Ruimin Sun

Orcid: 0000-0003-2940-5549

According to our database1, Ruimin Sun authored at least 31 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice.
Proceedings of the 33rd USENIX Security Symposium, 2024

SHiFT: Semi-hosted Fuzz Testing for Embedded Applications.
Proceedings of the 33rd USENIX Security Symposium, 2024

On the Feasibility of Detecting Model Poisoning Attacks in Real-time ML-based ICS.
Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security, 2024

2023
Sparse Reconstruction of Sound Field Using Bayesian Compressive Sensing and Equivalent Source Method.
Sensors, 2023

Introduction to the Special Issue on Memory-Based Malware and Other Unconventional Threats.
DTRAP, 2023

Decentralizing Cyber Physical Systems for Resilience: An Innovative Case Study from A Cybersecurity Perspective.
Comput. Secur., 2023

Privacy-Preserving Oriented Design for Multi-Modality Models using FL.
Proceedings of the 5th IEEE International Conference on Trust, 2023

ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Unsafe Behavior Detection with Adaptive Contrastive Learning in Industrial Control Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

The Case for Virtual PLC-enabled Honeypot Design.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2022
Learning Fast and Slow: Propedeutica for Real-Time Malware Detection.
IEEE Trans. Neural Networks Learn. Syst., 2022

A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation.
IEEE Trans. Dependable Secur. Comput., 2022

Online Binary Models are Promising for Distinguishing Temporally Consistent Computer Usage Profiles.
IEEE Trans. Biom. Behav. Identity Sci., 2022

"Ghost" and Attention in Binary Neural Network.
IEEE Access, 2022

D-Box: DMA-enabled Compartmentalization for Embedded Applications.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
Computer Users Have Unique Yet Temporally Inconsistent Computer Usage Profiles.
CoRR, 2021

Challenges and pitfalls in malware research.
Comput. Secur., 2021

Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps.
Proceedings of the 30th USENIX Security Symposium, 2021

SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
ShadowNet: A Secure and Efficient System for On-device Model Inference.
CoRR, 2020

Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps.
CoRR, 2020

MITOS: Optimal Decisioning for the Indirect Flow Propagation Dilemma in Dynamic Information Flow Tracking Systems.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2018
Leveraging Uncertainty for Effective Malware Mitigation.
CoRR, 2018

2017
The dose makes the poison - Leveraging uncertainty for effective malware detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
Bear: A Framework for Understanding Application Sensitivity to OS (Mis) Behavior.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

2015
The Case for Unpredictability and Deception as OS Features.
login Usenix Mag., 2015

The Case for Less Predictable Operating System Behavior.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

2014
TAMeBS: A sensitive bisulfite-sequencing read mapping tool for DNA methylation analysis.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014

2012
Two combinatorial optimization problems for SNP discovery using base-specific cleavage and mass spectrometry.
BMC Syst. Biol., 2012

Accurate detection of SNPs using base-specific cleavage and mass spectrometry.
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine, 2012

2011
Approximating the double-cut-and-join distance between unsigned genomes.
BMC Bioinform., 2011


  Loading...