Shining Sun

Orcid: 0009-0008-5337-4387

According to our database1, Shining Sun authored at least 15 papers between 2008 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
TRNIC: A High-Performance RDMA NIC with Triple-Table Bitmap for Efficient Out-of-Order Packet Reordering in Multipath Transmission.
IEICE Trans. Commun., 2026

2025
Novel Response-Time Bounds of Typed DAG Tasks on Heterogeneous Multicores.
IEEE Internet Things J., June, 2025

Cooperative Optimization of Grid-Edge Cyber and Physical Resources for Resilient Power System Operation.
CoRR, February, 2025

RoSR: A Novel Selective Retransmission FPGA Architecture for RDMA NICs.
IEEE Comput. Archit. Lett., 2025

Scalable Discrete Event Simulation Tool for Large-Scale Cyber-Physical Energy Systems: Advancing System Efficiency and Scalability.
IEEE Access, 2025

A Graph Embedding-Based Risk Analysis Case Study of a 2000-bus Cyber-Physical Power System.
Proceedings of the IEEE International Conference on Communications, 2025

WCDFP Analysis for Real-Time Tasks with Stochastic Release Patterns using Chernoff Bound.
Proceedings of the IEEE Real-Time Systems Symposium, 2025

2024
Illinois 200-Bus Cyber-Physical System under Node2vec Risk Analysis.
Dataset, May, 2024

A graph embedding-based approach for automatic cyber-physical power system risk assessment to prevent and mitigate threats at scale.
IET Cyper-Phys. Syst.: Theory & Appl., 2024

Leveraging graph clustering techniques for cyber-physical system analysis to enhance disturbance characterisation.
IET Cyper-Phys. Syst.: Theory & Appl., 2024

A Reinforcement Learning Engine with Reduced Action and State Space for Scalable Cyber-Physical Optimal Response.
CoRR, 2024

Insight Into Cyber Information Flow Interdependencies Using Bio-inspired Topologies.
Proceedings of the 58th Annual Conference on Information Sciences and Systems, 2024

Needle-in-the-Haystack: On Automatic Risk-based Searching to Stop Cyber-Physical Threats in Large-Scale Power Systems.
Proceedings of the 58th Annual Conference on Information Sciences and Systems, 2024

2011
Multiprocess malware.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

2008
Tangible menus and interaction trays: core tangibles for common physical/digital activities.
Proceedings of the 2nd International Conference on Tangible and Embedded Interaction 2008, 2008


  Loading...