Cong Sun

According to our database1, Cong Sun authored at least 42 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
SRDPV: secure route discovery and privacy-preserving verification in MANETs.
Wireless Networks, 2019

DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification.
IEEE Access, 2019

Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Dlog: diagnosing router events with syslogs for anomaly detection.
The Journal of Supercomputing, 2018

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
J. Inf. Sci. Eng., 2018

Information flow control on encrypted data for service composition among multiple clouds.
Distributed and Parallel Databases, 2018

Ridra: A Rigorous Decentralized Randomized Authentication in VANETs.
IEEE Access, 2018

A Novel Dynamic Android Malware Detection System With Ensemble Learning.
IEEE Access, 2018

Anomalies Detection of Routers Based on Multiple Information Learning.
Proceedings of the International Conference on Networking and Network Applications, 2018

Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Distributed Secure Service Composition with Declassification in Mobile Clouds.
Mobile Information Systems, 2017

Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection.
Mobile Information Systems, 2017

Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing.
SCIENCE CHINA Information Sciences, 2017

NetPro: detecting attacks in MANET routing with provenance and verification.
SCIENCE CHINA Information Sciences, 2017

A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs.
IEEE Access, 2017

Building a Secure Scheme for a Trusted Hardware Sharing Environment.
IEEE Access, 2017

Certia: Certifying Interface Automata for Cyber-Physical Systems.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds.
Proceedings of the International Conference on Networking and Network Applications, 2017

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017

VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples.
Proceedings of the Computer Security - ESORICS 2017, 2017

Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Data-Oriented Instrumentation against Information Leakages of Android Applications.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Measuring the risk value of sensitive dataflow path in Android applications.
Security and Communication Networks, 2016

On the architecture and development life cycle of secure cyber-physical systems.
J. Comm. Inform. Networks, 2016

Distributed Secure Service Composition with Declassification in Mobile Network.
Proceedings of the International Conference on Networking and Network Applications, 2016

Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags.
Proceedings of the 3rd ACM Workshop on Mobile Sensing, Computing and Communication, 2016

2015
Secure service composition with information flow control in service clouds.
Future Generation Comp. Syst., 2015

CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Active Semi-supervised Approach for Checking App Behavior against Its Description.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Balancing trajectory privacy and data utility using a personalized anonymization model.
J. Network and Computer Applications, 2014

Trust-based service composition in multi-domain environments under time constraint.
SCIENCE CHINA Information Sciences, 2014

Automated enforcement for relaxed information release with reference points.
SCIENCE CHINA Information Sciences, 2014

Verifying Secure Interface Composition for Component-Based System Designs.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

2013
TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing.
IEEE Trans. Information Forensics and Security, 2013

Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network.
IJDSN, 2013

Service Composition in Multi-domain Environment under Time Constraint.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

2012
Verifying Location-Based Services with Declassification Enforcement.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
Enforcing Reactive Noninterference with Reachability Analysis.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

A Multi-compositional Enforcement on Information Flow Security.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Enforcing Relaxed Declassifications with Reference Points.
Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science, 2011

2010
Secure Information Flow in Java via Reachability Analysis of Pushdown System.
Proceedings of the 10th International Conference on Quality Software, 2010


  Loading...