default search action
Weiqing Sun
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j17]Xingyi You, Xiaohu Zhao, Yue Wang, Weiqing Sun:
Generation of Face Privacy-Protected Images Based on the Diffusion Model. Entropy 26(6): 479 (2024) - 2023
- [j16]Weiqing Sun, Shengxin Wang, Shen Wei, Pengfei Cao, Yan Zhao, Lechao Xi, Xinlu Liu, Lihua Wang:
An improved PBFT consensus mechanism with trust value evaluation application in the agricultural product trusted traceability system. J. High Speed Networks 29(4): 321-336 (2023) - 2022
- [j15]Weiqing Sun, Jiatai Sun, Xiaohui Wang, Junling Sun, Yunzhou Chai, Lihua Wang:
An Improved H-Algorand Consensus Mechanism With Credibility Assessment Applying in EMR Storage System. IEEE Access 10: 55164-55175 (2022) - [j14]Medha Pujari, Yulexis Pacheco, Bhanu Cherukuri, Weiqing Sun:
A Comparative Study on the Impact of Adversarial Machine Learning Attacks on Contemporary Intrusion Detection Datasets. SN Comput. Sci. 3(5): 412 (2022) - 2021
- [j13]Haiying Li, Kangxin Pei, Weiqing Sun:
Dynamic State Estimation for Power System Based on the Measurement Data Reconstructed by RGAN. IEEE Access 9: 92578-92585 (2021) - [j12]Lipeng Ji, Chenqi Fu, Weiqing Sun:
Soft Fault Diagnosis of Analog Circuits Based on a ResNet With Circuit Spectrum Map. IEEE Trans. Circuits Syst. I Regul. Pap. 68(7): 2841-2849 (2021) - 2020
- [j11]Kunpeng Tian, Weiqing Sun, Dong Han, Ce Yang:
Coordinated Planning With Predetermined Renewable Energy Generation Targets Using Extended Two-Stage Robust Optimization. IEEE Access 8: 2395-2407 (2020) - [j10]Kunpeng Tian, Weiqing Sun, Dong Han, Ce Yang:
Joint Planning and Operation for Renewable- Storage Under Different Financial Incentives and Market Mechanisms. IEEE Access 8: 13998-14012 (2020) - 2019
- [j9]Farha Jahan, Weiqing Sun, Quamar Niyaz, Mansoor Alam:
Security Modeling of Autonomous Systems: A Survey. ACM Comput. Surv. 52(5): 91:1-91:34 (2019) - 2017
- [j8]Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid:
A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN). EAI Endorsed Trans. Security Safety 4(12): e2 (2017) - [j7]Ahmad Y. Javaid, Farha Jahan, Weiqing Sun:
Analysis of Global Positioning System-based attacks and a novel Global Positioning System spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation. Simul. 93(5): 427-441 (2017) - 2016
- [j6]Ahmad Y. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam:
A Deep Learning Approach for Network Intrusion Detection System. EAI Endorsed Trans. Security Safety 3(9): e2 (2016) - 2015
- [j5]Farha Jahan, Ahmad Y. Javaid, Weiqing Sun, Mansoor Alam:
GNSSim: An Open Source GNSS/GPS Framework for Unmanned Aerial Vehicular Network Simulation. EAI Endorsed Trans. Mob. Commun. Appl. 2(6): e2 (2015) - [j4]Ahmad Y. Javaid, Weiqing Sun, Mansoor Alam:
Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation. EAI Endorsed Trans. Scalable Inf. Syst. 2(4): e4 (2015) - 2013
- [j3]Yichi Zhang, Lingfeng Wang, Weiqing Sun:
Trust System Design Optimization in Smart Grid Network Infrastructure. IEEE Trans. Smart Grid 4(1): 184-195 (2013) - 2011
- [j2]Yichi Zhang, Lingfeng Wang, Weiqing Sun, Robert C. Green II, Mansoor Alam:
Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids. IEEE Trans. Smart Grid 2(4): 796-808 (2011) - 2009
- [j1]Zhenkai Liang, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar:
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. ACM Trans. Inf. Syst. Secur. 12(3): 14:1-14:37 (2009)
Conference and Workshop Papers
- 2023
- [c35]Ashish Neupane, Weiqing Sun:
Exploring False Demand Attacks in Power Grids with High PV Penetration. ICISSP 2023: 124-134 - 2022
- [c34]Medha Pujari, Bhanu Cherukuri, Ahmad Y. Javaid, Weiqing Sun:
An Approach to Improve the Robustness of Machine Learning based Intrusion Detection System Models Against the Carlini-Wagner Attack. CSR 2022: 62-67 - [c33]Shengyuan Wen, Weiqing Sun:
SpamFender: A Semi-supervised Incremental Spam Classification System across Social Networks. ICISSP 2022: 388-395 - [c32]Junhui Xiao, Ashish Neupane, Hiba F. Fayoumi, Weiqing Sun:
A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem. ICISSP 2022: 396-403 - 2021
- [c31]Yulexis Pacheco, Weiqing Sun:
Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets. ICISSP 2021: 160-171 - 2020
- [c30]Xinrun Zhang, Quamar Niyaz, Farha Jahan, Weiqing Sun:
Early Detection of Host-based Intrusions in Linux Environment. EIT 2020: 475-479 - [c29]Smirti Dwibedi, Medha Pujari, Weiqing Sun:
A Comparative Study on Contemporary Intrusion Detection Datasets for Machine Learning Research. ISI 2020: 1-6 - [c28]Farha Jahan, Weiqing Sun, Quamar Niyaz:
A Non-Cooperative Game based Model for the Cybersecurity of Autonomous Systems. SP (Workshops) 2020: 202-207 - 2019
- [c27]Safia Rahmat, Quamar Niyaz, Akshay Mathur, Weiqing Sun, Ahmad Y. Javaid:
Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked Systems. UEMCON 2019: 322-328 - 2018
- [c26]Wei Liu, Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid:
A Web-Based Lightweight Testbed for Supporting Network Security Hands-on Labs. EIT 2018: 498-503 - [c25]Akshay Chawan, Weiqing Sun, Ahmad Y. Javaid, Umesh Gurav:
Security Enhancement of Over-the-Air Update for Connected Vehicles. WASA 2018: 853-864 - 2017
- [c24]Safia Rahmat, Quamar Niyaz, Ahmad Y. Javaid, Weiqing Sun:
Normal and anomalous traffic flow pattern analysis for organizational networks. CCECE 2017: 1-4 - 2016
- [c23]Ahmad Maroof Karimi, Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid, Vijay K. Devabhaktuni:
Distributed network traffic feature extraction for a real-time IDS. EIT 2016: 522-526 - 2015
- [c22]Ahmad Y. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam:
A Deep Learning Approach for Network Intrusion Detection System. BICT 2015: 21-26 - [c21]Mingzhe Xu, Weiqing Sun, Mansoor Alam:
Security enhancement of secure USB debugging in Android system. CCNC 2015: 134-139 - [c20]Quamar Niyaz, Weiqing Sun, Rao Xu, Mansoor Alam:
Light VN: A Light-Weight Testbed for Network and Security Experiments. ITNG 2015: 459-464 - [c19]Quamar Niyaz, Weiqing Sun, Mansoor Alam:
Impact on SDN Powered Network Services Under Adversarial Attacks. SCSE 2015: 228-235 - 2014
- [c18]Ahmad Y. Javaid, Weiqing Sun, Mansoor Alam:
UAVNet Simulation in UAVSim: A Performance Evaluation and Enhancement. TRIDENTCOM 2014: 107-115 - [c17]Jizhou Tong, Weiqing Sun, Lingfeng Wang:
A Smart Home Network Simulation Testbed for Cybersecurity Experimentation. TRIDENTCOM 2014: 136-145 - 2013
- [c16]Ahmad Y. Javaid, Weiqing Sun, Mansoor Alam:
UAVSim: A simulation testbed for unmanned aerial vehicle network cyber security analysis. GLOBECOM Workshops 2013: 1432-1436 - 2012
- [c15]Nagajyothi Gunti, Weiqing Sun, Mingzhe Xu, Zidong Liu, Mohammed Y. Niamat, Mansoor Alam:
A Healthcare Information System with Augmented Access Controls. APWeb 2012: 792-795 - [c14]Yichi Zhang, Weiqing Sun, Lingfeng Wang:
Efficient trust node aware routing in ZigBee communication network of smart grid. A-SSCC 2012: 321-326 - [c13]Zhe Li, Weiqing Sun, Lingfeng Wang:
A neural network based distributed intrusion detection system on cloud platform. CCIS 2012: 75-79 - [c12]Swetha Pappala, Mohammed Y. Niamat, Weiqing Sun:
FPGA based key generation technique for anti-counterfeiting methods using Physically Unclonable Functions and artificial intelligence. FPL 2012: 388-393 - [c11]Swetha Pappala, Mohammed Y. Niamat, Weiqing Sun:
FPGA based trustworthy authentication technique using Physically Unclonable Functions and artificial intelligence. HOST 2012: 59-62 - [c10]Swetha Pappala, Mohammed Y. Niamat, Weiqing Sun:
FPGA based device specific key generation method using Physically Uncloanble Functions and neural networks. MWSCAS 2012: 330-333 - [c9]Kang Yao, Weiqing Sun, Mansoor Alam, Mingzhe Xu, Vijay K. Devabhaktuni:
A Real-Time Testbed for Routing Network. TRIDENTCOM 2012: 256-270 - 2011
- [c8]Saketh Bharadwaja, Weiqing Sun, Mohammed Y. Niamat, Fangyang Shen:
Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System. ITNG 2011: 695-700 - [c7]Nagajyothi Gunti, Weiqing Sun, Mohammed Y. Niamat:
I-RBAC: Isolation enabled role-based access control. PST 2011: 79-86 - 2010
- [c6]Weiqing Sun:
Experiences from a Time-Condensed Computer Security Class. ITNG 2010: 482-487 - 2009
- [c5]Chengmin Wang, Weiqing Sun, Tieyan Zhang, Yan Zhang:
Research on Transaction-Item Association Matrix Mining Algorithm in Large-scale Transaction Database. FSKD (2) 2009: 113-117 - 2008
- [c4]Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkatakrishnan:
Expanding Malware Defense by Securing Software Installations. DIMVA 2008: 164-185 - [c3]Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karandikar:
Practical Proactive Integrity Preservation: A Basis for Malware Defense. SP 2008: 248-262 - [c2]Weiqing Sun, Varun Katta, Kumar Krishna, R. Sekar:
V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments. CSET 2008 - 2005
- [c1]Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar:
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. NDSS 2005
Informal and Other Publications
- 2016
- [i1]Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid:
A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN). CoRR abs/1611.07400 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 20:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint