Kun Sun

According to our database1, Kun Sun
  • authored at least 103 papers between 1993 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Improving Separability of Structures with Similar Attributes in 2D Transfer Function Design.
IEEE Trans. Vis. Comput. Graph., 2017

Personal Information in Passwords and Its Security Implications.
IEEE Trans. Information Forensics and Security, 2017

Improving Spatial Coverage for Aqua MODIS AOD using NDVI-Based Multi-Temporal Regression Analysis.
Remote Sensing, 2017

High Resolution Aerosol Optical Depth Retrieval Using Gaofen-1 WFV Camera Data.
Remote Sensing, 2017

Image Matching via Feature Fusion and Coherent Constraint.
IEEE Geosci. Remote Sensing Lett., 2017

FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes.
Computer Communications, 2017

BSviewer: a genotype-preserving, nucleotide-level visualizer for bisulfite sequencing data.
Bioinformatics, 2017

Vibration Suppression of an Axially Moving System with Restrained Boundary Tension.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

A High Accurate Vision Algorithm on Measuring Arbitrary Contour.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Protecting web contents against persistent distributed crawlers.
Proceedings of the IEEE International Conference on Communications, 2017

A measurement study on Amazon wishlist and its privacy exposure.
Proceedings of the IEEE International Conference on Communications, 2017

JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

SPEAKER: Split-Phase Execution of Application Containers.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Vulnerable Implicit Service: A Revisit.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Massively Parallel Image Index for Vocabulary Tree Based Image Retrieval.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

GPU Accelerated Image Matching with Cascade Hashing.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

2016
Pedestrian detection aided by fusion of binocular information.
Pattern Recognition, 2016

Progressive match expansion via coherent subspace constraint.
Inf. Sci., 2016

Toward Sensor-Based Random Number Generation for Mobile and IoT Devices.
IEEE Internet of Things Journal, 2016

TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices.
IACR Cryptology ePrint Archive, 2016

A LTPS-TFT pixel circuit for active matrix organic light emitting diode based on improved current mirror.
Displays, 2016

Trilaminar Multiway Reconstruction Tree for Efficient Large Scale Structure from Motion.
CoRR, 2016

4D Cardiac Ultrasound Standard Plane Location by Spatial-Temporal Correlation.
CoRR, 2016

Mixed-type solitons and soliton interaction for the (2+1)-dimensional two-component long wave-short wave resonance interaction equations in a two-layer fluid through the Bell polynomials.
Appl. Math. Lett., 2016

CaSE: Cache-Assisted Secure Execution on ARM Processors.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

DESIR: Decoy-enhanced seamless IP randomization.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A study of personal information in human-chosen passwords and its security implications.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Congenital heart disease (CHD) discrimination in fetal echocardiogram based on 3D feature fusion.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Amnesia: A Bilateral Generative Password Manager.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

CacheKit: Evading Memory Introspection Using Cache Incoherence.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Robust Point Sets Matching by Fusing Feature and Spatial Information Using Nonuniform Gaussian Mixture Models.
IEEE Trans. Image Processing, 2015

SaCoseg: Object Cosegmentation by Shape Conformability.
IEEE Trans. Image Processing, 2015

Reliable and Trustworthy Memory Acquisition on Smartphones.
IEEE Trans. Information Forensics and Security, 2015

Multi-source broadcast authentication with Combined Key Chains for wireless ad hoc networks.
Security and Communication Networks, 2015

Feature Guided Biased Gaussian Mixture Model for image matching.
Inf. Sci., 2015

Bright and dark soliton solutions and Bäcklund transformation for the Eckhaus-Kundu equation with the cubic-quintic nonlinearity.
Applied Mathematics and Computation, 2015

PmDroid: Permission Supervision for Android Advertising.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

Using Hardware Features for Increased Debugging Transparency.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Now You See Me: Hide and Seek in Physical Address Space.
Proceedings of the 10th ACM Symposium on Information, 2015

TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Development of bioinformatics platforms for methylome and transcriptome data analysis.
PhD thesis, 2014

HyperCheck: A Hardware-AssistedIntegrity Monitor.
IEEE Trans. Dependable Sec. Comput., 2014

Spatial adjacent bag of features with multiple superpixels for object segmentation and classification.
Inf. Sci., 2014

Protecting Enterprise Networks through Attack Surface Expansion.
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014

TrustDump: Reliable Memory Acquisition on Smartphones.
Proceedings of the Computer Security - ESORICS 2014, 2014

Point Sets Matching by Feature-Aware Mixture Point Matching Algorithm.
Proceedings of the Energy Minimization Methods in Computer Vision and Pattern Recognition, 2014

Asymmetrical Gauss Mixture Models for Point Sets Matching.
Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition, 2014

Remotely wiping sensitive data on stolen smartphones.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

MTD 2014: First ACM Workshop on Moving Target Defense.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Cloud-based user authentication with geo-temporal queries on smartphones.
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014

The Online Diagnosis System for sanger sequencing based genetic testing.
Proceedings of the International Conference on Big Data and Smart Computing, BIGCOMP 2014, 2014

Proof of Isolation for Cloud Storage.
Proceedings of the Secure Cloud Computing, 2014

2013
Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications.
Wireless Personal Communications, 2013

YY1TargetDB: an integral information resource for Yin Yang 1 target loci.
Database, 2013

Soliton solutions and integrability for the generalized variable-coefficient extended Korteweg-de Vries equation in fluids.
Appl. Math. Lett., 2013

A Security Analysis of Two Commercial Browser and Cloud Based Password Managers.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Reducing Attack Surface with VM-Based Phantom Server.
Proceedings of the 32th IEEE Military Communications Conference, 2013

On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties.
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013

MOTAG: Moving Target Defense against Internet Denial of Service Attacks.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

SPECTRE: A dependable introspection framework via System Management Mode.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

TerraCheck: Verification of Dedicated Cloud Storage.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

A moving target defense mechanism for MANETs based on identity virtualization.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Effectiveness of IP address randomization in decoy-based moving target defense.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

Verification of data redundancy in cloud storage.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Hardware-Assisted Application Integrity Monitor.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Disk storage isolation and verification in cloud.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A dependability analysis of hardware-assisted polling integrity checking systems.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

NetGator: Malware Detection Using Program Interactive Challenges.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

2011
Secure Time Synchronization.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Vascular Active Contour for Vessel Tree Segmentation.
IEEE Trans. Biomed. Engineering, 2011

Soliton solutions and Bäcklund transformation for the complex Ginzburg-Landau equation.
Applied Mathematics and Computation, 2011

Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

A Self-shielding Dynamic Network Architecture.
Proceedings of the MILCOM 2011, 2011

Automatic security analysis using security metrics.
Proceedings of the MILCOM 2011, 2011

A New Method for Passive Millimeter Wave Image Registration by Applying Super Resolution.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Genome-wide identification of TF-miRNA regulatory networks in myogenesis.
Proceedings of the 2011 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2011

2010
Symbolic-Computation Study on the (2+1)-Dimensional Dispersive Long Wave System.
SIAM Journal of Applied Mathematics, 2010

2009
High-resolution cross-estimation channel modelling method and experimental results on broadband mobile communication in urban rich-scattering environment.
Science in China Series F: Information Sciences, 2009

Securing network access in wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

A SNMPv3 Replay Protection Scheme Used in Space Network Based on Random Number.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2008
Computer-aided recognition of a four-chamber image plane in three-dimensional echocardiographic images of children.
J. Electronic Imaging, 2008

Design and Implementation of a P2P-Based Media Streaming System.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Dynamic Modeling and Control of Rigid-Flexible Constrained Robot with Three Links.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

2007
Secure and Resilient Time Synchronization in Wireless Sensor Networks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

2006
Secure and resilient clock synchronization in wireless sensor networks.
IEEE Journal on Selected Areas in Communications, 2006

TinySeRSync: secure and resilient time synchronization in wireless sensor networks.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

Secure Distributed Cluster Formation in Wireless Sensor Networks.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks.
IEEE Trans. Dependable Sec. Comput., 2005

How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols.
Ad Hoc Networks, 2005

Total Variation-Based Speckle Reduction Using Multi-grid Algorithm for Ultrasound Images.
Proceedings of the Image Analysis and Processing, 2005

Segmentation in Echocardiographic Sequences Using Shape-Based Snake Model.
Proceedings of the Image Analysis and Processing, 2005

Anisotropic 3D Reconstruction and Restoration for Rotation-Scanning 4D Echocardiographic Images Based on MAP-MRF.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005

2003
How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols.
Proceedings of the IEEE Systems, 2003

Efficient self-healing group key distribution with revocation capability.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

1996
FAMING: Supporting innovative mechanism shape design.
Computer-Aided Design, 1996

1995
Computer-Aided Creative Mechanism Design.
Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 1995

1993
Computer-Aided Creative Mechanism Design.
Proceedings of the 13th International Joint Conference on Artificial Intelligence. Chambéry, France, August 28, 1993


  Loading...