Остановите войну!
for scientists:
default search action
Cong Sun 0001
Person information
- affiliation: Xidian University, School of Cyber Engineering, Xi'an, China
- affiliation (PhD 2011): Peking University, School of Electronics Engineering and Computer Science, Institute of Software, China
Other persons with the same name
- Cong Sun — disambiguation page
- Cong Sun 0002 — Beijing University of Posts and Telecommunications, School of Science, China (and 2 more)
- Cong Sun 0003 — National University of Defense Technology, College of Aerospace Science and Engineering, Changsha, China (and 1 more)
- Cong Sun 0004 — Dalian University of Technology, School of Computer Science and Technology, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j28]Yafei Wu, Jian Shi, Peicheng Wang, Dongrui Zeng, Cong Sun:
DeepCatra: Learning flow- and graph-based behaviours for Android malware detection. IET Inf. Secur. 17(1): 118-130 (2023) - [j27]Cong Sun, Xinpeng Xu, Yafei Wu, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang:
CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis. IET Inf. Secur. 17(4): 582-597 (2023) - [j26]Cong Sun, Yuwan Ma, Dongrui Zeng, Gang Tan, Siqi Ma, Yafei Wu:
μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code. IEEE Trans. Dependable Secur. Comput. 20(2): 1461-1475 (2023) - [c31]Yafei Wu, Cong Sun, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang:
LibScan: Towards More Precise Third-Party Library Identification for Android Applications. USENIX Security Symposium 2023: 3385-3402 - 2022
- [j25]Xiaomin Wei, Yao Wang, Cong Sun:
PerDet: Machine-Learning-Based UAV GPS Spoofing Detection Using Perception Data. Remote. Sens. 14(19): 4925 (2022) - [j24]Xiaomin Wei, Cong Sun, Minjie Lyu, Qipeng Song, Yue Li:
ConstDet: Control Semantics-Based Detection for GPS Spoofing Attacks on UAVs. Remote. Sens. 14(21): 5587 (2022) - [c30]Sun Hyoung Kim, Dongrui Zeng, Cong Sun, Gang Tan:
BinPointer: towards precise, sound, and scalable binary-level pointer analysis. CC 2022: 169-180 - [c29]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. ICSE 2022: 462-473 - [i10]Yafei Wu, Jian Shi, Peicheng Wang, Dongrui Zeng, Cong Sun:
DeepCatra: Learning Flow- and Graph-based Behaviors for Android Malware Detection. CoRR abs/2201.12876 (2022) - 2021
- [c28]Yumei Zhang, Xinzhi Liu, Cong Sun, Dongrui Zeng, Gang Tan, Xiao Kan, Siqi Ma:
ReCFA: Resilient Control-Flow Attestation. ACSAC 2021: 311-322 - [c27]Ziyu Wang, Cong Sun, Qingsong Yao, Duo Ding, Jianfeng Ma:
Delica: Decentralized Lightweight Collective Attestation for Disruptive IoT Networks. ICPADS 2021: 364-371 - [c26]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. ICSE 2021: 1671-1682 - [c25]Sun Hyoung Kim, Cong Sun, Dongrui Zeng, Gang Tan:
Refining Indirect Call Targets at the Binary Level. NDSS 2021 - [c24]Xiao Kan, Cong Sun, Shen Liu, Yongzhe Huang, Gang Tan, Siqi Ma, Yumei Zhang:
Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking. QRS 2021: 702-713 - [i9]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. CoRR abs/2103.05758 (2021) - [i8]Ning Xi, Chao Chen, Jun Zhang, Cong Sun, Shigang Liu, Pengbin Feng, Jianfeng Ma:
Information flow based defensive chain for data leakage detection and prevention: a survey. CoRR abs/2106.04951 (2021) - [i7]Yumei Zhang, Xinzhi Liu, Cong Sun, Dongrui Zeng, Gang Tan, Xiao Kan, Siqi Ma:
ReCFA: Resilient Control-Flow Attestation. CoRR abs/2110.11603 (2021) - [i6]Xiao Kan, Cong Sun, Shen Liu, Yongzhe Huang, Gang Tan, Siqi Ma, Yumei Zhang:
Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking. CoRR abs/2111.04005 (2021) - [i5]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. CoRR abs/2112.03511 (2021) - [i4]Cong Sun, Xinpeng Xu, Yafei Wu, Dongrui Zeng, Gang Tan, Siqi Ma:
CryptoEval: Evaluating the Risk of Cryptographic Misuses in Android Apps with Data-Flow Analysis. CoRR abs/2112.06146 (2021) - [i3]Cong Sun, Yuwan Ma, Dongrui Zeng, Gang Tan, Siqi Ma, Yafei Wu:
μDep: Mutation-based Dependency Generation for Precise Taint Analysis on Android Native Code. CoRR abs/2112.06702 (2021)
2010 – 2019
- 2019
- [j23]Teng Li, Jianfeng Ma, Qingqi Pei, Houbing Song, Yulong Shen, Cong Sun:
DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification. IEEE Access 7: 35302-35316 (2019) - [j22]Ning Xi, Jing Lv, Cong Sun, Jianfeng Ma:
Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments. Entropy 21(8): 753 (2019) - [j21]Paerhatijiang Sidike, Jianfeng Ma, Cong Sun:
一种面向二进制的细粒度控制流完整性方法 (Fine-grained Control Flow Integrity Method on Binaries). 计算机科学 46(11A): 417-420 (2019) - [j20]Teng Li, Jianfeng Ma, Cong Sun:
SRDPV: secure route discovery and privacy-preserving verification in MANETs. Wirel. Networks 25(4): 1731-1747 (2019) - [c23]Teng Li, Jianfeng Ma, Qingqi Pei, Chengyan Ma, Dawei Wei, Cong Sun:
Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks. ICC 2019: 1-6 - [c22]Cong Sun, Jun Chen, Pengbin Feng, Jianfeng Ma:
CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications. ML4CS 2019: 63-77 - [c21]Ning Xi, Cong Sun, Jianfeng Ma, Jing Lv:
Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds. TrustCom/BigDataSE 2019: 200-207 - 2018
- [j19]Pengbin Feng, Jianfeng Ma, Cong Sun, Xinpeng Xu, Yuwan Ma:
A Novel Dynamic Android Malware Detection System With Ensemble Learning. IEEE Access 6: 30996-31011 (2018) - [j18]Cong Sun, Jiao Liu, Yinjuan Jie, Yuwan Ma, Jianfeng Ma:
Ridra: A Rigorous Decentralized Randomized Authentication in VANETs. IEEE Access 6: 50358-50371 (2018) - [j17]Ning Xi, Jianfeng Ma, Cong Sun, Di Lu, Yulong Shen:
Information flow control on encrypted data for service composition among multiple clouds. Distributed Parallel Databases 36(3): 511-527 (2018) - [j16]Teng Li, Jianfeng Ma, Cong Sun, Ning Xi:
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. J. Inf. Sci. Eng. 34(4): 943-960 (2018) - [j15]Teng Li, Jianfeng Ma, Cong Sun:
Dlog: diagnosing router events with syslogs for anomaly detection. J. Supercomput. 74(2): 845-867 (2018) - [c20]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun:
Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification. APSIPA 2018: 240-246 - [c19]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun:
Anomalies Detection of Routers Based on Multiple Information Learning. NaNA 2018: 206-211 - 2017
- [j14]Di Lu, Jianfeng Ma, Cong Sun, Qixuan Wu, Zhaochang Sun, Ning Xi:
Building a Secure Scheme for a Trusted Hardware Sharing Environment. IEEE Access 5: 20260-20271 (2017) - [j13]Cong Sun, Jiao Liu, Xinpeng Xu, Jianfeng Ma:
A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs. IEEE Access 5: 24012-24022 (2017) - [j12]Di Lu, Jianfeng Ma, Cong Sun, XinDi Ma, Ning Xi:
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing. Sci. China Inf. Sci. 60(5): 52103:1-52103:17 (2017) - [j11]Teng Li, Jianfeng Ma, Cong Sun:
NetPro: detecting attacks in MANET routing with provenance and verification. Sci. China Inf. Sci. 60(11): 118101 (2017) - [j10]Pengbin Feng, Jianfeng Ma, Cong Sun:
Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection. Mob. Inf. Syst. 2017: 7397812:1-7397812:16 (2017) - [j9]Ning Xi, Di Lu, Cong Sun, Jianfeng Ma, Yulong Shen:
Distributed Secure Service Composition with Declassification in Mobile Clouds. Mob. Inf. Syst. 2017: 7469342:1-7469342:13 (2017) - [c18]Cong Sun, Pengbin Feng, Teng Li, Jianfeng Ma:
Data-Oriented Instrumentation against Information Leakages of Android Applications. COMPSAC (2) 2017: 485-490 - [c17]Cong Sun, Ning Xi, Jianfeng Ma:
Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition. COMPSAC (1) 2017: 586-595 - [c16]Siqi Ma, Ferdian Thung, David Lo, Cong Sun, Robert H. Deng:
VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples. ESORICS (2) 2017: 229-246 - [c15]Teng Li, Jianfeng Ma, Cong Sun, Dawei Wei, Ning Xi:
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. NaNA 2017: 5-10 - [c14]Ning Xi, Cong Sun, Di Lu, Yulong Shen:
Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds. NaNA 2017: 286-291 - [c13]Cong Sun, Qingsong Yao, Jianfeng Ma:
Certia: Certifying Interface Automata for Cyber-Physical Systems. SMARTCOMP 2017: 1-3 - 2016
- [j8]Cong Sun, Jianfeng Ma, Qingsong Yao:
On the architecture and development life cycle of secure cyber-physical systems. J. Commun. Inf. Networks 1(4): 1-21 (2016) - [j7]Pengbin Feng, Cong Sun, Jianfeng Ma:
Measuring the risk value of sensitive dataflow path in Android applications. Secur. Commun. Networks 9(18): 5918-5933 (2016) - [c12]Qingsong Yao, Jianfeng Ma, Cong Sun, Xinghua Li, Jinku Li:
Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags. MSCC@MobiHoc 2016: 23-28 - [c11]Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen, Di Lu:
Distributed Secure Service Composition with Declassification in Mobile Network. NaNA 2016: 254-259 - 2015
- [j6]Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen:
Secure service composition with information flow control in service clouds. Future Gener. Comput. Syst. 49: 142-148 (2015) - [c10]Siqi Ma, Shaowei Wang, David Lo, Robert Huijie Deng, Cong Sun:
Active Semi-supervised Approach for Checking App Behavior against Its Description. COMPSAC 2015: 179-184 - [c9]Teng Li, Jianfeng Ma, Cong Sun:
CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks. ICA3PP (3) 2015: 449-462 - 2014
- [j5]Tao Zhang, Jianfeng Ma, Qi Li, Ning Xi, Cong Sun:
Trust-based service composition in multi-domain environments under time constraint. Sci. China Inf. Sci. 57(9): 1-16 (2014) - [j4]Cong Sun, Ning Xi, Sheng Gao, Zhong Chen, Jianfeng Ma:
Automated enforcement for relaxed information release with reference points. Sci. China Inf. Sci. 57(11): 1-19 (2014) - [j3]Sheng Gao, Jianfeng Ma, Cong Sun, Xinghua Li:
Balancing trajectory privacy and data utility using a personalized anonymization model. J. Netw. Comput. Appl. 38: 125-134 (2014) - [c8]Cong Sun, Ning Xi, Jinku Li, Qingsong Yao, Jianfeng Ma:
Verifying Secure Interface Composition for Component-Based System Designs. APSEC (1) 2014: 359-366 - 2013
- [j2]Ning Xi, Jianfeng Ma, Cong Sun, Yulong Shen, Tao Zhang:
Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network. Int. J. Distributed Sens. Networks 9 (2013) - [j1]Sheng Gao, Jianfeng Ma, Weisong Shi, Guoxing Zhan, Cong Sun:
TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing. IEEE Trans. Inf. Forensics Secur. 8(6): 874-887 (2013) - [c7]Tao Zhang, Jianfeng Ma, Cong Sun, Qi Li, Ning Xi:
Service Composition in Multi-domain Environment under Time Constraint. ICWS 2013: 227-234 - [c6]Ning Xi, Jianfeng Ma, Cong Sun, Tao Zhang:
Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments. ICWS 2013: 563-570 - 2012
- [c5]Cong Sun, Sheng Gao, Jianfeng Ma:
Verifying Location-Based Services with Declassification Enforcement. APWeb 2012: 695-702 - 2011
- [c4]Cong Sun, Liyong Tang, Zhong Chen:
Enforcing Relaxed Declassifications with Reference Points. ACIS-ICIS 2011: 76-81 - [c3]Cong Sun, Ennan Zhai, Zhong Chen, Jianfeng Ma:
A Multi-compositional Enforcement on Information Flow Security. ICICS 2011: 345-359 - [c2]Cong Sun, Liyong Tang, Zhong Chen:
Enforcing Reactive Noninterference with Reachability Analysis. ITNG 2011: 321-326 - [i2]Cong Sun, Liyong Tang, Zhong Chen:
A New Enforcement on Declassification with Reachability Analysis. CoRR abs/1108.4172 (2011) - 2010
- [c1]Cong Sun, Liyong Tang, Zhong Chen:
Secure Information Flow in Java via Reachability Analysis of Pushdown System. QSIC 2010: 142-150 - [i1]Cong Sun, Liyong Tang, Zhong Chen:
Secure Information Flow by Model Checking Pushdown System. CoRR abs/1012.3100 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-18 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint