Degang Sun
Orcid: 0009-0008-8701-0848
According to our database1,
Degang Sun
authored at least 87 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Neural Networks, 2024
Inf. Sci., 2024
Mitigating the Impact of Malware Evolution on API Sequence-based Windows Malware Detector.
CoRR, 2024
Video Behavior Recognition Model Based on Spatial Long-Distance Modeling Combined With Time-Domain Shift.
IEEE Access, 2024
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
IAD-Net: Multivariate KPIs Interpretable Anomaly Detection with Dual Gated Residual Fusion Networks.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
AdaptParse: Adaptive Contextual Aware Attention Network for Log Parsing via Word Classification.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection.
Knowl. Inf. Syst., 2022
CoRR, 2022
A novel deep framework for dynamic malware detection based on API sequence intrinsic features.
Comput. Secur., 2022
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning.
Comput. Secur., 2022
Comput. Methods Programs Biomed., 2022
Interference Prediction between LEO Constellations based on A Novel Joint Prediction Model of Atmospheric Attenuation.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022
2021
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021
CoRR, 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021
Graph Attention Convolutional Network with Motion Tempo Enhancement for Skeleton-Based Action Recognition.
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
FKTAN: Fusion Keystroke Time-Textual Attention Networks for Continuous Authentication.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching.
Proceedings of the International Joint Conference on Neural Networks, 2021
CAAE: A Novel Wireless Spectrum Anomaly Detection Method with Multiple Scoring Criterion.
Proceedings of the 28th International Conference on Telecommunications, 2021
Sprelog: Log-Based Anomaly Detection with Self-matching Networks and Pre-trained Models.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
A Novel Joint Prediction Model of Atmospheric Attenuation for Co-Frequency Interference Analysis Between LEO Constellations.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
2020
Parallel spatial-temporal convolutional neural networks for anomaly detection and location in crowded scenes.
J. Vis. Commun. Image Represent., 2020
IEEE Access, 2020
Spectrum Demand Estimation Model for NGSO Communication Systems Considering Time Delay Constraints and Different Spectrum Access Strategies.
Proceedings of the 27th International Conference on Telecommunications, 2020
Terminator: a data-level hybrid framework for intellectual property theft detection and prevention.
Proceedings of the 17th ACM International Conference on Computing Frontiers, 2020
2019
Cyber Profiles Based Risk Prediction of Application Systems for Effective Access Control.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Risk Prediction for Imbalanced Data in Cyber Security : A Siamese Network-based Deep Learning Classification Framework.
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the 4th International Conference on Big Data and Computing, 2019
2017
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Distinguishing flooding distributed denial of service from flash crowds using four data mining approaches.
Comput. Sci. Inf. Syst., 2017
A Novel Method for Specific Emitter Identification Based on Singular Spectrum Analysis.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Knowledge Science, Engineering and Management, 2017
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017
2016
Efficient and anti-interference method of synchronising information extraction for cideo leaking signal.
IET Signal Process., 2016
Method for detecting text information leakage in electromagnetic radiation from a computer display.
IET Inf. Secur., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Method for Detecting Information Leakage from Computer Display in Electromagnetic Radiation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Uncertain? No, It's Very Certain! - Recovering the Key from Guessing Entropy Enhanced CPA.
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the Information Security - 19th International Conference, 2016
A novel wavelet based independent component analysis method for pre-processing computer video leakage signal.
Proceedings of the IEEE Symposium on Computers and Communication, 2016
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
2014
Proceedings of the 2nd International Conference on Systems and Informatics, 2014
A low-cost and efficient method of determining the best frequency band for video leaking signal reconstruction.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014
Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Electromagnetic Radiation.
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014
2007
Proceedings of the First International Conference on the Digital Society (ICDS 2007), 2007