default search action
Xiaoyan Sun 0003
Person information
- affiliation: Worcester Polytechnic Institute, Worcester, MA, USA
- affiliation (former): California State University, Sacramento, CA, USA
- affiliation (Phd): Pennsylvania State University, PA, USA
Other persons with the same name
- Xiaoyan Sun (aka: Xiao-Yan Sun) — disambiguation page
- Xiaoyan Sun 0001 — University of Science and Technology of China, Hefei, China (and 2 more)
- Xiaoyan Sun 0002 — China University of Mining and Technology, School of Information and Control Engineering, Xuzhou, China
- Xiaoyan Sun 0004 — Old Dominion University, Department of Electrical and Computer Engineering, Norfolk, VA, USA
- Xiaoyan Sun 0005 — High-Tech Institute, Xi'an, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Qingtian Zou, Lan Zhang, Xiaoyan Sun, Anoop Singhal, Peng Liu:
Using Explainable AI for Neural Network-Based Network Attack Detection. Computer 57(5): 78-85 (2024) - [j6]Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Analysis of neural network detectors for network attacks. J. Comput. Secur. 32(3): 193-220 (2024) - [c25]Lan Zhang, Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Evaluating Large Language Models for Real-World Vulnerability Repair in C/C++ Code. IWSPA@CODASPY 2024: 49-58 - [c24]Ravi Nitinkumar Patel, Xiaomei Zhang, Xiaoyan Sun, Jun Dai:
Exploring Scalable Bayesian Networks For Identification of Zero-day Attack Paths. SVCC 2024: 1-8 - [i5]Jin Wei, Ping Chen, Kangjie Lu, Jun Dai, Xiaoyan Sun:
SQLaser: Detecting DBMS Logic Bugs with Clause-Guided Fuzzing. CoRR abs/2407.04294 (2024) - [i4]Jin Wei, Ping Chen, Jun Dai, Xiaoyan Sun, Zhihao Zhang, Chang Xu, Yi Wanga:
HuntFUZZ: Enhancing Error Handling Testing through Clustering Based Fuzzing. CoRR abs/2407.04297 (2024) - [i3]Chao Wang, Shubing Yang, Xiaoyan Sun, Jun Dai, Dongfang Zhao:
Enabling Practical and Privacy-Preserving Image Processing. CoRR abs/2409.03568 (2024) - [i2]Xue Tan, Hao Luan, Mingyu Luo, Xiaoyan Sun, Ping Chen, Jun Dai:
Knowledge Database or Poison Base? Detecting RAG Poisoning Attack through LLM Activations. CoRR abs/2411.18948 (2024) - 2023
- [c23]Anand Surendra Masurkar, Xiaoyan Sun, Jun Dai:
Using Blockchain for Decentralized Artificial Intelligence with Data Privacy. ICNC 2023: 195-201 - [c22]Niteesh Reddy Thota, Xiaoyan Sun, Jun Dai:
Early Rumor Detection in Social Media Based on Graph Convolutional Networks. ICNC 2023: 516-522 - [c21]Rajani Suryavanshi, Xiaoyan Sun, Jun Dai:
Identifying Superspreaders by Ranking System Object Instance Graphs. IFIP Int. Conf. Digital Forensics 2023: 179-201 - [c20]Zhimin Tang, Duohe Ma, Xiaoyan Sun, Kai Chen, Liming Wang, Junye Jiang:
Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense. ISCC 2023: 568-574 - 2022
- [j5]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach. J. Comput. Secur. 30(4): 541-570 (2022) - [c19]Duohe Ma, Zhimin Tang, Xiaoyan Sun, Lu Guo, Liming Wang, Kai Chen:
Game Theory Approaches for Evaluating the Deception-based Moving Target Defense. MTD@CCS 2022: 67-77 - [c18]Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Attacks on ML Systems: From Security Analysis to Attack Mitigation. ICISS 2022: 119-138 - [c17]Gargi Gopalkrishna Prabhugaonkar, Xiaoyan Sun, Xuyu Wang, Jun Dai:
Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning. SVCC 2022: 120-136 - [e1]Luis Bathen, Gökay Saldamli, Xiaoyan Sun, Thomas H. Austin, Alex J. Nelson:
Silicon Valley Cybersecurity Conference - Third Conference, SVCC 2022, Virtual Event, August 17-19, 2022, Revised Selected Papers. Communications in Computer and Information Science 1683, Springer 2022, ISBN 978-3-031-24048-5 [contents] - 2021
- [c16]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep Learning for Detecting Network Attacks: An End-to-End Approach. DBSec 2021: 221-234 - 2020
- [j4]Qingtian Zou, Xiaoyan Sun, Peng Liu, Anoop Singhal:
An Approach for Detection of Advanced Persistent Threat Attacks. Computer 53(12): 92-96 (2020) - [c15]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security. IWSPA@CODASPY 2020: 43-52 - [c14]Jait Purohit, Xuyu Wang, Shiwen Mao, Xiaoyan Sun, Chao Yang:
Fingerprinting-based Indoor and Outdoor Localization with LoRa and Deep Learning. GLOBECOM 2020: 1-6 - [c13]Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu:
WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense. ICWS 2020: 364-371 - [c12]Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu:
What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense. IPCCC 2020: 1-8 - [i1]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks. CoRR abs/2012.12743 (2020)
2010 – 2019
- 2018
- [j3]Xiaoyan Sun, Peng Liu, Anoop Singhal:
Toward Cyberresiliency in the Context of Cloud Computing [Resilient Security]. IEEE Secur. Priv. 16(6): 71-75 (2018) - [j2]Xiaoyan Sun, Jun Dai, Anoop Singhal, Peng Liu:
Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud. EAI Endorsed Trans. Security Safety 4(13): e3 (2018) - [j1]Xiaoyan Sun, Jun Dai, Peng Liu, Anoop Singhal, John Yen:
Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths. IEEE Trans. Inf. Forensics Secur. 13(10): 2506-2521 (2018) - [c11]Chen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun, Sencun Zhu:
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs. DBSec 2018: 330-348 - [c10]Swarna Gopalan, Aditi Kulkarni, Arpitaben Narendrabhai Shah, Jun Dai, Jinsong Ouyang, Pinar Muyan-Özçelik, Xiaoyan Sun:
Don't Be Surprised: I See Your Mobile App Stealing Your Data. ICNC 2018: 774-778 - [c9]Yulong Dong, Jun Dai, Xiaoyan Sun:
A Mobile Botnet That Meets Up at Twitter. SecureComm (2) 2018: 3-21 - 2017
- [c8]Xiaoyan Sun, Anoop Singhal, Peng Liu:
Towards Actionable Mission Impact Assessment in the Context of Cloud Computing. DBSec 2017: 259-274 - [p1]Xiaoyan Sun, Jun Dai, Anoop Singhal, Peng Liu:
Enterprise-Level Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 66-109 - 2016
- [c7]Xiaoyan Sun, Jun Dai, Peng Liu, Anoop Singhal, John Yen:
Towards probabilistic identification of zero-day attack paths. CNS 2016: 64-72 - 2015
- [c6]Xiaoyan Sun, Anoop Singhal, Peng Liu:
Who Touched My Mission: Towards Probabilistic Mission Impact Assessment. SafeConfig@CCS 2015: 21-26 - 2014
- [c5]Xiaoyan Sun, Jun Dai, Anoop Singhal, Peng Liu:
Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks. SecureComm (1) 2014: 3-23 - 2013
- [c4]Xiaoyan Sun, Jun Dai, Peng Liu:
SKRM: Where security techniques talk to each other. CogSIMA 2013: 163-166 - [c3]Jun Dai, Xiaoyan Sun, Peng Liu:
Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies. ESORICS 2013: 536-555 - 2012
- [c2]Jun Dai, Xiaoyan Sun, Peng Liu, Nicklaus A. Giacobe:
Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model. CyberSecurity 2012: 83-92
2000 – 2009
- 2009
- [c1]Xiaoyan Sun, Yuanlu Bao, Jun Dai, Wei Lu, Renhua Gao:
Performance analysis of inter-vehicle communications in multilane traffic streams. VNC 2009: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-07 23:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint