Follow
Nan Sun
Title
Cited by
Cited by
Year
Data-driven cybersecurity incident prediction: A survey
N Sun, J Zhang, P Rimba, S Gao, LY Zhang, Y Xiang
IEEE Communications Surveys & Tutorials 21 (2), 1744-1772, 2019
3672019
Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives
N Sun, M Ding, J Jiang, W Xu, X Mo, Y Tai, J Zhang
IEEE Communications Surveys & Tutorials 25 (3), 1748-1774, 2023
1622023
Near real-time twitter spam detection with machine learning techniques
N Sun, G Lin, J Qiu, P Rimba
International Journal of Computers and Applications 44 (4), 338-348, 2020
802020
Statistical twitter spam detection demystified: performance, stability and scalability
G Lin, N Sun, S Nepal, J Zhang, Y Xiang, H Hassan
IEEE access 5, 11142-11154, 2017
552017
Defining security requirements with the Common Criteria: applications, adoptions, and challenges
N Sun, CT Li, H Chan, BD Le, MD Islam, LY Zhang, MD Islam, ...
IEEE Access 10, 44756 - 44777, 2022
302022
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics
X Mo, Y Zhang, LY Zhang, W Luo, N Sun, S Hu, S Gao, Y Xiang
2024 IEEE Symposium on Security and Privacy (SP), 171-171, 2024
172024
How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond
N Sun, CT Li, H Chan, MZ Islam, MR Islam, W Armstrong
IEEE Access 10 (10.1109/ACCESS.2022.3187211), pp. 71749 - 71763, 2022
172022
Data analytics of crowdsourced resources for cybersecurity intelligence
N Sun, J Zhang, S Gao, LY Zhang, S Camtepe, Y Xiang
Network and System Security: 14th International Conference, NSS 2020 …, 2020
92020
The Frontier of Data Erasure: Machine Unlearning for Large Language Models
Y Qu, M Ding, N Sun, K Thilakarathna, T Zhu, D Niyato
arXiv preprint arXiv:2403.15779, 2024
72024
Advanced Face Anti-Spoofing with Depth Segmentation
L Zhang, N Sun, X Wu, D Luo
2022 International Joint Conference on Neural Networks (IJCNN), 1-6, 2022
72022
Cyber Information Retrieval Through Pragmatics Understanding and Visualization
N Sun, J Zhang, S Gao, LY Zhang, S Camtepe, Y Xiang
IEEE Transactions on Dependable and Secure Computing 20 (2), 1186-1199, 2022
72022
Towards Generalized Deepfake Detection With Continual Learning On Limited New Data
H Huang, N Sun, X Lin, N Moustafa
The 2022 International Conference on Digital Image Computing: Techniques and …, 2022
32022
Blockwise Spectral Analysis for Deepfake Detection in High-fidelity Videos
H Huang, N Sun, X Lin
The 9th IEEE International Conference on Data Science and Advanced Analytics, 2022
32022
DiHAN: A Novel Dynamic Hierarchical Graph Attention Network for Fake News Detection
YT Chang, Z Hu, X Li, S Yang, J Jiang, N Sun
Proceedings of the 33rd ACM International Conference on Information and …, 2024
22024
On the Development of a Protection Profile Module for Encryption Key Management Components
N Sun, CT Li, H Chan, MZ Islam, MR Islam, W Armstrong
IEEE Access 11, 9113-9121, 2023
22023
My Security: An interactive search engine for cybersecurity
N Sun, J Zhang, S Gao, LY Zhang, S Camtepe, Y Xiang
Proceedings of the 54th Hawaii International Conference on System Sciences …, 2021
22021
Effects of Printing Parameters on the Quasi-Static and Dynamic Compression Behaviour of 3D-Printed Re-entrant Auxetic Structures
H Dong, H Wang, PJ Hazell, N Sun, HB Dura, JP Escobedo-Diaz
Thin-Walled Structures, 113000, 2025
2025
Anomaly-Aware Tropical Cyclone Track Prediction Using Multi-Scale Generative Adversarial Networks
H Huang, D Deng, L Hu, N Sun
Remote Sensing 17 (4), 583, 2025
2025
From Principles to Practice: A Deep Dive into AI Ethics and Regulations
N Sun, Y Miao, H Jiang, M Ding, J Zhang
arXiv preprint arXiv:2412.04683, 2024
2024
Enhancing Security in Third-Party Library Reuse--Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis
S Xu, J Dong, W Cai, J Li, A Shaghaghi, N Sun, S Ma
arXiv preprint arXiv:2411.19648, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20