Cong Sun

According to our database1, Cong Sun
  • authored at least 47 papers between 2007 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Distributed Secure Service Composition with Declassification in Mobile Clouds.
Mobile Information Systems, 2017

Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection.
Mobile Information Systems, 2017

Lower bound limit analysis by quadrilateral elements.
J. Computational Applied Mathematics, 2017

Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing.
SCIENCE CHINA Information Sciences, 2017

Certia: Certifying Interface Automata for Cyber-Physical Systems.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Energy-efficient design for non-regenerative MIMO relay networks.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples.
Proceedings of the Computer Security - ESORICS 2017, 2017

Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Data-Oriented Instrumentation against Information Leakages of Android Applications.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Sum Rate Maximization for Non-Regenerative MIMO Relay Networks.
IEEE Trans. Signal Processing, 2016

Distributed Sum Rate Maximization Algorithms for Nonregenerative MIMO Relay Networks.
IEEE Signal Process. Lett., 2016

Measuring the risk value of sensitive dataflow path in Android applications.
Security and Communication Networks, 2016

On the architecture and development life cycle of secure cyber-physical systems.
J. Comm. Inform. Networks, 2016

Distributed Secure Service Composition with Declassification in Mobile Network.
Proceedings of the International Conference on Networking and Network Applications, 2016

Stream selection methods for non-regenerative MIMO relay networks.
Proceedings of the 2016 IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM), 2016

2015
Secure service composition with information flow control in service clouds.
Future Generation Comp. Syst., 2015

Borrowing address from two-hop neighbor to improve successful probability of joining IEEE 802.15.5-based mesh wireless sensor networks.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Sum rate maximization model of non-regenerative multi-stream multi-pair multi-relay network.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Active Semi-supervised Approach for Checking App Behavior against Its Description.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Algorithms for Secrecy Guarantee With Null Space Beamforming in Two-Way Relay Networks.
IEEE Trans. Signal Processing, 2014

Balancing trajectory privacy and data utility using a personalized anonymization model.
J. Network and Computer Applications, 2014

A Novel Mesh Routing Using the Nodes with Identical Tree Level.
IJDSN, 2014

Survey on cooperative strategies for wireless relay channels.
Trans. Emerging Telecommunications Technologies, 2014

Trust-based service composition in multi-domain environments under time constraint.
SCIENCE CHINA Information Sciences, 2014

Automated enforcement for relaxed information release with reference points.
SCIENCE CHINA Information Sciences, 2014

Verifying Secure Interface Composition for Component-Based System Designs.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

2013
TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing.
IEEE Trans. Information Forensics and Security, 2013

Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network.
IJDSN, 2013

Iterative algorithm for secrecy guarantee with null space beamforming in two-way relay networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Service Composition in Multi-domain Environment under Time Constraint.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Low complexity high throughput algorithms for MIMO AF relay networks.
Proceedings of IEEE International Conference on Communications, 2013

Multi-stream sum rate maximization for MIMO af relay networks.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
Low complexity interference alignment algorithms for desired signal power maximization problem of MIMO channels.
EURASIP J. Adv. Sig. Proc., 2012

Low complexity sum rate maximization for single and multiple stream MIMO AF relay networks
CoRR, 2012

Verifying Location-Based Services with Declassification Enforcement.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
A New Enforcement on Declassification with Reachability Analysis
CoRR, 2011

Enforcing Reactive Noninterference with Reachability Analysis.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

A Multi-compositional Enforcement on Information Flow Security.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Fast algorithm for beamforming problems in distributed communication of relay networks.
Proceedings of the IEEE International Conference on Acoustics, 2011

Distributed beamforming with relay-aided interference alignment in fully connected interference network.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

Enforcing Relaxed Declassifications with Reference Points.
Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science, 2011

2010
Secure Information Flow by Model Checking Pushdown System
CoRR, 2010

Secure Information Flow in Java via Reachability Analysis of Pushdown System.
Proceedings of the 10th International Conference on Quality Software, 2010

2009
Hepatocellular carcinomas: Correlation between time to peak hepatocellular carcinomas enhancement and time to peak aortic enhancement.
Comp. Med. Imag. and Graph., 2009

2007
Automated implementation of a design principle during the optimization of conceptual aircraft.
Knowl.-Based Syst., 2007


  Loading...