Kun Sun

According to our database1, Kun Sun authored at least 42 papers between 1993 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Quantitative Aspects of PDTB-Style Discourse Relations across Languages.
Journal of Quantitative Linguistics, 2018

Email as a Master Key: Analyzing Account Recovery in the Wild.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Rolling Guidance Based Scaled-Aware Spatial Sparse Unmixing for Hyperspectral Remote Sensing Imagery.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

CADET: Investigating a Collaborative and Distributed Entropy Transfer Protocol.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

2017
Improving Separability of Structures with Similar Attributes in 2D Transfer Function Design.
IEEE Trans. Vis. Comput. Graph., 2017

LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection.
Proceedings of the Security and Privacy in Communication Networks, 2017

Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack.
Proceedings of the Security and Privacy in Communication Networks, 2017

Your Neighbors are Listening: Evaluating PostMessage Use in OAuth.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Cookie-based amplification repression protocol.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Vibration Suppression of an Axially Moving System with Restrained Boundary Tension.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

A High Accurate Vision Algorithm on Measuring Arbitrary Contour.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Protecting web contents against persistent distributed crawlers.
Proceedings of the IEEE International Conference on Communications, 2017

JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Toward Sensor-Based Random Number Generation for Mobile and IoT Devices.
IEEE Internet of Things Journal, 2016

A LTPS-TFT pixel circuit for active matrix organic light emitting diode based on improved current mirror.
Displays, 2016

Mixed-type solitons and soliton interaction for the (2+1)-dimensional two-component long wave-short wave resonance interaction equations in a two-layer fluid through the Bell polynomials.
Appl. Math. Lett., 2016

DESIR: Decoy-enhanced seamless IP randomization.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Congenital heart disease (CHD) discrimination in fetal echocardiogram based on 3D feature fusion.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Amnesia: A Bilateral Generative Password Manager.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

2015
Multi-source broadcast authentication with Combined Key Chains for wireless ad hoc networks.
Security and Communication Networks, 2015

Bright and dark soliton solutions and Bäcklund transformation for the Eckhaus-Kundu equation with the cubic-quintic nonlinearity.
Applied Mathematics and Computation, 2015

A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

2014
Cloud-based user authentication with geo-temporal queries on smartphones.
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014

2013
Soliton solutions and integrability for the generalized variable-coefficient extended Korteweg-de Vries equation in fluids.
Appl. Math. Lett., 2013

A Security Analysis of Two Commercial Browser and Cloud Based Password Managers.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Effectiveness of IP address randomization in decoy-based moving target defense.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

2011
Vascular Active Contour for Vessel Tree Segmentation.
IEEE Trans. Biomed. Engineering, 2011

Soliton solutions and Bäcklund transformation for the complex Ginzburg-Landau equation.
Applied Mathematics and Computation, 2011

A New Method for Passive Millimeter Wave Image Registration by Applying Super Resolution.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

2010
Symbolic-Computation Study on the (2+1)-Dimensional Dispersive Long Wave System.
SIAM Journal of Applied Mathematics, 2010

2009
High-resolution cross-estimation channel modelling method and experimental results on broadband mobile communication in urban rich-scattering environment.
Science in China Series F: Information Sciences, 2009

A SNMPv3 Replay Protection Scheme Used in Space Network Based on Random Number.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2008
Computer-aided recognition of a four-chamber image plane in three-dimensional echocardiographic images of children.
J. Electronic Imaging, 2008

Design and Implementation of a P2P-Based Media Streaming System.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Dynamic Modeling and Control of Rigid-Flexible Constrained Robot with Three Links.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

2005
Total Variation-Based Speckle Reduction Using Multi-grid Algorithm for Ultrasound Images.
Proceedings of the Image Analysis and Processing, 2005

Segmentation in Echocardiographic Sequences Using Shape-Based Snake Model.
Proceedings of the Image Analysis and Processing, 2005

Anisotropic 3D Reconstruction and Restoration for Rotation-Scanning 4D Echocardiographic Images Based on MAP-MRF.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005

1996
FAMING: Supporting innovative mechanism shape design.
Computer-Aided Design, 1996

1995
Computer-Aided Creative Mechanism Design.
Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 1995

1993
Computer-Aided Creative Mechanism Design.
Proceedings of the 13th International Joint Conference on Artificial Intelligence. Chambéry, France, August 28, 1993


  Loading...