Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Hao Sun 0004
@article{DBLP:journals/spe/SunWBS17, author = {Hao Sun and Xiaofeng Wang and Rajkumar Buyya and Jinshu Su}, title = {CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices}, journal = {Softw. Pract. Exp.}, volume = {47}, number = {3}, pages = {421--441}, year = {2017}, url = {https://doi.org/10.1002/spe.2420}, doi = {10.1002/SPE.2420}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/SunWBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunSWCLH17, author = {Hao Sun and Jinshu Su and Xiaofeng Wang and Rongmao Chen and Yujing Liu and Qiaolin Hu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {PriMal: Cloud-Based Privacy-Preserving Malware Detection}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {153--172}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_9}, doi = {10.1007/978-3-319-59870-3\_9}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunSWCLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/LiSWSC17, author = {Jie Li and Jinshu Su and Xiaofeng Wang and Hao Sun and Shuhui Chen}, editor = {Sheng Wen and Wei Wu and Aniello Castiglione}, title = {CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via Reversible Sketch}, booktitle = {Cyberspace Safety and Security - 9th International Symposium, {CSS} 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10581}, pages = {119--134}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69471-9\_9}, doi = {10.1007/978-3-319-69471-9\_9}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/css/LiSWSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/ChenWZSSY15, author = {Peixin Chen and Xiaofeng Wang and Baokang Zhao and Hao Sun and Jinshu Su and Ilsun You}, editor = {Leonard Barolli and Fatos Xhafa and Marek R. Ogiela and Lidia Ogiela}, title = {An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups}, booktitle = {10th International Conference on Broadband and Wireless Computing, Communication and Applications, {BWCCA} 2015, Krakow, Poland, November 4-6, 2015}, pages = {364--369}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/BWCCA.2015.9}, doi = {10.1109/BWCCA.2015.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bwcca/ChenWZSSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/RenWSXZW15, author = {Peige Ren and Xiaofeng Wang and Hao Sun and Fen Xu and Baokang Zhao and Chunqing Wu}, editor = {Ismail Khalil and Erich J. Neuhold and A Min Tjoa and Li Da Xu and Ilsun You}, title = {An Efficient Unsavory Data Detection Method for Internet Big Data}, booktitle = {Information and Communication Technology - Third {IFIP} {TC} 5/8 International Conference, ICT-EurAsia 2015, and 9th {IFIP} {WG} 8.9 Working Conference, {CONFENIS} 2015, Held as Part of {WCC} 2015, Daejeon, Korea, October 4-7, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9357}, pages = {213--220}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24315-3\_21}, doi = {10.1007/978-3-319-24315-3\_21}, timestamp = {Tue, 29 Dec 2020 18:35:00 +0100}, biburl = {https://dblp.org/rec/conf/ict-eurasia/RenWSXZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/RenWZWS15, author = {Peige Ren and Xiaofeng Wang and Baokang Zhao and Chunqing Wu and Hao Sun}, title = {OpenSRN: {A} software-defined semantic routing network architecture}, booktitle = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops, Hong Kong, China, April 26 - May 1, 2015}, pages = {101--102}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFCOMW.2015.7179363}, doi = {10.1109/INFCOMW.2015.7179363}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/RenWZWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/SunWSC15, author = {Hao Sun and Xiaofeng Wang and Jinshu Su and Peixin Chen}, editor = {Bhavani Thuraisingham and XiaoFeng Wang and Vinod Yegneswaran}, title = {RScam: Cloud-Based Anti-Malware via Reversible Sketch}, booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {164}, pages = {157--174}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28865-9\_9}, doi = {10.1007/978-3-319-28865-9\_9}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/SunWSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoWWHCS15, author = {Yue{-}Bin Luo and Baosheng Wang and Xiaofeng Wang and Xiao{-}Feng Hu and Gui{-}Lin Cai and Hao Sun}, title = {{RPAH:} Random Port and Address Hopping for Thwarting Internal and External Adversaries}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {263--270}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.383}, doi = {10.1109/TRUSTCOM.2015.383}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuoWWHCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/RenWWZS14, author = {Peige Ren and Xiaofeng Wang and Chunqing Wu and Baokang Zhao and Hao Sun}, editor = {Linawati and Made Sudiana Mahendra and Erich J. Neuhold and A Min Tjoa and Ilsun You}, title = {A Semantic-Based Malware Detection System Design Based on Channels}, booktitle = {Information and Communication Technology - Second {IFIP} {TC5/8} International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8407}, pages = {653--662}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55032-4\_67}, doi = {10.1007/978-3-642-55032-4\_67}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/RenWWZS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/RenWSZW14, author = {Peige Ren and Xiaofeng Wang and Hao Sun and Baokang Zhao and Chunqing Wu}, editor = {Linawati and Made Sudiana Mahendra and Erich J. Neuhold and A Min Tjoa and Ilsun You}, title = {An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources}, booktitle = {Information and Communication Technology - Second {IFIP} {TC5/8} International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8407}, pages = {663--673}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55032-4\_68}, doi = {10.1007/978-3-642-55032-4\_68}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/RenWSZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.