Cong Sun
Title
Cited by
Cited by
Year
TrPF: A trajectory privacy-preserving framework for participatory sensing
S Gao, J Ma, W Shi, G Zhan, C Sun
IEEE Transactions on Information Forensics and Security 8 (6), 874-887, 2013
1462013
Balancing trajectory privacy and data utility using a personalized anonymization model
S Gao, J Ma, C Sun, X Li
Journal of Network and Computer Applications 38, 125-134, 2014
682014
A Novel Dynamic Android Malware Detection System With Ensemble Learning
P Feng, J Ma, C Sun, X Xu, Y Ma
IEEE Access 6, 30996-31011, 2018
282018
Secure service composition with information flow control in service clouds
N Xi, C Sun, J Ma, Y Shen
Future Generation Computer Systems 49, 142-148, 2015
252015
Active Semi-supervised Approach for Checking App Behavior against Its Description
S Ma, S Wang, D Lo, RH Deng, C Sun
Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th …, 2015
242015
A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs
C Sun, J Liu, X Xu, J Ma
IEEE Access 5, 24012-24022, 2017
222017
VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples
S Ma, F Thung, D Lo, C Sun, RH Deng
European Symposium on Research in Computer Security, 229-246, 2017
192017
Service composition in multi-domain environment under time constraint
T Zhang, J Ma, C Sun, Q Li, N Xi
2013 IEEE 20th International Conference on Web Services, 227-234, 2013
142013
A multi-compositional enforcement on information flow security
C Sun, E Zhai, Z Chen, J Ma
International Conference on Information and Communications Security, 345-359, 2011
142011
Trust-based service composition in multi-domain environments under time constraint
T Zhang, JF Ma, Q Li, N Xi, C Sun
Science China Information Sciences 57 (9), 1-16, 2014
122014
Secure information flow by model checking pushdown system
C Sun, L Tang, Z Chen
2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing …, 2009
122009
Decentralized information flow verification framework for the service chain composition in mobile computing environments
N Xi, J Ma, C Sun, T Zhang
2013 IEEE 20th International Conference on Web Services, 563-570, 2013
102013
Dlog: diagnosing router events with syslogs for anomaly detection
T Li, JF Ma, C Sun
The Journal of Supercomputing 74 (2), 845-867, 2018
92018
SRDPV: secure route discovery and privacy-preserving verification in MANETs
T Li, JF Ma, C Sun
Wireless Networks 25 (4), 1731-1747, 2019
82019
Distributed information flow verification framework for the composition of service chain in wireless sensor network
N Xi, J Ma, C Sun, Y Shen, T Zhang
International Journal of Distributed Sensor Networks 2013, 2013
82013
Secure information flow in java via reachability analysis of pushdown system
C Sun, L Tang, Z Chen
2010 10th International Conference on Quality Software, 142-150, 2010
82010
NetPro: detecting attacks in MANET routing with provenance and verification
T Li, J Ma, C Sun
Science China Information Sciences 60 (11), 118101, 2017
62017
Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection
P Feng, J Ma, C Sun
Mobile Information Systems 2017, 2017
62017
Distributed information flow verification for secure service composition in smart sensor network
N Xi, C Sun, J Ma, X Chen, Y Shen
China Communications 13 (4), 119-130, 2016
52016
CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks
T Li, J Ma, C Sun
International Conference on Algorithms and Architectures for Parallel …, 2015
52015
The system can't perform the operation now. Try again later.
Articles 1–20