BibTeX records: Hao Sun 0004

download as .bib file

@article{DBLP:journals/spe/SunWBS17,
  author       = {Hao Sun and
                  Xiaofeng Wang and
                  Rajkumar Buyya and
                  Jinshu Su},
  title        = {CloudEyes: Cloud-based malware detection with reversible sketch for
                  resource-constrained internet of things (IoT) devices},
  journal      = {Softw. Pract. Exp.},
  volume       = {47},
  number       = {3},
  pages        = {421--441},
  year         = {2017},
  url          = {https://doi.org/10.1002/spe.2420},
  doi          = {10.1002/SPE.2420},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/SunWBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunSWCLH17,
  author       = {Hao Sun and
                  Jinshu Su and
                  Xiaofeng Wang and
                  Rongmao Chen and
                  Yujing Liu and
                  Qiaolin Hu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {PriMal: Cloud-Based Privacy-Preserving Malware Detection},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {153--172},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_9},
  doi          = {10.1007/978-3-319-59870-3\_9},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunSWCLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/LiSWSC17,
  author       = {Jie Li and
                  Jinshu Su and
                  Xiaofeng Wang and
                  Hao Sun and
                  Shuhui Chen},
  editor       = {Sheng Wen and
                  Wei Wu and
                  Aniello Castiglione},
  title        = {CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via
                  Reversible Sketch},
  booktitle    = {Cyberspace Safety and Security - 9th International Symposium, {CSS}
                  2017, Xi'an, China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10581},
  pages        = {119--134},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69471-9\_9},
  doi          = {10.1007/978-3-319-69471-9\_9},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/LiSWSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/ChenWZSSY15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Hao Sun and
                  Jinshu Su and
                  Ilsun You},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Marek R. Ogiela and
                  Lidia Ogiela},
  title        = {An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite
                  Order Bilinear Groups},
  booktitle    = {10th International Conference on Broadband and Wireless Computing,
                  Communication and Applications, {BWCCA} 2015, Krakow, Poland, November
                  4-6, 2015},
  pages        = {364--369},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/BWCCA.2015.9},
  doi          = {10.1109/BWCCA.2015.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bwcca/ChenWZSSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/RenWSXZW15,
  author       = {Peige Ren and
                  Xiaofeng Wang and
                  Hao Sun and
                  Fen Xu and
                  Baokang Zhao and
                  Chunqing Wu},
  editor       = {Ismail Khalil and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Li Da Xu and
                  Ilsun You},
  title        = {An Efficient Unsavory Data Detection Method for Internet Big Data},
  booktitle    = {Information and Communication Technology - Third {IFIP} {TC} 5/8 International
                  Conference, ICT-EurAsia 2015, and 9th {IFIP} {WG} 8.9 Working Conference,
                  {CONFENIS} 2015, Held as Part of {WCC} 2015, Daejeon, Korea, October
                  4-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9357},
  pages        = {213--220},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24315-3\_21},
  doi          = {10.1007/978-3-319-24315-3\_21},
  timestamp    = {Tue, 29 Dec 2020 18:35:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/RenWSXZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/RenWZWS15,
  author       = {Peige Ren and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Chunqing Wu and
                  Hao Sun},
  title        = {OpenSRN: {A} software-defined semantic routing network architecture},
  booktitle    = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops, Hong Kong, China, April 26 - May 1, 2015},
  pages        = {101--102},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFCOMW.2015.7179363},
  doi          = {10.1109/INFCOMW.2015.7179363},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/RenWZWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/SunWSC15,
  author       = {Hao Sun and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Peixin Chen},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {RScam: Cloud-Based Anti-Malware via Reversible Sketch},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {157--174},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_9},
  doi          = {10.1007/978-3-319-28865-9\_9},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/SunWSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoWWHCS15,
  author       = {Yue{-}Bin Luo and
                  Baosheng Wang and
                  Xiaofeng Wang and
                  Xiao{-}Feng Hu and
                  Gui{-}Lin Cai and
                  Hao Sun},
  title        = {{RPAH:} Random Port and Address Hopping for Thwarting Internal and
                  External Adversaries},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {263--270},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.383},
  doi          = {10.1109/TRUSTCOM.2015.383},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoWWHCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/RenWWZS14,
  author       = {Peige Ren and
                  Xiaofeng Wang and
                  Chunqing Wu and
                  Baokang Zhao and
                  Hao Sun},
  editor       = {Linawati and
                  Made Sudiana Mahendra and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Ilsun You},
  title        = {A Semantic-Based Malware Detection System Design Based on Channels},
  booktitle    = {Information and Communication Technology - Second {IFIP} {TC5/8} International
                  Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8407},
  pages        = {653--662},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55032-4\_67},
  doi          = {10.1007/978-3-642-55032-4\_67},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/RenWWZS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/RenWSZW14,
  author       = {Peige Ren and
                  Xiaofeng Wang and
                  Hao Sun and
                  Baokang Zhao and
                  Chunqing Wu},
  editor       = {Linawati and
                  Made Sudiana Mahendra and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Ilsun You},
  title        = {An Efficient Semantic-Based Organization and Similarity Search Method
                  for Internet Data Resources},
  booktitle    = {Information and Communication Technology - Second {IFIP} {TC5/8} International
                  Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8407},
  pages        = {663--673},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55032-4\_68},
  doi          = {10.1007/978-3-642-55032-4\_68},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/RenWSZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics