Personal information

No personal information available

Activities

Employment (1)

Xidian University: Xian, Shaanxi, CN

2011-07-01 to present
Employment
Source: Self-asserted source
Cong Sun

Education and qualifications (2)

Peking University: Beijing, Beijing, CN

2005-09-01 to 2011-06-30 | PhD
Education
Source: Self-asserted source
Cong Sun

Zhejiang University: Hangzhou, Zhejiang, CN

2001-09-01 to 2005-06-30 | B.S.
Education
Source: Self-asserted source
Cong Sun

Works (42)

Sensor attack online classification for UAVs using machine learning

Computers & Security
2025-03 | Journal article
Contributors: Xiaomin Wei; Yizhen Xu; Haibin Zhang; Cong Sun; Xinghua Li; Fenghua Huang; Jianfeng Ma
Source: check_circle
Crossref

Sliver: A Scalable Slicing-Based Verification for Information Flow Security

IEEE Transactions on Dependable and Secure Computing
2025-01 | Journal article
Contributors: Xue Rao; Cong Sun; Dongrui Zeng; Yongzhe Huang; Gang Tan
Source: check_circle
Crossref

A Survey on Security of Unmanned Aerial Vehicle Systems: Attacks and Countermeasures

IEEE Internet of Things Journal
2024 | Journal article
Contributors: Xiaomin Wei; Jianfeng Ma; Cong Sun
Source: check_circle
Crossref

LICAPA: Lightweight collective attestation for physical attacks detection in highly dynamic networks

Pervasive and Mobile Computing
2024-04 | Journal article
Contributors: Ziyu Wang; Cong Sun
Source: check_circle
Crossref

CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data‐flow analysis

IET Information Security
2023-07 | Journal article
Contributors: Cong Sun; Xinpeng Xu; Yafei Wu; Dongrui Zeng; Gang Tan; Siqi Ma; Peicheng Wang
Source: check_circle
Crossref

μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code

IEEE Transactions on Dependable and Secure Computing
2023-03-01 | Journal article
Contributors: Cong Sun; Yuwan Ma; Dongrui Zeng; Gang Tan; Siqi Ma; Yafei Wu
Source: check_circle
Crossref

ConstDet: Control Semantics-Based Detection for GPS Spoofing Attacks on UAVs

Remote Sensing
2022-11-05 | Journal article
Contributors: Xiaomin Wei; Cong Sun; Minjie Lyu; Qipeng Song; Yue Li
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

BinPointer: towards precise, sound, and scalable binary-level pointer analysis

2022-03-19 | Conference paper
Contributors: Sun Hyoung Kim; Dongrui Zeng; Cong Sun; Gang Tan
Source: check_circle
Crossref

CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications

2019 | Book chapter
Contributors: Cong Sun; Jun Chen; Pengbin Feng; Jianfeng Ma
Source: check_circle
Crossref

DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification

IEEE Access
2019 | Journal article
Contributors: Teng Li; Jianfeng Ma; Qingqi Pei; Houbing Song; Yulong Shen; Cong Sun
Source: check_circle
Crossref

A Novel Dynamic Android Malware Detection System With Ensemble Learning

IEEE Access
2018 | Journal article
Contributors: Pengbin Feng; Jianfeng Ma; Cong Sun; Xinpeng Xu; Yuwan Ma
Source: check_circle
Crossref

Dlog: diagnosing router events with syslogs for anomaly detection

The Journal of Supercomputing
2018 | Journal article
Source: Self-asserted source
Cong Sun
grade
Preferred source (of 2)‎

A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs

IEEE Access
2017 | Journal article
Source: Self-asserted source
Cong Sun
grade
Preferred source (of 3)‎

Building a Secure Scheme for a Trusted Hardware Sharing Environment

IEEE Access
2017 | Journal article
Source: Self-asserted source
Cong Sun
grade
Preferred source (of 2)‎

Certia: Certifying Interface Automata for Cyber-Physical Systems

2017 IEEE International Conference on Smart Computing, SMARTCOMP 2017, Hong Kong, China, May 29-31, 2017
2017 | Conference paper
Source: Self-asserted source
Cong Sun

Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing

SCIENCE CHINA Information Sciences
2017 | Journal article
Source: Self-asserted source
Cong Sun

Data-Oriented Instrumentation against Information Leakages of Android Applications

41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 2
2017 | Conference paper
Source: Self-asserted source
Cong Sun

Distributed Secure Service Composition with Declassification in Mobile Clouds

Mobile Information Systems
2017 | Journal article
Source: Self-asserted source
Cong Sun
grade
Preferred source (of 2)‎

NetPro: detecting attacks in MANET routing with provenance and verification

SCIENCE CHINA Information Sciences
2017 | Journal article
Source: Self-asserted source
Cong Sun

Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection

Mobile Information Systems
2017 | Journal article
Source: Self-asserted source
Cong Sun
grade
Preferred source (of 2)‎

VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples

Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II
2017 | Conference paper
Source: Self-asserted source
Cong Sun

Distributed Secure Service Composition with Declassification in Mobile Network

International Conference on Networking and Network Applications, NaNA 2016, Hakodate City, Hokkaido, Japan, July 23-25, 2016
2016 | Conference paper
Source: Self-asserted source
Cong Sun

Measuring the risk value of sensitive dataflow path in Android applications

Security and Communication Networks
2016 | Journal article
Source: Self-asserted source
Cong Sun

On the architecture and development life cycle of secure cyber-physical systems

J. Comm. Inform. Networks
2016 | Journal article
Source: Self-asserted source
Cong Sun

Active Semi-supervised Approach for Checking App Behavior against Its Description

39th IEEE Annual Computer Software and Applications Conference, COMPSAC 2015, Taichung, Taiwan, July 1-5, 2015. Volume 2
2015 | Conference paper
Source: Self-asserted source
Cong Sun

CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks

Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015. Proceedings, Part III
2015 | Conference paper
Source: Self-asserted source
Cong Sun

Secure service composition with information flow control in service clouds

Future Generation Comp. Syst.
2015 | Journal article
Source: Self-asserted source
Cong Sun

Automated enforcement for relaxed information release with reference points

SCIENCE CHINA Information Sciences
2014 | Journal article
Source: Self-asserted source
Cong Sun

Balancing trajectory privacy and data utility using a personalized anonymization model

J. Network and Computer Applications
2014 | Journal article
Source: Self-asserted source
Cong Sun

Trust-based service composition in multi-domain environments under time constraint

SCIENCE CHINA Information Sciences
2014 | Journal article
Source: Self-asserted source
Cong Sun

Verifying Secure Interface Composition for Component-Based System Designs

21st Asia-Pacific Software Engineering Conference, APSEC 2014, Jeju, South Korea, December 1-4, 2014. Volume 1: Research Papers
2014 | Conference paper
Source: Self-asserted source
Cong Sun

Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments

2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28 - July 3, 2013
2013 | Conference paper
Source: Self-asserted source
Cong Sun

Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network

IJDSN
2013 | Journal article
Source: Self-asserted source
Cong Sun
grade
Preferred source (of 2)‎

Service Composition in Multi-domain Environment under Time Constraint

2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28 - July 3, 2013
2013 | Conference paper
Source: Self-asserted source
Cong Sun

TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing

IEEE Trans. Information Forensics and Security
2013 | Journal article
Source: Self-asserted source
Cong Sun

Verifying Location-Based Services with Declassification Enforcement

Web Technologies and Applications - 14th Asia-Pacific Web Conference, APWeb 2012, Kunming, China, April 11-13, 2012. Proceedings
2012 | Conference paper
Source: Self-asserted source
Cong Sun

A Multi-compositional Enforcement on Information Flow Security

Information and Communications Security - 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
2011 | Conference paper
Source: Self-asserted source
Cong Sun

A New Enforcement on Declassification with Reachability Analysis

CoRR
2011 | Journal article
Source: Self-asserted source
Cong Sun

Enforcing Reactive Noninterference with Reachability Analysis

Eighth International Conference on Information Technology: New Generations, ITNG 2011, Las Vegas, Nevada, USA, 11-13 April 2011
2011 | Conference paper
Source: Self-asserted source
Cong Sun

Enforcing Relaxed Declassifications with Reference Points

10th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2011, 16-18 May, 2011, Sanya, Hainan Island, China
2011 | Conference paper
Source: Self-asserted source
Cong Sun

Secure Information Flow by Model Checking Pushdown System

CoRR
2010 | Journal article
Source: Self-asserted source
Cong Sun
grade
Preferred source (of 2)‎

Secure Information Flow in Java via Reachability Analysis of Pushdown System

Proceedings of the 10th International Conference on Quality Software, QSIC 2010, Zhangjiajie, China, 14-15 July 2010
2010 | Conference paper
Source: Self-asserted source
Cong Sun

Peer review (5 reviews for 4 publications/grants)

Review activity for Computers & security. (1)
Review activity for Cybersecurity. (1)
Review activity for Expert systems with applications. (2)
Review activity for Internet of things. (1)