Xiaoyan Sun

Orcid: 0000-0002-0321-2338

Affiliations:
  • Worcester Polytechnic Institute, Worcester, MA, USA
  • California State University, Sacramento, CA, USA (former)
  • Pennsylvania State University, PA, USA (Phd)


According to our database1, Xiaoyan Sun authored at least 37 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Using Explainable AI for Neural Network-Based Network Attack Detection.
Computer, May, 2024

Analysis of neural network detectors for network attacks.
J. Comput. Secur., 2024

Enabling Practical and Privacy-Preserving Image Processing.
CoRR, 2024

HuntFUZZ: Enhancing Error Handling Testing through Clustering Based Fuzzing.
CoRR, 2024

SQLaser: Detecting DBMS Logic Bugs with Clause-Guided Fuzzing.
CoRR, 2024

Exploring Scalable Bayesian Networks For Identification of Zero-day Attack Paths.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024

Evaluating Large Language Models for Real-World Vulnerability Repair in C/C++ Code.
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, 2024

2023
Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Identifying Superspreaders by Ranking System Object Instance Graphs.
Proceedings of the Advances in Digital Forensics XIX, 2023

Early Rumor Detection in Social Media Based on Graph Convolutional Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Using Blockchain for Decentralized Artificial Intelligence with Data Privacy.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

2022
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach.
J. Comput. Secur., 2022

Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022

Attacks on ML Systems: From Security Analysis to Attack Mitigation.
Proceedings of the Information Systems Security - 18th International Conference, 2022

Game Theory Approaches for Evaluating the Deception-based Moving Target Defense.
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022

2021
Deep Learning for Detecting Network Attacks: An End-to-End Approach.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

2020
Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks.
CoRR, 2020

An Approach for Detection of Advanced Persistent Threat Attacks.
Computer, 2020

What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020

Fingerprinting-based Indoor and Outdoor Localization with LoRa and Deep Learning.
Proceedings of the IEEE Global Communications Conference, 2020

Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020

2018
Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths.
IEEE Trans. Inf. Forensics Secur., 2018

Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud.
EAI Endorsed Trans. Security Safety, 2018

Toward Cyberresiliency in the Context of Cloud Computing [Resilient Security].
IEEE Secur. Priv., 2018

A Mobile Botnet That Meets Up at Twitter.
Proceedings of the Security and Privacy in Communication Networks, 2018

Don't Be Surprised: I See Your Mobile App Stealing Your Data.
Proceedings of the 2018 International Conference on Computing, 2018

Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

2017
Enterprise-Level Cyber Situation Awareness.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

Towards Actionable Mission Impact Assessment in the Context of Cloud Computing.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

2016
Towards probabilistic identification of zero-day attack paths.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Who Touched My Mission: Towards Probabilistic Mission Impact Assessment.
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015

2014
Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies.
Proceedings of the Computer Security - ESORICS 2013, 2013

SKRM: Where security techniques talk to each other.
Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2013

2012
Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2009
Performance analysis of inter-vehicle communications in multilane traffic streams.
Proceedings of the IEEE Vehicular Networking Conference, 2009


  Loading...