui Li, Hongsong Zhu, Institute of Information Engineering,Chinese Academy of Sciences, China
IFS-P15.3: RETRIEVAL-AUGMENTED MULTI-AGENT MULTIMODAL FRAMEWORK FOR FAKE NEWS DETECTION
Yuanhao Li, Hongbo Wang, Xuhong Chen, Yiming Cao, Beijing University of Posts and Telecommunications, China
IFS-P15.4: MASDROID: A Multi-Agent System for Enhancing the Analysis of Android Malware
Xingyuan Wei, Ziyang Yu, Lihao Liu, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, United States of America; Degang Sun, Computer Network Information Center, Chinese Academy of Sciences, Beijing, China, United States of America; Wentao Li, Yan Wang, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China
IFS-P15.5: DebateCTI: Enhancing ATT&CK Technique Identification in CTI Reports via a Role-Specialized Multi-Agent Debate
Jinshen Xia, Ruijie Qi, Zhiqiang Lv, Zhenyu Song, Xiu Zhang, Chenchu Zhou, Jian Liu, Institute of Information Engineering, Chinese Academy of Sciences, China
IFS-P15.6: Polaris: Detecting Advanced Persistent Threat on Provenance Graphs via Siamese Masked Graph Representation
Wenqiang Hao, Xiaobing Pei, Jiahao Zhang, Zhenghao Tang, Huazhong University of Science and Technology, China
IFS-P15.7: AEGIS: ENHANCING PROVENANCE-BASED INTRUSION DETECTION SYSTEM WITH LLM-POWERED DEEP SEMANTIC REPRESENTATION
Baihang Liu, Fangjiao Zhang, Yun Feng, Canhua Chen, Xiaoyu Wang, Yaqin Cao, Qixu Liu, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China, China
IFS-P15.8: LGF-Net: A Local-Global Feature Learning Framework for Intrusion Detection
Haibo Liu, Mingyu Zhao, Hebei University, China; Jinglian Liu, Suzhou University of Technology, China
IFS-P15.9: MMNAD: A GENERALIZED MULTI-SCENARIO ATTACK DETECTION METHOD FOR SOFTWARE DEFINED NETWORKING
Rongfei He, Yunhe Cui, Chun Guo, Guowei Shen, Yi Chen, Guizhou University, China
IFS-P15.10: WHAT IS THE RISK? EVALUATING THE IMPACT OF KNOWLEDGE DISTILLATION ON LLM VULNERABILITIES
Shuangning Yang, Anhui University, China; Haoran Yang, Guoli Zhao, Mengting Zhou, Chinese Academy of Sciences, China; Jianwei Tai, Anhui University, China; Xiaoqi Jia, Chinese Academy of Sciences, China
Contacts