近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
期刊论文
NingXi,JingLv,CongSun,JianfengMa,SecureServiceCompositionwithQuantitativeInformationFlowEvaluationinMobileComputingEnvironments.Entropy2019,21(8),753.
TengLi,JianfengMa,QingqiPei,HoubingSong,YulongShen,CongSun,DAPV:DiagnosingAnomaliesinMANETsRoutingWithProvenanceandVerification.IEEEAccess,2019,7:35302-35316.
TengLi,JianfengMa,CongSun,SRDPV:secureroutediscoveryandprivacy-preservingverificationinMANETs.WirelessNetworks25(4):1731-1747,Springer,2019.
CongSun,JiaoLiu,YinjuanJie,YuwanMa,JianfengMa.Ridra:ARigorousDecentralizedRandomizedAuthenticationinVANETs.IEEEAccess,2018,6:50358-50371.
NingXi,JianfengMa,CongSun,DiLu,YulongShen,Informationflowcontrolonencrypteddataforservicecompositionamongmultipleclouds,DistributedandParallelDatabases,Springer,2018,36(3):511-527.
PengbinFeng,JianfengMa,CongSun,XinpengXu,YuwanMa,ANovelDynamicAndroidMalwareDetectionSystemWithEnsembleLearning.IEEEAccess,2018,6:30996-31011.
TengLi,JianfengMa,CongSun,NingXi,PVad:Privacy-PreservingVerificationforSecureRoutinginAdHocNetworks.JournalofInformationScienceandEngineering,2018,34(4):943-960.
TengLi,JianfengMa,CongSun,Dlog:diagnosingroutereventswithsyslogsforanomalydetection.TheJournalofSupercomputing,Springer,2018,74(2):845-867.
CongSun,JiaoLiu,XinpengXu,JianfengMa,APrivacy-PreservingMutualAuthenticationResistingDoSAttacksinVANETs.IEEEAccess,2017,5:24012-24022.
DiLu,JianfengMa,CongSun,QixuanWu,ZhaochangSun,NingXi,BuildingaSecureSchemeforaTrustedHardwareSharingEnvironment.IEEEAccess,2017,5:20260-20271.
TengLi,JianfengMa,CongSun,NetPro:DetectingAttacksinMANETRoutingwithProvenanceandVerification.SCIENCECHINAInformationSciences,2017,60:118101:1-118001:3.
PengbinFeng,JianfengMa,CongSun,SelectingCriticalDataFlowsinAndroidApplicationsforAbnormalBehaviorDetection.MobileInformationSystems,2017,7397812:1-7397812:16.
NingXi,DiLu,CongSun,JianfengMa,YulongShen,DistributedSecureServiceCompositionwithDeclassificationinMobileClouds.MobileInformationSystems,2017,7469342:1-7469342:13.
DiLu,JianfengMa,CongSun,XindiMa,NingXi,Credit-BasedSchemeforSecurity-awareandFairness-awareResourceAllocationinCloudComputing.SCIENCECHINAInformationSciences,2017,60(5),52103:1-52103:17.
CongSun,JianfengMa,QingsongYao,Onthearchitectureanddevelopmentlifecycleofsecurecyber-physicalsystems.JournalofCommunicationsandInformationNetworks,Springer,2016,1(4):1-21(invited).
PengbinFeng,CongSun,JianfengMa,MeasuringtheRiskValueofSensitiveDataflowPathinAndroidApplications.SecurityandCommunicationNetworks,2016,9(18):5918-5933.
NingXi,CongSun,JianfengMa,XiaofengChen,YulongShen,DistributedInformationFlowVerificationforSecureServiceCompositioninSmartSensorNetwork.ChinaCommunications,April2016,13(4):119-130.
NingXi,CongSun,JianfengMa,YulongShen,Secureservicecompositionwithinformationflowcontrolinserviceclouds.FutureGenerationComputerSystems,Volume49,August2015:142-148.
CongSun,NingXi,ShengGao,ZhongChen,JianfengMa,Automatedenforcementforrelaxedinformationreleasewithreferencepoints.SCIENCECHINAInformationSciences,2014,57(11):1-19.
TaoZhang,JianfengMa,QiLi,NingXi,CongSun,Trust-basedservicecompositioninmulti-domainenvironmentsundertimeconstraint.SCIENCECHINAInformationSciences,2014,57(9):1-16.
ShengGao,JianfengMa,CongSun,XinghuaLi,Balancingtrajectoryprivacyanddatautilityusingapersonalizedanonymizationmodel.JournalofNetworkandComputerApplications,2014,38(2014):125-134.
ShengGao,JianfengMa,WeisongShi,GuoxingZhan,CongSun,TrPF:ATrajectoryPrivacy-PreservingFrameworkforParticipatorySensing.IEEETransactionsonInformationForensicsandSecurity,2013,8(6):874-887.
NingXi,JianfengMa,CongSun,YulongShen,TaoZhang,DistributedInformationFlowVerificationFrameworkfortheCompositionofServiceChaininWirelessSensorNetwork.InternationalJournalofDistributedSensorNetworks(IJDSN),2013:1-10.
会议论文
CongSun,JunChen,PengbinFeng,JianfengMa,CatraDroid:ACallTraceDrivenDetectionofMaliciousBehaiviorsinAndroidApplications.ML4CS'19:TheSecondInternationalConferenceonMachineLearningforCyberSecurity.Springer,2019,(inpress).
TengLi,JianfengMa,QingqiPei,ChengyanMa,DaweiWei,CongSun,Privacy-PreservingVerificationandRoot-CauseTracingTowardsUAVSocialNetworks.ICC2019:1-6.
TengLi,JianfengMa,CongSun,DaweiWei,andNingXi,PVad:Privacy-PreservingVerificationforSecureRoutinginAdHocNetworks.NaNA'17:2017InternationalConferenceonNetworkingandNetworkApplications.IEEE,2017,pp.5-10.
NingXi,CongSun,DiLu,YulongShen,DistributedInformationFlowVerificationonEncryptedDataForServiceCompositioninMultipleClouds.NaNA'17:2017InternationalConferenceonNetworkingandNetworkApplications.IEEE,2017,pp.286-291.
SiqiMa,FerdianThung,DavidLo,CongSun,RobertDeng,VuRLE:AutomaticVulnerabilityDetectionandRepairbyLearningfromExamples.ESORICS'17:theEuropeanSymposiumonResearchinComputerSecurity2017.Springer,2017,pp.229-246.
CongSun,NingXi,JianfengMa,EnforcingGeneralizedRefinement-basedNoninterferenceforSecureInterfaceComposition.COMPSAC'17:the41stAnnualComputerSoftwareandApplicationsConference(Vol.1).IEEE,2017,pp.586-595.
CongSun,PengbinFeng,TengLi,JianfengMa,Data-OrientedInstrumentationagainstInformationLeakagesofAndroidApplications.COMPSAC'17:the41stAnnualComputerSoftwareandApplicationsConference(Vol.2).IEEE,2017,pp.485-490.
CongSun,QingsongYao,JianfengMa,Certia:CertifyingInterfaceAutomataforCyber-PhysicalSystems(Demo).SMARTCOMP'17:the3rdIEEEInternationalConferenceonSmartComputing.IEEE,2017.
QingsongYao,JianfengMa,CongSun,XinghuaLi,JinkuLi,Attackgivesmepower:DoS-defendingconstant-timeprivacy-preservingauthenticationoflow-costdevicessuchasbackscatteringRFIDtags.MSCC'16:the3rdACMWorkshoponMobileSensing,ComputingandCommunication.ACM,2016,pp.23-28.
NingXi,CongSun,JianfengMa,YulongShen,DiLu,DistributedSecureServiceCompositionwithDeclassificationinMobileNetworks.NaNA'16:2016InternationalConferenceonNetworkingandNetworkApplications.IEEE,2016,pp.254-259.
TengLi,JianfengMa,CongSun,CRVad:ConfidentialReasoningandVerificationTowardsSecureRoutinginAdHocNetworks.ICA3PP'15:the15thInternationalConferenceonAlgorithmsandArchitecturesforParallelProcessing.LNCS9530Springer2015,pp.449-462.
SiqiMa,ShaoweiWang,DavidLo,RobertDeng,CongSun,ActiveSemi-SupervisedApproachforCheckingAppBehaviorAgainstItsDescription.COMPSAC'15:the39thAnnualInternationalComputers,SoftwareandApplicationsConference.IEEE,2015,pp.179-184.
CongSun,NingXi,JinkuLi,QingsongYao,JianfengMa,VerifyingSecureInterfaceCompositionforComponent-basedSystemDesigns.APSEC'14:the21stAsia-PacificSoftwareEngineeringConference.IEEE,2014,pp.359-366.
NingXi,JianfengMa,CongSun,TaoZhang,DecentralizedInformationFlowVerificationFrameworkfortheServiceChainCompositioninMobileComputingEnvironments.ICWS'13:IEEE20thInternationalConferenceonWebServices.IEEE,2013,pp.563-570.
TaoZhang,JianfengMa,CongSun,QiLi,NingXi,ServiceCompositioninMulti-DomainEnvironmentunderTimeConstraint.ICWS'13:IEEE20thInternationalConferenceonWebServices.IEEE,2013,pp.227-234.
CongSun,ShengGao,JianfengMa,VerifyingLocation-basedServiceswithDeclassificationEnforcement.APWeb'12:the14thAsia-PacificWebConference.LNCS7235Springer2012,pp.695-702.
CongSun,EnnanZhai,ZhongChen,JianfengMa,AMulti-CompositionalEnforcementonInformationFlowSecurity.ICICS'11:2011InternationalConferenceonInformationandCommunicationsSecurity.LNCS7043Springer2011,pp.345-359.
CongSun,LiyongTang,ZhongChen,ANewEnforcementonDeclassificationwithReachabilityAnalysis.ProceedingsofIEEEConferenceonComputerCommunicationsworkshops.IEEECommunicationSociety,2011,pp.1024-1029.
CongSun,LiyongTang,ZhongChen,EnforcingReactiveNoninterferencewithReachabilityAnalysis.ITNG'11:Proceedingsofthe8thInternationalConferenceonInformationTechnology:NewGenerations.IEEEComputerSociety,2011,pp.321-326.
CongSun,LiyongTang,ZhongChen,EnforcingRelaxedDeclassificationswithReferencePoints.ICIS'11:Proceedingsofthe10thIEEE/ACISInternationalConferenceonComputerandInformationScience.IEEEComputerSociety,2011,pp.76-81.
CongSun,LiyongTang,ZhongChen,SecureInformationFlowinJavaviaReachabilityAnalysisofPushdownSystem.QSIC'10:Proceedingsofthe10thInternationalConferenceonQualitySoftware.IEEEComputerSociety,2010,pp.142-150.
CongSun,LiyongTang,ZhongChen,SecureInformationFlowbyModelCheckingPushdownSystem.UIC-ATC'09:Proceedingsofthe2009SymposiaandWorkshopsonUbiquitous,AutonomicandTrustedComputing.IEEEComputerSociety,2009,pp.586-591.
中文期刊
吴奇烜,马建峰,孙聪,采用完整性威胁树的信息流完整性度量方法,网络与信息安全学报,2019,5(2):2019016
马卓然,马建峰,苗银宾,孙聪,无人机网络中基于状态迁移的访问控制模型,西安电子科技大学学报,2018,45(6):44-50
孙召昌,马建峰,孙聪,卢笛,基于嵌入式可信平台的运行时监控方法.网络与信息安全学报,2017,3(10):44-51.
吴奇烜,马建峰,孙聪,张帅,张双,郑涛,针对扩展动态故障树的约束分析方法.通信学报,2017,38(9):159-166.
刘佼,孙聪,马建峰,焦政达,采用可信平台度量的车辆远程诊断授权协议.西安电子科技大学学报,2017,44(3):49-54,119.
马勇,马建峰,孙聪,张双,崔西宁,李亚晖,飞行控制系统组件化故障模式与影响分析方法.西安电子科技大学学报,2016,43(2):174-179.
孙聪,习宁,高胜,张涛,李金库,马建峰,基于接口精化的广义无干扰性研究.计算机研究与发展,2015,52(7):1631-1641.
高胜,马建峰,姚青松,孙聪,LBS中面向协同位置隐私保护的群组最近邻查询.通信学报,2015,36(3):146-154.
习宁,马建峰,孙聪,卢笛,张涛,基于模型检测的服务链信息流安全可组合验证方法.通信学报,2014,35(11):23-31.
焦政达,马建峰,孙聪,姚青松,新的车辆远程诊断授权协议.通信学报,2014,35(11):146-153.
杨增印,马建峰,孙聪,黄德俊,叶春晓,陆地群,一种利用手指图像测量人体心率的方法.西安电子科技大学学报,2014,41(5):91-97.
孙聪,唐礼勇,陈钟,基于下推系统可达性分析的程序机密消去机制.软件学报,2012,23(8):2149-2162.
孙聪,唐礼勇,陈钟,马建峰,基于加权下推系统优化可达性分析的Java安全信息流研究.计算机研究与发展,2012,49(5):901-912.
孙聪,唐礼勇,陈钟,基于下推系统可达性分析的输出信道信息流检测.计算机科学,2011,38(7):103-107.