Kun Sun
Orcid: 0000-0003-4152-2107Affiliations:
- George Mason University, Department of Information Sciences and Technology, Fairfax, VA, USA
- College of William and Mary, Department of Computer Science, Williamsburg, VA, USA (former)
- Intelligent Automation Inc., Rockville, MD, USA (former)
- North Carolina State University, Department of Computer Science, Raleigh, NC, USA (PhD)
According to our database1,
Kun Sun
authored at least 141 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cs.wm.edu
-
on csis.gmu.edu
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE/ACM Trans. Netw., February, 2024
IEEE Trans. Dependable Secur. Comput., 2024
2023
IEEE/ACM Trans. Netw., June, 2023
IEEE Trans. Dependable Secur. Comput., 2023
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning.
CoRR, 2023
Having Difficulty Understanding Manuals? Automatically Converting User Manuals into Instructional Videos.
CoRR, 2023
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
CoRR, 2023
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks.
CoRR, 2023
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
Proceedings of the 10th ACM Workshop on Moving Target Defense, 2023
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
2022
IEEE/ACM Trans. Netw., 2022
IEEE/ACM Trans. Netw., 2022
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Future Gener. Comput. Syst., 2022
Comput. Secur., 2022
Understanding the Practice of Security Patch Management across Multiple Branches in OSS Projects.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
An Investigation on Data Center Cooling Systems Using FPGA-based Temperature Side Channels.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the IFIP Networking Conference, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks.
Proceedings of the IEEE INFOCOM 2022, 2022
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Remotely controlling TrustZone applications?: a study on securely and resiliently receiving remote commands.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
TrustICT: an efficient trusted interaction interface between isolated execution domains on ARM multi-core processors.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020
SGX-Cube: An SGX-Enhanced Single Sign-On System Against Server-Side Credential Leakage.
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020
2019
EAI Endorsed Trans. Security Safety, 2019
Comput. Secur., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Federated-Cloud Based Deep Neural Networks with Privacy Preserving Image Filtering Techniques.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes.
Comput. Commun., 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
A study of personal information in human-chosen passwords and its security implications.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014
Proceedings of the Secure Cloud Computing, 2014
2013
Wirel. Pers. Commun., 2013
Proceedings of the 32th IEEE Military Communications Conference, 2013
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
2012
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011
Proceedings of the MILCOM 2011, 2011
CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
2007
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
2006
IEEE J. Sel. Areas Commun., 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
IEEE Trans. Dependable Secur. Comput., 2005
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols.
Ad Hoc Networks, 2005
2003
How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols.
Proceedings of the IEEE Systems, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003