Follow
Cong Sun
Title
Cited by
Cited by
Year
A novel dynamic android malware detection system with ensemble learning
P Feng, J Ma, C Sun, X Xu, Y Ma
IEEE Access 6, 30996-31011, 2018
2522018
TrPF: A trajectory privacy-preserving framework for participatory sensing
S Gao, J Ma, W Shi, G Zhan, C Sun
IEEE Transactions on Information Forensics and Security 8 (6), 874-887, 2013
2052013
Balancing trajectory privacy and data utility using a personalized anonymization model
S Gao, J Ma, C Sun, X Li
Journal of Network and Computer Applications 38, 125-134, 2014
1092014
Vurle: Automatic vulnerability detection and repair by learning from examples
S Ma, F Thung, D Lo, C Sun, RH Deng
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
1052017
A privacy-preserving mutual authentication resisting DoS attacks in VANETs
C Sun, J Liu, X Xu, J Ma
IEEE Access 5, 24012-24022, 2017
742017
Active Semi-supervised Approach for Checking App Behavior against Its Description
S Ma, S Wang, D Lo, RH Deng, C Sun
Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th …, 2015
492015
Refining Indirect Call Targets at the Binary Level.
SH Kim, C Sun, D Zeng, G Tan
NDSS, 2021
482021
DeepCatra: Learning flow‐and graph‐based behaviours for Android malware detection
Y Wu, J Shi, P Wang, D Zeng, C Sun
IET Information Security 17 (1), 118-130, 2023
422023
DAPV: Diagnosing anomalies in MANETs routing with provenance and verification
T Li, J Ma, Q Pei, H Song, Y Shen, C Sun
IEEE Access 7, 35302-35316, 2019
382019
Secure service composition with information flow control in service clouds
N Xi, C Sun, J Ma, Y Shen
Future Generation Computer Systems 49, 142-148, 2015
372015
Recfa: Resilient control-flow attestation
Y Zhang, X Liu, C Sun, D Zeng, G Tan, X Kan, S Ma
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
342021
Control parameters considered harmful: Detecting range specification bugs in drone configuration modules via learning-guided search
R Han, C Yang, S Ma, JF Ma, C Sun, J Li, E Bertino
Proceedings of the 44th International Conference on Software Engineering …, 2022
302022
SRDPV: secure route discovery and privacy-preserving verification in MANETs
T Li, JF Ma, C Sun
Wireless Networks 25, 1731-1747, 2019
272019
Dlog: diagnosing router events with syslogs for anomaly detection
T Li, JF Ma, C Sun
The Journal of Supercomputing 74, 845-867, 2018
212018
Trust-based service composition in multi-domain environments under time constraint
T Zhang, JF Ma, Q Li, N Xi, C Sun
Science China Information Sciences 57, 1-16, 2014
172014
Secure information flow by model checking pushdown system
C Sun, L Tang, Z Chen
2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing …, 2009
172009
Service composition in multi-domain environment under time constraint
T Zhang, J Ma, C Sun, Q Li, N Xi
2013 IEEE 20th International Conference on Web Services, 227-234, 2013
162013
A multi-compositional enforcement on information flow security
C Sun, E Zhai, Z Chen, J Ma
International Conference on Information and Communications Security, 345-359, 2011
152011
LibScan: Towards More Precise Third-Party Library Identification for Android Applications
Y Wu, C Sun, D Zeng, G Tan, S Ma, P Wang
32nd USENIX Security Symposium (USENIX Security 23), 3385-3402, 2023
142023
Fine with “1234”? An analysis of SMS one-Time password randomness in android apps
S Ma, J Li, H Kim, E Bertino, S Nepal, D Ostry, C Sun
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
142021
The system can't perform the operation now. Try again later.
Articles 1–20