default search action
Degang Sun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Degang Sun, Yanyu Zhou, Zhengping Hu:
Video Behavior Recognition Model Based on Spatial Long-Distance Modeling Combined With Time-Domain Shift. IEEE Access 12: 99213-99222 (2024) - [j14]Haitian Yang, Degang Sun, Yan Wang, Weiqing Huang:
DSGN: Log-based anomaly diagnosis with dynamic semantic gate networks. Inf. Sci. 680: 121174 (2024) - [j13]Haitian Yang, Degang Sun, Weiqing Huang:
DualAttlog: Context aware dual attention networks for log-based anomaly detection. Neural Networks 180: 106680 (2024) - [c62]Guokun Xu, Weijie Wang, Degang Sun, Yanpeng Ma, Yan Wang, Weiqing Huang:
MLNT: A Multi-Level Network Traps Deployment Method. CSCWD 2024: 42-47 - [c61]Chaochao Liu, Degang Sun, Zhixin Shi, Ning Zhang:
A New Method of Cyber Deception Defense. ISCC 2024: 1-7 - [c60]Zijun Cheng, Qiujian Lv, Jinyuan Liang, Yan Wang, Degang Sun, Thomas Pasquier, Xueyuan Han:
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance. SP 2024: 3533-3551 - [i15]Haitian Yang, Degang Sun, Wen Liu, Yanshu Li, Yan Wang, Weiqing Huang:
ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis. CoRR abs/2402.11841 (2024) - [i14]Xingyuan Wei, Ce Li, Qiujian Lv, Ning Li, Degang Sun, Yan Wang:
Mitigating the Impact of Malware Evolution on API Sequence-based Windows Malware Detector. CoRR abs/2408.01661 (2024) - [i13]Xingyuan Wei, Yichen Liu, Ce Li, Ning Li, Degang Sun, Yan Wang:
PromptSAM+: Malware Detection based on Prompt Segment Anything Model. CoRR abs/2408.02066 (2024) - 2023
- [c59]Zijun Cheng, Rujie Dai, Leiqi Wang, Ziyang Yu, Qiujian Lv, Yan Wang, Degang Sun:
GHunter: A Fast Subgraph Matching Method for Threat Hunting. CSCWD 2023: 1014-1019 - [c58]Wen Liu, Degang Sun, Yan Wang, Zhongyuan Chen, Xinbo Han, Haitian Yang:
ABTD-Net: Autonomous Baggage Threat Detection Networks for X-ray Images. ICME 2023: 1229-1234 - [c57]Haitian Yang, Degang Sun, Wen Liu, Yanshu Li, Yan Wang, Weiqing Huang:
ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis. ICONIP (4) 2023: 200-212 - [c56]Haitian Yang, Degang Sun, Yan Wang, Nan Zhao, Shixiang Zhang, Weiqing Huang:
AdaptParse: Adaptive Contextual Aware Attention Network for Log Parsing via Word Classification. IJCNN 2023: 1-8 - [c55]Wen Liu, Degang Sun, Haitian Yang, He Zhu, Yan Wang:
IAD-Net: Multivariate KPIs Interpretable Anomaly Detection with Dual Gated Residual Fusion Networks. TrustCom 2023: 686-693 - [c54]Degang Sun, Guokun Xu, Weijie Wang, Yan Wang, Qiujian Lv, Xinxing Zhou, Zhiqi Li:
LWVN: A Lightweight Virtual Network View Method to Defend Lateral Movement. TrustCom 2023: 1214-1221 - [c53]Zheng Yang, Degang Sun, Yan Wang, Xinbo Han, Chen Meng, Weiqing Huang:
DTrap: A cyberattack-defense confrontation technique based on Moving Target Defense. TrustCom 2023: 2652-2659 - [i12]Zijun Cheng, Qiujian Lv, Jinyuan Liang, Yan Wang, Degang Sun, Thomas Pasquier, Xueyuan Han:
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance. CoRR abs/2308.05034 (2023) - 2022
- [j12]Dongmei Zhu, Degang Sun, Dongbo Wang:
Dual attention mechanism network for lung cancer images super-resolution. Comput. Methods Programs Biomed. 226: 107101 (2022) - [j11]Ce Li, Qiujian Lv, Ning Li, Yan Wang, Degang Sun, Yuanyuan Qiao:
A novel deep framework for dynamic malware detection based on API sequence intrinsic features. Comput. Secur. 116: 102686 (2022) - [j10]Ce Li, Zijun Cheng, He Zhu, Leiqi Wang, Qiujian Lv, Yan Wang, Ning Li, Degang Sun:
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning. Comput. Secur. 122: 102872 (2022) - [j9]Haitian Yang, Xuan Zhao, Yan Wang, Degang Sun, Wei Chen, Weiqing Huang:
BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection. Knowl. Inf. Syst. 64(8): 2189-2213 (2022) - [c52]Ziwen Cao, Siye Wang, Degang Sun, Yanfang Zhang, Yue Feng, Shang Jiang:
ITAR: A Method for Indoor RFID Trajectory Automatic Recovery. CollaborateCom (2) 2022: 400-418 - [c51]Ruwen Bai, Min Li, Bo Meng, Fengfa Li, Miao Jiang, Junxing Ren, Degang Sun:
Hierarchical Graph Convolutional Skeleton Transformer for Action Recognition. ICME 2022: 1-6 - [c50]Zijun Cheng, Degang Sun, Leiqi Wang, Qiujian Lv, Yan Wang:
MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios. ISCC 2022: 1-6 - [c49]Rui Mao, Heming Ji, Di Cheng, Xiaoyu Wang, Yan Wang, Degang Sun:
Implicit Continuous Authentication Model Based on Mobile Terminal Touch Behavior. ISCC 2022: 1-7 - [c48]Yang Yang, Min Li, Bo Meng, Zihao Huang, Junxing Ren, Degang Sun:
Rethinking the Misalignment Problem in Dense Object Detection. ECML/PKDD (3) 2022: 427-442 - [c47]Ziwen Cao, Degang Sun, Siye Wang, Yanfang Zhang, Yue Feng, Shang Jiang:
R-TDBF: An Environmental Adaptive Method for RFID Redundant Data Filtering. WASA (2) 2022: 582-594 - [c46]Degang Sun, Yue Cui, Siye Wang, Yanfang Zhang:
On Eliminating Blocking Interference of RFID Unauthorized Reader Detection. WASA (1) 2022: 591-602 - [c45]Jingru Geng, Degang Sun, Wen Wang, Yiqing Liu:
Interference Prediction between LEO Constellations based on A Novel Joint Prediction Model of Atmospheric Attenuation. WCNC 2022: 950-955 - [i11]Degang Sun, Yue Cui, Siye Wang, Yanfang Zhang:
On eliminating blocking interference of RFID unauthorized reader detection system. CoRR abs/2201.05931 (2022) - 2021
- [j8]Changhai Ou, Siew-Kei Lam, Degang Sun, Xinping Zhou, Kexin Qiao, Qu Wang:
SNR-Centric Power Trace Extractors for Side-Channel Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(4): 620-632 (2021) - [c44]Tingting Wang, Xufeng Zhao, Qiujian Lv, Bo Hu, Degang Sun:
Density Weighted Diversity Based Query Strategy for Active Learning. CSCWD 2021: 156-161 - [c43]Degang Sun, Meichen Liu, Meimei Li, Zhixin Shi, Pengcheng Liu, Xu Wang:
DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network. CSCWD 2021: 335-341 - [c42]Degang Sun, Jingru Geng, Wen Wang, Yiqing Lin:
A Novel Joint Prediction Model of Atmospheric Attenuation for Co-Frequency Interference Analysis Between LEO Constellations. HPCC/DSS/SmartCity/DependSys 2021: 769-774 - [c41]Tingting Wang, Qiujian Lv, Bo Hu, Degang Sun:
A Few-Shot Class-Incremental Learning Approach for Intrusion Detection. ICCCN 2021: 1-8 - [c40]Haitian Yang, Xuan Zhao, Degang Sun, Yan Wang, Weiqing Huang:
Sprelog: Log-Based Anomaly Detection with Self-matching Networks and Pre-trained Models. ICSOC 2021: 736-743 - [c39]Degang Sun, Sixue Lu, Wen Wang:
CAAE: A Novel Wireless Spectrum Anomaly Detection Method with Multiple Scoring Criterion. ICT 2021: 1-5 - [c38]Degang Sun, Yunting Guo, Min Yu, Gang Li, Chao Liu, Jianguo Jiang, Weiqing Huang:
FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching. IJCNN 2021: 1-8 - [c37]Haitian Yang, Degang Sun, Yan Wang, He Zhu, Ning Li, Weiqing Huang:
FKTAN: Fusion Keystroke Time-Textual Attention Networks for Continuous Authentication. ISCC 2021: 1-6 - [c36]Haitian Yang, Xuan Zhao, Degang Sun, Yan Wang, He Zhu, Chao Ma, Weiqing Huang:
Multi-Modal fake news Detection on Social Media with Dual Attention Fusion Networks. ISCC 2021: 1-6 - [c35]Ruwen Bai, Xiang Meng, Bo Meng, Miao Jiang, Junxing Ren, Yang Yang, Min Li, Degang Sun:
Graph Attention Convolutional Network with Motion Tempo Enhancement for Skeleton-Based Action Recognition. PRICAI (3) 2021: 152-165 - [c34]Yang Yang, Min Li, Bo Meng, Zihao Huang, Junxing Ren, Degang Sun:
Objects as Extreme Points. PRICAI (3) 2021: 195-208 - [c33]Degang Sun, Yue Cui, Yue Feng, Jinxing Xie, Siye Wang, Yanfang Zhang:
URTracker: Unauthorized Reader Detection and Localization Using COTS RFID. WASA (1) 2021: 339-350 - [i10]Yang Yang, Min Li, Bo Meng, Zihao Huang, Junxing Ren, Degang Sun:
EPP-Net: Extreme-Point-Prediction-Based Object Detection. CoRR abs/2104.14066 (2021) - [i9]Yang Yang, Min Li, Bo Meng, Junxing Ren, Degang Sun, Zihao Huang:
Rethinking the Aligned and Misaligned Features in One-stage Object Detection. CoRR abs/2108.12176 (2021) - [i8]Ruwen Bai, Min Li, Bo Meng, Fengfa Li, Junxing Ren, Miao Jiang, Degang Sun:
GCsT: Graph Convolutional Skeleton Transformer for Action Recognition. CoRR abs/2109.02860 (2021) - 2020
- [j7]Degang Sun, Yang Yang, Min Li, Jian Yang, Bo Meng, Ruwen Bai, Linghan Li, Junxing Ren:
A Scale Balanced Loss for Bounding Box Regression. IEEE Access 8: 108438-108448 (2020) - [j6]Degang Sun, Qiaoyu Zhang, Dong Wei, Meng Zhang:
A Secure Constellation Design for Polarized Modulation in Wireless Communications. IEEE Access 8: 130588-130597 (2020) - [j5]Zheng-ping Hu, Le Zhang, Shufang Li, Degang Sun:
Parallel spatial-temporal convolutional neural networks for anomaly detection and location in crowded scenes. J. Vis. Commun. Image Represent. 67: 102765 (2020) - [c32]Meichen Liu, Meimei Li, Degang Sun, Zhixin Shi, Bin Lv, Pengcheng Liu:
Terminator: a data-level hybrid framework for intellectual property theft detection and prevention. CF 2020: 142-149 - [c31]Degang Sun, Huiyan Li, Dong Wei, Qiaoyu Zhang:
Spectrum Demand Estimation Model for NGSO Communication Systems Considering Time Delay Constraints and Different Spectrum Access Strategies. ICT 2020: 1-5
2010 – 2019
- 2019
- [j4]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou:
Group Collision Attack. IEEE Trans. Inf. Forensics Secur. 14(4): 939-953 (2019) - [c30]Degang Sun, Yulan Hu, Zhixin Shi, Guokun Xu, Wei Zhou:
An Efficient Anomaly Detection Framework for Electromagnetic Streaming Data. ICBDC 2019: 151-155 - [c29]Degang Sun, Zhengrong Wu, Yan Wang, Qiujian Lv, Bo Hu:
Risk Prediction for Imbalanced Data in Cyber Security : A Siamese Network-based Deep Learning Classification Framework. IJCNN 2019: 1-8 - [c28]Degang Sun, Zhengrong Wu, Yan Wang, Qiujian Lv, Bo Hu:
Cyber Profiles Based Risk Prediction of Application Systems for Effective Access Control. ISCC 2019: 1-7 - [i7]Changhai Ou, Degang Sun, Siew-Kei Lam, Xinping Zhou, Kexin Qiao, Qu Wang:
SNR-Centric Power Trace Extractors for Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2019: 1487 (2019) - 2017
- [j3]Bin Kong, Kun Yang, Degang Sun, Meimei Li, Zhixin Shi:
Distinguishing flooding distributed denial of service from flash crowds using four data mining approaches. Comput. Sci. Inf. Syst. 14(3): 839-856 (2017) - [c27]Degang Sun, Kun Yang, Bin Lv, Zhixin Shi:
Could we beat a new mimicking attack? APNOMS 2017: 247-250 - [c26]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher. CARDIS 2017: 70-87 - [c25]Degang Sun, Kun Yang, Zhixin Shi, Chao Chen:
A New Mimicking Attack by LSGAN. ICTAI 2017: 441-447 - [c24]Degang Sun, Kun Yang, Zhixin Shi, Bin Lv:
A Behavior-Based Method for Distinction of Flooding DDoS and Flash Crowds. KSEM 2017: 129-136 - [c23]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
Categorising and Comparing Cluster-Based DPA Distinguishers. SAC 2017: 442-458 - [c22]Degang Sun, Kun Yang, Zhixin Shi, Yan Wang:
A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior. TrustCom/BigDataSE/ICESS 2017: 65-72 - [c21]Degang Sun, Kun Yang, Zhixin Shi, Yan Wang:
Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest. WASA 2017: 729-740 - [c20]Degang Sun, Yiwei Li, Yanyun Xu, Jianlin Hu:
A Novel Method for Specific Emitter Identification Based on Singular Spectrum Analysis. WCNC 2017: 1-6 - [i6]Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Juan Ai:
Towards Easy Key Enumeration. IACR Cryptol. ePrint Arch. 2017: 254 (2017) - [i5]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou:
Profiling Good Leakage Models For Masked Implementations. IACR Cryptol. ePrint Arch. 2017: 660 (2017) - [i4]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
Categorising and Comparing Cluster-Based DPA Distinguishers. IACR Cryptol. ePrint Arch. 2017: 764 (2017) - [i3]Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou:
Towards Optimal Pre-processing in Leakage Detection. IACR Cryptol. ePrint Arch. 2017: 939 (2017) - [i2]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher. IACR Cryptol. ePrint Arch. 2017: 1051 (2017) - [i1]Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Wei Cheng:
Manifold Learning Towards Masking Implementations: A First Study. IACR Cryptol. ePrint Arch. 2017: 1112 (2017) - 2016
- [j2]Degang Sun, Jun Shi, Dong Wei, Meng Zhang, Wei-qing Huang:
Method for detecting text information leakage in electromagnetic radiation from a computer display. IET Inf. Secur. 10(6): 413-417 (2016) - [j1]Degang Sun, Jun Shi, Dong Wei, Meng Zhang, Wei-qing Huang:
Efficient and anti-interference method of synchronising information extraction for cideo leaking signal. IET Signal Process. 10(1): 63-68 (2016) - [c19]Jun Shi, Degang Sun, Abbas Yongaçoglu, Meng Zhang, Dong Wei:
Computer recognition based on the compromising emanations fingerprint. CCECE 2016: 1-6 - [c18]Degang Sun, Jie Zhang, Wei Fan, Tingting Wang, Chao Liu, Wei-qing Huang:
SPLM: Security Protection of Live Virtual Machine Migration in Cloud Computing. SCC@AsiaCCS 2016: 2-9 - [c17]Changhai Ou, Zhu Wang, Juan Ai, Xinping Zhou, Degang Sun, Victor E. DeBrunner:
Error Tolerance based Single Interesting Point Side Channel CPA Distinguisher. AsiaCCS 2016: 819-827 - [c16]Wei Fan, Zhujun Zhang, Tingting Wang, Bo Hu, Sihan Qing, Degang Sun:
Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System. ICICS 2016: 54-70 - [c15]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai:
Group Verification Based Multiple-Differential Collision Attack. ICICS 2016: 145-156 - [c14]Jun Shi, Abbas Yongaçoglu, Degang Sun, Dong Wei, Meng Zhang:
A novel wavelet based independent component analysis method for pre-processing computer video leakage signal. ISCC 2016: 334-339 - [c13]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai, Na Pang:
Enhanced Correlation Power Analysis by Biasing Power Traces. ISC 2016: 59-72 - [c12]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai:
Uncertain? No, It's Very Certain! - Recovering the Key from Guessing Entropy Enhanced CPA. SEC 2016: 308-320 - [c11]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai:
Power Traces Clipping and Splicing Enhanced Correlation Collision Analysis. Trustcom/BigDataSE/ISPA 2016: 989-995 - [c10]Xinping Zhou, Degang Sun, Zhu Wang, Changhai Ou, Juan Ai:
Double-Key Recovery Based Correlation Power Analysis. Trustcom/BigDataSE/ISPA 2016: 1016-1022 - [c9]Degang Sun, Jun Shi, Xuejie Ding, Meng Zhang, Wei-qing Huang:
Method for Detecting Information Leakage from Computer Display in Electromagnetic Radiation. Trustcom/BigDataSE/ISPA 2016: 2041-2046 - 2015
- [c8]Degang Sun, Kun Yang, Wei-qing Huang, Yan Wang, Bo Hu:
An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks. ICICS 2015: 303-310 - [c7]Degang Sun, Xinping Zhou, Zhu Wang, Changhai Ou, Wei-qing Huang, Juan Ai:
POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power Analysis. SecureComm 2015: 598-601 - [c6]Wei Fan, Wei-qing Huang, Zhujun Zhang, Ye Wang, Degang Sun:
A Near Field Communication(NFC) Security Model Based on OSI Reference Model. TrustCom/BigDataSE/ISPA (1) 2015: 1324-1328 - 2014
- [c5]Jun Shi, Wei-qing Huang, Dong Wei, Degang Sun:
A novel method for computer video leaking signal detection. ASONAM 2014: 918-923 - [c4]Degang Sun, Jun Shi, Dong Wei, Meng Zhang, Wei-qing Huang:
Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Electromagnetic Radiation. ICICS 2014: 191-199 - [c3]Degang Sun, Jun Shi, Dong Wei, Meng Zhang:
A low-cost and efficient method of determining the best frequency band for video leaking signal reconstruction. ICSAI 2014: 624-628 - [c2]Degang Sun, Wen Yang, Meng Zhang, Shaojian Huang:
Classified removable storage medium control based on the access control matrix. ICSAI 2014: 629-633
2000 – 2009
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint