Degang Sun

According to our database1, Degang Sun authored at least 77 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis.
CoRR, 2024

2023
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance.
CoRR, 2023

AdaptParse: Adaptive Contextual Aware Attention Network for Log Parsing via Word Classification.
Proceedings of the International Joint Conference on Neural Networks, 2023

ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

ABTD-Net: Autonomous Baggage Threat Detection Networks for X-ray Images.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

GHunter: A Fast Subgraph Matching Method for Threat Hunting.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection.
Knowl. Inf. Syst., 2022

On eliminating blocking interference of RFID unauthorized reader detection system.
CoRR, 2022

A novel deep framework for dynamic malware detection based on API sequence intrinsic features.
Comput. Secur., 2022

DMalNet: Dynamic malware analysis based on API feature engineering and graph learning.
Comput. Secur., 2022

Dual attention mechanism network for lung cancer images super-resolution.
Comput. Methods Programs Biomed., 2022

Interference Prediction between LEO Constellations based on A Novel Joint Prediction Model of Atmospheric Attenuation.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

On Eliminating Blocking Interference of RFID Unauthorized Reader Detection.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

R-TDBF: An Environmental Adaptive Method for RFID Redundant Data Filtering.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Rethinking the Misalignment Problem in Dense Object Detection.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Implicit Continuous Authentication Model Based on Mobile Terminal Touch Behavior.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Hierarchical Graph Convolutional Skeleton Transformer for Action Recognition.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

ITAR: A Method for Indoor RFID Trajectory Automatic Recovery.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

2021
SNR-Centric Power Trace Extractors for Side-Channel Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

GCsT: Graph Convolutional Skeleton Transformer for Action Recognition.
CoRR, 2021

Rethinking the Aligned and Misaligned Features in One-stage Object Detection.
CoRR, 2021

EPP-Net: Extreme-Point-Prediction-Based Object Detection.
CoRR, 2021

URTracker: Unauthorized Reader Detection and Localization Using COTS RFID.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Objects as Extreme Points.
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021

Graph Attention Convolutional Network with Motion Tempo Enhancement for Skeleton-Based Action Recognition.
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021

Multi-Modal fake news Detection on Social Media with Dual Attention Fusion Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

FKTAN: Fusion Keystroke Time-Textual Attention Networks for Continuous Authentication.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching.
Proceedings of the International Joint Conference on Neural Networks, 2021

CAAE: A Novel Wireless Spectrum Anomaly Detection Method with Multiple Scoring Criterion.
Proceedings of the 28th International Conference on Telecommunications, 2021

Sprelog: Log-Based Anomaly Detection with Self-matching Networks and Pre-trained Models.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021

A Few-Shot Class-Incremental Learning Approach for Intrusion Detection.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

A Novel Joint Prediction Model of Atmospheric Attenuation for Co-Frequency Interference Analysis Between LEO Constellations.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Density Weighted Diversity Based Query Strategy for Active Learning.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
A Secure Constellation Design for Polarized Modulation in Wireless Communications.
IEEE Access, 2020

A Scale Balanced Loss for Bounding Box Regression.
IEEE Access, 2020

Spectrum Demand Estimation Model for NGSO Communication Systems Considering Time Delay Constraints and Different Spectrum Access Strategies.
Proceedings of the 27th International Conference on Telecommunications, 2020

Terminator: a data-level hybrid framework for intellectual property theft detection and prevention.
Proceedings of the 17th ACM International Conference on Computing Frontiers, 2020

2019
Group Collision Attack.
IEEE Trans. Inf. Forensics Secur., 2019

Cyber Profiles Based Risk Prediction of Application Systems for Effective Access Control.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Risk Prediction for Imbalanced Data in Cyber Security : A Siamese Network-based Deep Learning Classification Framework.
Proceedings of the International Joint Conference on Neural Networks, 2019

An Efficient Anomaly Detection Framework for Electromagnetic Streaming Data.
Proceedings of the 4th International Conference on Big Data and Computing, 2019

2017
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher.
IACR Cryptol. ePrint Arch., 2017

Categorising and Comparing Cluster-Based DPA Distinguishers.
IACR Cryptol. ePrint Arch., 2017

Profiling Good Leakage Models For Masked Implementations.
IACR Cryptol. ePrint Arch., 2017

Manifold Learning Towards Masking Implementations: A First Study.
IACR Cryptol. ePrint Arch., 2017

Towards Easy Key Enumeration.
IACR Cryptol. ePrint Arch., 2017

Towards Optimal Pre-processing in Leakage Detection.
IACR Cryptol. ePrint Arch., 2017

Distinguishing flooding distributed denial of service from flash crowds using four data mining approaches.
Comput. Sci. Inf. Syst., 2017

A Novel Method for Specific Emitter Identification Based on Singular Spectrum Analysis.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Behavior-Based Method for Distinction of Flooding DDoS and Flash Crowds.
Proceedings of the Knowledge Science, Engineering and Management, 2017

A New Mimicking Attack by LSGAN.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017

Could we beat a new mimicking attack?
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

2016
Efficient and anti-interference method of synchronising information extraction for cideo leaking signal.
IET Signal Process., 2016

Method for detecting text information leakage in electromagnetic radiation from a computer display.
IET Inf. Secur., 2016

Double-Key Recovery Based Correlation Power Analysis.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Method for Detecting Information Leakage from Computer Display in Electromagnetic Radiation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Power Traces Clipping and Splicing Enhanced Correlation Collision Analysis.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Uncertain? No, It's Very Certain! - Recovering the Key from Guessing Entropy Enhanced CPA.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Enhanced Correlation Power Analysis by Biasing Power Traces.
Proceedings of the Information Security - 19th International Conference, 2016

A novel wavelet based independent component analysis method for pre-processing computer video leakage signal.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Group Verification Based Multiple-Differential Collision Attack.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

SPLM: Security Protection of Live Virtual Machine Migration in Cloud Computing.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

Error Tolerance based Single Interesting Point Side Channel CPA Distinguisher.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Computer recognition based on the compromising emanations fingerprint.
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016

2015
A Near Field Communication(NFC) Security Model Based on OSI Reference Model.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2015

An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
Classified removable storage medium control based on the access control matrix.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

A low-cost and efficient method of determining the best frequency band for video leaking signal reconstruction.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Electromagnetic Radiation.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

A novel method for computer video leaking signal detection.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2007
New Solutions for Cell Phone Detection.
Proceedings of the First International Conference on the Digital Society (ICDS 2007), 2007


  Loading...