Cong Sun
Cited by
Cited by
A novel dynamic android malware detection system with ensemble learning
P Feng, J Ma, C Sun, X Xu, Y Ma
IEEE Access 6, 30996-31011, 2018
TrPF: A trajectory privacy-preserving framework for participatory sensing
S Gao, J Ma, W Shi, G Zhan, C Sun
IEEE Transactions on Information Forensics and Security 8 (6), 874-887, 2013
Balancing trajectory privacy and data utility using a personalized anonymization model
S Gao, J Ma, C Sun, X Li
Journal of Network and Computer Applications 38, 125-134, 2014
Vurle: Automatic vulnerability detection and repair by learning from examples
S Ma, F Thung, D Lo, C Sun, RH Deng
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
A privacy-preserving mutual authentication resisting DoS attacks in VANETs
C Sun, J Liu, X Xu, J Ma
IEEE Access 5, 24012-24022, 2017
Active Semi-supervised Approach for Checking App Behavior against Its Description
S Ma, S Wang, D Lo, RH Deng, C Sun
Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th …, 2015
Secure service composition with information flow control in service clouds
N Xi, C Sun, J Ma, Y Shen
Future Generation Computer Systems 49, 142-148, 2015
Refining Indirect Call Targets at the Binary Level.
SH Kim, C Sun, D Zeng, G Tan
NDSS, 2021
DAPV: Diagnosing anomalies in MANETs routing with provenance and verification
T Li, J Ma, Q Pei, H Song, Y Shen, C Sun
IEEE Access 7, 35302-35316, 2019
DeepCatra: Learning flow‐and graph‐based behaviours for Android malware detection
Y Wu, J Shi, P Wang, D Zeng, C Sun
IET Information Security 17 (1), 118-130, 2023
SRDPV: secure route discovery and privacy-preserving verification in MANETs
T Li, JF Ma, C Sun
Wireless Networks 25, 1731-1747, 2019
Recfa: Resilient control-flow attestation
Y Zhang, X Liu, C Sun, D Zeng, G Tan, X Kan, S Ma
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
Control parameters considered harmful: Detecting range specification bugs in drone configuration modules via learning-guided search
R Han, C Yang, S Ma, JF Ma, C Sun, J Li, E Bertino
Proceedings of the 44th International Conference on Software Engineering …, 2022
Dlog: diagnosing router events with syslogs for anomaly detection
T Li, JF Ma, C Sun
The Journal of Supercomputing 74, 845-867, 2018
Trust-based service composition in multi-domain environments under time constraint
T Zhang, JF Ma, Q Li, N Xi, C Sun
Science China Information Sciences 57, 1-16, 2014
Secure information flow by model checking pushdown system
C Sun, L Tang, Z Chen
2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing …, 2009
Service composition in multi-domain environment under time constraint
T Zhang, J Ma, C Sun, Q Li, N Xi
2013 IEEE 20th International Conference on Web Services, 227-234, 2013
A multi-compositional enforcement on information flow security
C Sun, E Zhai, Z Chen, J Ma
International Conference on Information and Communications Security, 345-359, 2011
Secure information flow in java via reachability analysis of pushdown system
C Sun, L Tang, Z Chen
2010 10th International Conference on Quality Software, 142-150, 2010
Selecting critical data flows in Android applications for abnormal behavior detection
P Feng, J Ma, C Sun
Mobile Information Systems 2017 (1), 7397812, 2017
The system can't perform the operation now. Try again later.
Articles 1–20