Data-driven cybersecurity incident prediction: A survey N Sun, J Zhang, P Rimba, S Gao, LY Zhang, Y Xiang IEEE Communications Surveys & Tutorials 21 (2), 1744-1772, 2019 | 367 | 2019 |
Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives N Sun, M Ding, J Jiang, W Xu, X Mo, Y Tai, J Zhang IEEE Communications Surveys & Tutorials 25 (3), 1748-1774, 2023 | 162 | 2023 |
Near real-time twitter spam detection with machine learning techniques N Sun, G Lin, J Qiu, P Rimba International Journal of Computers and Applications 44 (4), 338-348, 2020 | 80 | 2020 |
Statistical twitter spam detection demystified: performance, stability and scalability G Lin, N Sun, S Nepal, J Zhang, Y Xiang, H Hassan IEEE access 5, 11142-11154, 2017 | 55 | 2017 |
Defining security requirements with the Common Criteria: applications, adoptions, and challenges N Sun, CT Li, H Chan, BD Le, MD Islam, LY Zhang, MD Islam, ... IEEE Access 10, 44756 - 44777, 2022 | 30 | 2022 |
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics X Mo, Y Zhang, LY Zhang, W Luo, N Sun, S Hu, S Gao, Y Xiang 2024 IEEE Symposium on Security and Privacy (SP), 171-171, 2024 | 17 | 2024 |
How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond N Sun, CT Li, H Chan, MZ Islam, MR Islam, W Armstrong IEEE Access 10 (10.1109/ACCESS.2022.3187211), pp. 71749 - 71763, 2022 | 17 | 2022 |
Data analytics of crowdsourced resources for cybersecurity intelligence N Sun, J Zhang, S Gao, LY Zhang, S Camtepe, Y Xiang Network and System Security: 14th International Conference, NSS 2020 …, 2020 | 9 | 2020 |
The Frontier of Data Erasure: Machine Unlearning for Large Language Models Y Qu, M Ding, N Sun, K Thilakarathna, T Zhu, D Niyato arXiv preprint arXiv:2403.15779, 2024 | 7 | 2024 |
Advanced Face Anti-Spoofing with Depth Segmentation L Zhang, N Sun, X Wu, D Luo 2022 International Joint Conference on Neural Networks (IJCNN), 1-6, 2022 | 7 | 2022 |
Cyber Information Retrieval Through Pragmatics Understanding and Visualization N Sun, J Zhang, S Gao, LY Zhang, S Camtepe, Y Xiang IEEE Transactions on Dependable and Secure Computing 20 (2), 1186-1199, 2022 | 7 | 2022 |
Towards Generalized Deepfake Detection With Continual Learning On Limited New Data H Huang, N Sun, X Lin, N Moustafa The 2022 International Conference on Digital Image Computing: Techniques and …, 2022 | 3 | 2022 |
Blockwise Spectral Analysis for Deepfake Detection in High-fidelity Videos H Huang, N Sun, X Lin The 9th IEEE International Conference on Data Science and Advanced Analytics, 2022 | 3 | 2022 |
DiHAN: A Novel Dynamic Hierarchical Graph Attention Network for Fake News Detection YT Chang, Z Hu, X Li, S Yang, J Jiang, N Sun Proceedings of the 33rd ACM International Conference on Information and …, 2024 | 2 | 2024 |
On the Development of a Protection Profile Module for Encryption Key Management Components N Sun, CT Li, H Chan, MZ Islam, MR Islam, W Armstrong IEEE Access 11, 9113-9121, 2023 | 2 | 2023 |
My Security: An interactive search engine for cybersecurity N Sun, J Zhang, S Gao, LY Zhang, S Camtepe, Y Xiang Proceedings of the 54th Hawaii International Conference on System Sciences …, 2021 | 2 | 2021 |
Effects of Printing Parameters on the Quasi-Static and Dynamic Compression Behaviour of 3D-Printed Re-entrant Auxetic Structures H Dong, H Wang, PJ Hazell, N Sun, HB Dura, JP Escobedo-Diaz Thin-Walled Structures, 113000, 2025 | | 2025 |
Anomaly-Aware Tropical Cyclone Track Prediction Using Multi-Scale Generative Adversarial Networks H Huang, D Deng, L Hu, N Sun Remote Sensing 17 (4), 583, 2025 | | 2025 |
From Principles to Practice: A Deep Dive into AI Ethics and Regulations N Sun, Y Miao, H Jiang, M Ding, J Zhang arXiv preprint arXiv:2412.04683, 2024 | | 2024 |
Enhancing Security in Third-Party Library Reuse--Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis S Xu, J Dong, W Cai, J Li, A Shaghaghi, N Sun, S Ma arXiv preprint arXiv:2411.19648, 2024 | | 2024 |