Cong Sun
Orcid: 0000-0001-9116-2694Affiliations:
- Xidian University, School of Cyber Engineering, Xi'an, China
- Peking University, School of Electronics Engineering and Computer Science, Institute of Software, China (PhD 2011)
According to our database1,
Cong Sun
authored at least 67 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Survey on Security of Unmanned Aerial Vehicle Systems: Attacks and Countermeasures.
IEEE Internet Things J., November, 2024
LICAPA: Lightweight collective attestation for physical attacks detection in highly dynamic networks.
Pervasive Mob. Comput., 2024
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio.
J. Syst. Archit., 2024
2023
CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis.
IET Inf. Secur., July, 2023
IET Inf. Secur., January, 2023
μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code.
IEEE Trans. Dependable Secur. Comput., 2023
LibScan: Towards More Precise Third-Party Library Identification for Android Applications.
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
Remote. Sens., 2022
Remote. Sens., 2022
CoRR, 2022
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the CC '22: 31st ACM SIGPLAN International Conference on Compiler Construction, Seoul, South Korea, April 2, 2022
2021
CryptoEval: Evaluating the Risk of Cryptographic Misuses in Android Apps with Data-Flow Analysis.
CoRR, 2021
Information flow based defensive chain for data leakage detection and prevention: a survey.
CoRR, 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Delica: Decentralized Lightweight Collective Attestation for Disruptive IoT Networks.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2019
Wirel. Networks, 2019
计算机科学, 2019
Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments.
Entropy, 2019
IEEE Access, 2019
Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds.
Proceedings of the 18th IEEE International Conference On Trust, 2019
CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
J. Supercomput., 2018
J. Inf. Sci. Eng., 2018
Information flow control on encrypted data for service composition among multiple clouds.
Distributed Parallel Databases, 2018
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
2017
Mob. Inf. Syst., 2017
Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection.
Mob. Inf. Syst., 2017
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing.
Sci. China Inf. Sci., 2017
Sci. China Inf. Sci., 2017
IEEE Access, 2017
IEEE Access, 2017
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017
Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds.
Proceedings of the International Conference on Networking and Network Applications, 2017
Proceedings of the International Conference on Networking and Network Applications, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
2016
Secur. Commun. Networks, 2016
J. Commun. Inf. Networks, 2016
Proceedings of the International Conference on Networking and Network Applications, 2016
Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags.
Proceedings of the 3rd ACM Workshop on Mobile Sensing, Computing and Communication, 2016
2015
Future Gener. Comput. Syst., 2015
CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
2014
Balancing trajectory privacy and data utility using a personalized anonymization model.
J. Netw. Comput. Appl., 2014
Sci. China Inf. Sci., 2014
Sci. China Inf. Sci., 2014
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2013
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013
Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013
2012
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012
2011
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science, 2011
2010
Proceedings of the 10th International Conference on Quality Software, 2010