Nan Sun

Orcid: 0000-0001-9123-9022

Affiliations:
  • University of New South Wales, Canberra, ACT, Australia
  • Cyber Security Cooperative Research Centre, Joondalup, WA, Australia


According to our database1, Nan Sun authored at least 24 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
DEFENDCLI: {Command-Line} Driven Attack Provenance Examination.
CoRR, August, 2025

TED-LaST: Towards Robust Backdoor Defense Against Adaptive Attacks.
CoRR, June, 2025

The Frontier of Data Erasure: A Survey on Machine Unlearning for Large Language Models.
Computer, January, 2025

Can LLM-generated misinformation be detected: A study on Cyber Threat Intelligence.
Future Gener. Comput. Syst., 2025

Systematic Approaches to Fact Verification: Evidence Retrieval, Veracity Prediction, and Beyond.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2025

Large Language Models for Cybersecurity Education: A Survey of Current Practices and Future Directions.
Proceedings of the Data Science: Foundations and Applications, 2025

Arms Race in Deep Learning: A Survey of Backdoor Defenses and Adaptive Attacks.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2025

What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software.
Proceedings of the 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2025

2024
Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis.
CoRR, 2024

The Frontier of Data Erasure: Machine Unlearning for Large Language Models.
CoRR, 2024

Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

DiHAN: A Novel Dynamic Hierarchical Graph Attention Network for Fake News Detection.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

2023
Cyber Information Retrieval Through Pragmatics Understanding and Visualization.
IEEE Trans. Dependable Secur. Comput., 2023

Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives.
IEEE Commun. Surv. Tutorials, 2023

On the Development of a Protection Profile Module for Encryption Key Management Components.
IEEE Access, 2023

Backdoor Attack on Deep Neural Networks in Perception Domain.
Proceedings of the International Joint Conference on Neural Networks, 2023

2022
Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges.
IEEE Access, 2022

How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond.
IEEE Access, 2022

Advanced Face Anti-Spoofing with Depth Segmentation.
Proceedings of the International Joint Conference on Neural Networks, 2022

Blockwise Spectral Analysis for Deepfake Detection in High-fidelity Videos.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022

2021
My Security: An interactive search engine for cybersecurity.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence.
Proceedings of the Network and System Security - 14th International Conference, 2020

2019
Data-Driven Cybersecurity Incident Prediction: A Survey.
IEEE Commun. Surv. Tutorials, 2019

2017
Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability.
IEEE Access, 2017


  Loading...