دنبال کردن
Cong Sun
عنوان
نقل شده توسط
نقل شده توسط
سال
A novel dynamic android malware detection system with ensemble learning
P Feng, J Ma, C Sun, X Xu, Y Ma
IEEE Access 6, 30996-31011, 2018
2522018
TrPF: A trajectory privacy-preserving framework for participatory sensing
S Gao, J Ma, W Shi, G Zhan, C Sun
IEEE Transactions on Information Forensics and Security 8 (6), 874-887, 2013
2042013
Balancing trajectory privacy and data utility using a personalized anonymization model
S Gao, J Ma, C Sun, X Li
Journal of Network and Computer Applications 38, 125-134, 2014
1092014
Vurle: Automatic vulnerability detection and repair by learning from examples
S Ma, F Thung, D Lo, C Sun, RH Deng
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
1062017
A privacy-preserving mutual authentication resisting DoS attacks in VANETs
C Sun, J Liu, X Xu, J Ma
IEEE Access 5, 24012-24022, 2017
752017
Active Semi-supervised Approach for Checking App Behavior against Its Description
S Ma, S Wang, D Lo, RH Deng, C Sun
Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th …, 2015
492015
Refining Indirect Call Targets at the Binary Level.
SH Kim, C Sun, D Zeng, G Tan
NDSS, 2021
472021
DeepCatra: Learning flow‐and graph‐based behaviours for Android malware detection
Y Wu, J Shi, P Wang, D Zeng, C Sun
IET Information Security 17 (1), 118-130, 2023
462023
DAPV: Diagnosing anomalies in MANETs routing with provenance and verification
T Li, J Ma, Q Pei, H Song, Y Shen, C Sun
IEEE Access 7, 35302-35316, 2019
372019
Secure service composition with information flow control in service clouds
N Xi, C Sun, J Ma, Y Shen
Future Generation Computer Systems 49, 142-148, 2015
372015
Recfa: Resilient control-flow attestation
Y Zhang, X Liu, C Sun, D Zeng, G Tan, X Kan, S Ma
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
362021
Control parameters considered harmful: Detecting range specification bugs in drone configuration modules via learning-guided search
R Han, C Yang, S Ma, JF Ma, C Sun, J Li, E Bertino
Proceedings of the 44th International Conference on Software Engineering …, 2022
322022
SRDPV: secure route discovery and privacy-preserving verification in MANETs
T Li, JF Ma, C Sun
Wireless Networks 25, 1731-1747, 2019
262019
Dlog: diagnosing router events with syslogs for anomaly detection
T Li, JF Ma, C Sun
The Journal of Supercomputing 74, 845-867, 2018
212018
Trust-based service composition in multi-domain environments under time constraint
T Zhang, JF Ma, Q Li, N Xi, C Sun
Science China Information Sciences 57, 1-16, 2014
172014
Service composition in multi-domain environment under time constraint
T Zhang, J Ma, C Sun, Q Li, N Xi
2013 IEEE 20th International Conference on Web Services, 227-234, 2013
162013
Secure information flow by model checking pushdown system
C Sun, L Tang, Z Chen
2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing …, 2009
162009
LibScan: Towards More Precise Third-Party Library Identification for Android Applications
Y Wu, C Sun, D Zeng, G Tan, S Ma, P Wang
32nd USENIX Security Symposium (USENIX Security 23), 3385-3402, 2023
152023
A multi-compositional enforcement on information flow security
C Sun, E Zhai, Z Chen, J Ma
International Conference on Information and Communications Security, 345-359, 2011
152011
Fine with “1234”? An analysis of SMS one-Time password randomness in android apps
S Ma, J Li, H Kim, E Bertino, S Nepal, D Ostry, C Sun
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
142021
سیستم در حال حاضر قادر به انجام عملکرد نیست. بعداً دوباره امتحان کنید.
مقاله‌ها 1–20