A new enforcement on declassification with reachability analysis

Cong Sun , Liyong Tang , Zhong Chen
conference on computer communications workshops 1024 -1029

3
2011
Refining Indirect Call Targets at the Binary Level

Gang Tan , Dongrui Zeng , Cong Sun , Sun Hyoung Kim
network and distributed system security symposium

2021
Fine with “1234”? An Analysis of SMS One-Time Password Randomness in Android Apps

Elisa Bertino , Diethelm Ostry , Juanru Li , Hyoungshick Kim
international conference on software engineering

2021
Verifying Location-Based Services with Declassification Enforcement

Cong Sun , Sheng Gao , Jianfeng Ma
Web Technologies and Applications 695 -702

2012
Balancing trajectory privacy and data utility using a personalized anonymization model

Sheng Gao , Jianfeng Ma , Cong Sun , Xinghua Li
Journal of Network and Computer Applications 38 125 -134

46
2014
Data-Oriented Instrumentation against Information Leakages of Android Applications

Cong Sun , Pengbin Feng , Teng Li , Jianfeng Ma
computer software and applications conference 485 -490

1
2017
Enforcing Reactive Noninterference with Reachability Analysis

Cong Sun , Liyong Tang , Zhong Chen
2011 Eighth International Conference on Information Technology: New Generations 321 -326

1
2011
Active Semi-supervised Approach for Checking App Behavior against Its Description

Siqi Ma , Shaowei Wang , David Lo , Robert Huijie Deng
computer software and applications conference 2 179 -184

39
2015
Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition

Cong Sun , Ning Xi , Jianfeng Ma
computer software and applications conference 586 -595

1
2017
TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing

Sheng Gao , Jianfeng Ma , Weisong Shi , Guoxing Zhan
IEEE Transactions on Information Forensics and Security 8 ( 6) 874 -887

92
2013
Building a Secure Scheme for a Trusted Hardware Sharing Environment

Di Lu , Jianfeng Ma , Cong Sun , Qixuan Wu
IEEE Access 5 20260 -20271

2
2017
A Novel Dynamic Android Malware Detection System With Ensemble Learning

Pengbin Feng , Jianfeng Ma , Cong Sun , Xinpeng Xu
IEEE Access 6 30996 -31011

151
2018
Ridra: A Rigorous Decentralized Randomized Authentication in VANETs

Cong Sun , Jiao Liu , Yinjuan Jie , Yuwan Ma
IEEE Access 6 50358 -50371

5
2018
CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks

Teng Li , Jianfeng Ma , Cong Sun
international conference on algorithms and architectures for parallel processing 449 -462

4
2015
Service Composition in Multi-domain Environment under Time Constraint

Tao Zhang , Jianfeng Ma , Cong Sun , Qi Li
2013 IEEE 20th International Conference on Web Services 227 -234

8
2013
Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments

Ning Xi , Jianfeng Ma , Cong Sun , Tao Zhang
2013 IEEE 20th International Conference on Web Services 563 -570

9
2013
CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications.

Cong Sun , Jun Chen , Pengbin Feng , Jianfeng Ma
international conference on machine learning 63 -77

1
2019
Measuring the risk value of sensitive dataflow path in Android applications

Pengbin Feng , Cong Sun , Jianfeng Ma
Security and Communication Networks 9 ( 18) 5918 -5933

1
2016
NetPro: detecting attacks in MANET routing with provenance and verification

Teng Li , Jianfeng Ma , Cong Sun
Science China Information Sciences 60 ( 11) 118101

5
2017
Trust-based service composition in multi-domain environments under time constraint

Tao Zhang , JianFeng Ma , Qi Li , Ning Xi
Science China Information Sciences 57 ( 9) 1 -16

8
2014