发表论文
[1] 杨海天, 孙德刚, 黄伟庆. DualAttlog: Context awaredualattentionnetworksforlog-basedanomaly detection. NeuralNetworks[J]. 2024, 第 2 作者null(null): [2] 杨海天, 孙德刚, 黄伟庆. DSGN: Log-based anomaly diagnosis with dynamic semantic gate networks. Information Sciences[J]. 2024, 第 2 作者null(null): [3] 孙德刚, 徐国坤, 王伟杰, 王妍, 吕遒健, Xingxing Zhou, Zhiqi Li. LWVN:An Lightweight Virtual Network Methond to Defend Lateral Movement. Trustcom. 2023, 第 1 作者[4] 刘玟, 孙德刚, 杨海天, 祝贺, 王妍. IAD-Net: Multivariate KPIs Interpretable Anomaly Detection with Dual Gated Residual Fusion Networks. 2023 TrustCom. 2023, 第 2 作者[5] 毛锐, 纪鹤鸣, 程迪, 王晓宇, 王妍, 孙德刚. Implicit Continuous Authentication Model Based on Mobile Terminal Touch Behavior. . IEEE Symposium on Computers and Communications (ISCC). 2022, 第 6 作者[6] Li, Ce, Lv, Qiujian, Li, Ning, Wang, Yan, Sun, Degang, Qiao, Yuanyuan. A novel deep framework for dynamic malware detection based on API sequence intrinsic features. COMPUTERS & SECURITY[J]. 2022, 第 5 作者116: http://dx.doi.org/10.1016/j.cose.2022.102686.[7] Yang, Haitian, Zhao, Xuan, Wang, Yan, Sun, Degang, Chen, Wei, Huang, Weiqing. BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection. KNOWLEDGE AND INFORMATION SYSTEMS[J]. 2022, 第 4 作者64(8): 2189-2213, http://dx.doi.org/10.1007/s10115-022-01703-7.[8] Li, Ce, Cheng, Zijun, Zhu, He, Wang, Leiqi, Lv, Qiujian, Wang, Yan, Li, Ning, Sun, Degang. DMalNet: Dynamic malware analysis based on API feature engineering and graph learning. COMPUTERS & SECURITY[J]. 2022, 第 8 作者122: http://dx.doi.org/10.1016/j.cose.2022.102872.[9] 程子俊, 孙德刚, 王蕾祺, 吕遒健, 王妍. MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios. 2022 IEEE Symposium on Computers and Communications. 2022, 第 2 作者[10] 王思叶. URTracker: unauthorized reader detection and localization using COTS RFID. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 12937 LNCS, p 339-350, 2021, Wireless Algorithms, Systems, and Applications - 16th International Conference, WASA 2021, Proceedings;. 2021, [11] Wang, Tingting, Zhao, Xufeng, Lv, Qiujian, Hu, Bo, Sun, Degang, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. Density Weighted Diversity Based Query Strategy for Active Learning. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD). 2021, 第 5 作者156-161, [12] 孙德刚, 郭韵婷, 喻民, 姜建国, 黄伟庆. FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching. IJCNN. 2021, 第 1 作者null(null): [13] Ou, Changhai, Lam, SiewKei, Sun, Degang, Zhou, Xinping, Qiao, Kexin, Wang, Qu. SNR-Centric Power Trace Extractors for Side-Channel Attacks. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS[J]. 2021, 第 3 作者40(4): 620-632, http://dx.doi.org/10.1109/TCAD.2020.3003849.[14] Yang, Yang, Li, Min, Meng, Bo, Huang, Zihao, Ren, Junxing, Sun, Degang. Objects as Extreme Points. Pacific Rim International Conference on Artificial Intelligence(PRICAI). 2021, 第 6 作者http://arxiv.org/abs/2104.14066.[15] Yang, Yang, Li, Min, Meng, Bo, Ren, Junxing, Sun, Degang, Huang, Zihao. Rethinking the Aligned and Misaligned Features in One-stage Object Detection. 2021, 第 5 作者[16] 王婷婷, 吕遒健, 胡波, Sun Degang. A Few-Shot Class-Incremental Learning Approach for Intrusion Detection.. The 30th International Conference on Computer Communication and Networks (ICCCN)[J]. 2021, 第 4 作者[17] Sun, Degang, Liu, Meichen, Li, Meimei, Shi, Zhixin, Liu, Pengcheng, Wang, Xu, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD). 2021, 第 1 作者 通讯作者 335-341, [18] 王婷婷, 吕遒健, 胡波, Sun Degang. CVSS-based Multi-Factor Dynamic Risk Assessment Model for Network System.. In 2020 IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)[J]. 2020, 第 4 作者[19] 魏冬. Spectrum Demand Estimation Model for NGSO Communication Systems Considering Time Delay Constraints and Different Spectrum Access Strategies. 2020 27th International Conference on Telecommunications (ICT). 2020, [20] Sun, Degang, Zhang, Qiaoyu, Wei, Dong, Zhang, Meng. A Secure Constellation Design for Polarized Modulation in Wireless Communications. IEEEACCESS[J]. 2020, 第 1 作者8: 130588-130597, https://doaj.org/article/01dda75c7e0740a2ade45b45b11cd162.[21] Sun, Degang, Yang, Yang, Li, Min, Yang, Jian, Meng, Bo, Bai, Ruwen, Li, Linghan, Ren, Junxing. A Scale Balanced Loss for Bounding Box Regression. IEEE ACCESS[J]. 2020, 第 1 作者8: 108438-108448, https://doaj.org/article/6f63cb6c44cd4bfe9c139ea814f5415e.[22] Sun Degang. Terminator: A File-level Hybrid Framework for Intellectual Property Theft Detection and Prevention. International Conference on Computing Frontiers. 2020, 第 1 作者[23] Ou, Changhai, Wang, Zhu, Sun, Degang, Zhou, Xinping. Group Collision Attack. IEEETRANSACTIONSONINFORMATIONFORENSICSANDSECURITY[J]. 2019, 第 3 作者14(4): 939-953, https://www.webofscience.com/wos/woscc/full-record/WOS:000449082400009.[24] Sun, Degang, Wu, Zhengrong, Wang, Yan, Lv, Qiujian, Hu, Bo, IEEE. Cyber Profiles Based Risk Prediction of Application Systems for Effective Access Control. 2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC). 2019, 第 1 作者836-842, [25] Sun, Degang, Wu, Zhengrong, Wang, Yan, Lv, Qiujian, Hu, Bo, IEEE. Risk Prediction for Imbalanced Data in Cyber Security : A Siamese Network-based Deep Learning Classification Framework. 2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN). 2019, 第 1 作者[26] Sun Degang. An Improved Adaptive Anomaly Detection Method for Electromagnetic Streaming Data. International Conference on Information Technology and Science. 2019, 第 1 作者[27] Sun Degang. An Efficient Electromag-netic Streaming Data Anomaly Detection Framework Based on Storm. International Conference on Big Data and Computing. 2019, 第 1 作者[28] Zhou, Xinping, Whitnall, Carolyn, Oswald, Elisabeth, Sun, Degang, Wang, Zhu, Eisenbarth, T, Teglia, Y. A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher. SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2017). 2018, 第 4 作者10728: 70-87, [29] 孙德刚. 基于HOG的跳频信号自动化检测模型. 通信技术. 2018, 第 1 作者[30] 孙德刚. 电子邮件信息泄露问题探讨. 通信技术. 2018, 第 1 作者[31] Sun, Degang, Yang, Kun, Shi, Zhixin, Lv, Bin, Li, G, Ge, Y, Zhang, Z, Jin, Z, Blumenstein, M. A Behavior-Based Method for Distinction of Flooding DDoS and Flash Crowds. KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2017). 2017, 第 1 作者10412: 129-136, [32] Kong, Bin, Yang, Kun, Sun, Degang, Li, Meimei, Shi, Zhixin. Distinguishing Flooding Distributed Denial of Service from Flash Crowds Using Four Data Mining Approaches. COMPUTER SCIENCE AND INFORMATION SYSTEMS[J]. 2017, 第 3 作者14(3): 839-856, https://www.webofscience.com/wos/woscc/full-record/WOS:000413777600019.[33] Sun Degang. Towards easy key enumeration. IACR Cryptology ePrint Archive. 2017, 第 1 作者[34] Sun Degang, Yang Kun, Shi Zhixin, Wang Yan, Ma L, Khreishah A, Zhang Y, Yan M. Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017. 2017, 第 1 作者10251: 729-740, [35] Sun Degang. Towards optimal pre-processing in leakage detection. IACR Cryptology ePrint Archive. 2017, 第 1 作者[36] 周新平, 孙德刚, 王竹, 欧长海. 一种基于奇异值分解的功耗轨迹筛选方法. 电子学报[J]. 2017, 第 2 作者45(9): 2250-2255, http://lib.cqvip.com/Qikan/Article/Detail?id=673352127.[37] Sun Degang, Li Yiwei, Xu Yanyun, Hu Jianlin, IEEE. A Novel Method for Specific Emitter Identification Based on Singular Spectrum Analysis. 2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC). 2017, 第 1 作者[38] Sun Degang. Profiling good leakage models for masked implementations. IACR Cryptology ePrint Archive. 2017, 第 1 作者[39] Sun Degang, Yang Kun, Lv Bin, Shi Zhixin, IEEE. Could We Beat A New Mimicking Attack?. 2017 19TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS 2017): MANAGING A WORLD OF THINGS. 2017, 第 1 作者247-250, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000417431200045.[40] Sun Degang. Manifold Learning Towards Masking Implementations: A First Study. IACR Cryptology ePrint Archive. 2017, 第 1 作者[41] Sun Degang. Group verification based multiple-differential collision attack. In Information and Communications Security - 18th International Conference. 2016, 第 1 作者[42] Sun, DeGang, Shi, Jun, Wei, Dong, Zhang, Meng, Huang, WeiQing. Method for detecting text information leakage in electromagnetic radiation from a computer display. IET INFORMATION SECURITY[J]. 2016, 第 1 作者10(6): 413-417, https://www.webofscience.com/wos/woscc/full-record/WOS:000386964400010.[43] Ou Changhai, Wang Zhu, Sun Degang, Zhou Xinping, Ai Juan, Hoepman JH, Katzenbeisser S. Uncertain? No, It's Very Certain! Recovering the Key from Guessing Entropy Enhanced CPA. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016. 2016, 第 3 作者471: 308-320, [44] Sun Degang, Wei Di, Zhang Ning, Lv Zhiqiang, Yin Xi, IEEE. Network Transmission of Hidden Data using Smartphones based on Compromising Emanations. 2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC). 2016, 第 1 作者 通讯作者 190-193, [45] Sun, Degang, Shi, Jun, Ding, Xuejie, Zhang, Meng, Huang, Weiqing, IEEE. Method for Detecting Information Leakage From Computer Display in Electromagnetic Radiation. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA. 2016, 第 1 作者 通讯作者 2041-2046, [46] Zhou Xinping, Sun Degang, Wang Zhu, Ou Changhai, Ai Juan, IEEE. Double-Key Recovery Based Correlation Power Analysis. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA. 2016, 第 2 作者1016-1022, [47] Sun Degang. Enhanced correlation power analysis by biasing power traces. In Information Security - 19th International Conference. 2016, 第 1 作者[48] Ou, Changhai, Wang, Zhu, Sun, Degang, Zhou, Xinping, Ai, Juan, IEEE. Power Traces Clipping and Splicing Enhanced Correlation Collision Analysis. 2016IEEETRUSTCOMBIGDATASEISPA. 2016, 第 3 作者989-995, [49] Sun Degang, Shi Jun, Wei Dong, Zhang Meng, Huang Weiqing, Qiu Xuguang, IEEE. A New Method to Recognize Computer through Electromagnetic Radiation Based on Spectral Centroid. 2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC). 2016, 第 1 作者 通讯作者 184-186, [50] 孙德刚. An Efficient and Anti-interference Method of Synchronizing Information Extraction for Video Leaking Signal [J].. IET Signal Processing. 2015, 第 1 作者[51] 孙德刚. An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks. Information and Communications Security. Springer International Publishing. 2015, 第 1 作者[52] Sun Degang. POSTER: using improved singular value decomposition to enhance correlation power analysis. In Security and Privacy in Communication Networks - 11th International Conference. 2015, 第 1 作者[53] 孙德刚. 电磁泄漏文本信息检测方法. International Conference on Information and Communications Security. 2014, 第 1 作者[54] 孙德刚. 基于访问控制矩阵的移动存储介质安全控制. The 2014 2nd International Conference on Systems and Informatics(ICSAI2014). 2014, 第 1 作者[55] 孙德刚. A Low-cost and Efficient Method of Determining the Best Frequency Band for Video Leaking Signal Reconstruction[C]. Proc of International Conference on Systems and Informatics. Shanghai: IEEE, 2014.. 2014, 第 1 作者[56] 孙德刚. 视频电磁泄漏频率的判断方法. The 2014 2nd International Conference on Systems and Informatics(ICSAI2014)EI. 2014, 第 1 作者[57] Ce Li, Zijun Cheng, He Zhu, Leiqi Wang, Qiujian Lv, Yan Wang, Ning Li, Degang Sun. DMalNet: Dynamic Malware Analysis Based on API Feature Engineering and Graph Learning. COMPUTERS & SECURITY. 第 8 作者http://dx.doi.org/10.1016/j.cose.2022.102872.