Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    What is a Proper Face Registration for Face Recognition?

    Face recognition systems have now made significant progress. In practice, we may face the important question of what is a better face registration for a typical face recognition algorithm, but this problem has...

    Yaotang Lv, Zhantao Fan, Kun Zhang, Zhizhong Li in Artificial Intelligence and Robotics (2024)

  2. No Access

    Chapter and Conference Paper

    Aircraft Reliability Evaluation Method Based on Multi-mission Profile

    Aircraft mission reliability is an important indicator to measure its operational capability, which is of great significance to the aircraft’s ability to perform tasks. This paper establishes a mission reliabi...

    Tao Ma, Chengyu Ju, Kun Sun in Proceedings of the 6th China Aeronautical … (2024)

  3. No Access

    Chapter and Conference Paper

    Progressive Point Cloud Generating by Shape Decomposing and Upsampling

    How to generate realistic and precise 3D point clouds of different shapes has become a hot topic for many researchers. However, due to the complexity and discreteness of point cloud data, generating high-resol...

    Deli Shi, Kun Sun in Pattern Recognition and Computer Vision (2024)

  4. No Access

    Chapter and Conference Paper

    Quantitative Evaluation Method for Aircraft Maintainability

    Maintainability test and evaluation is of great significance to improve aircraft maintenance efficiency and support level. However, at present, maintainability evaluation involves many qualitative measurement ...

    Chengyu Ju, Na Zhao, Kun Sun in Proceedings of the 6th China Aeronautical … (2024)

  5. No Access

    Chapter and Conference Paper

    Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots

    The honeypot technique has proved its value in system protection and attack analysis over the past 20 years. Distributed honeypot solutions emerge to solve the high cost and risk of maintaining a functional ho...

    Songsong Liu, Pengbin Feng, Jiahao Cao in Detection of Intrusions and Malware, and V… (2022)

  6. No Access

    Chapter and Conference Paper

    A Multi-feature Embedding Method for Robust Image Matching

    In this paper, a feature point matching method that integrates both spatial structure and multiple descriptors is proposed. To be specific, given a set of detected keypoints on both images, multiple feature de...

    **hong Yu, Kun Sun in Pattern Recognition (2022)

  7. Chapter and Conference Paper

    Correction to: Science of Cyber Security

    In the original version of this book, the affiliation of Feng Liu was presented incorrectly. This has been corrected to Institute of Information Engineering, Chinese Academy of Sciences, Bei**g, China.

    Wenlian Lu, Kun Sun, Moti Yung, Feng Liu in Science of Cyber Security (2021)

  8. No Access

    Chapter and Conference Paper

    Deep Semantic Edge for Cell Counting and Localization in Time-Lapse Microscopy Images

    Cell counting and localization in microscopy images is one of the most important steps in Assisted Reproduction Technology (ART). This paper proposes a fully automatic method to achieve this goal, which consis...

    Tianwei Zhang, Kun Sun in Pattern Recognition and Computer Vision (2021)

  9. No Access

    Chapter and Conference Paper

    Evaluation on the Security of Commercial Cloud Container Services

    With the increasing adoption of the container mechanism in the industrial community, cloud vendors begin to provide cloud container services. Unfortunately, it lacks a concrete method to evaluate the security ...

    Yifei Wu, Lingguang Lei, Yuewu Wang, Kun Sun, **gzi Meng in Information Security (2020)

  10. No Access

    Chapter and Conference Paper

    SGX-Cube: An SGX-Enhanced Single Sign-On System Against Server-Side Credential Leakage

    User authentication systems enforce the access control of critical resources over Internet services. The pair of username and password is still the most commonly used user authentication credential for online ...

    Songsong Liu, Qiyang Song, Kun Sun, Qi Li in Security and Privacy in Communication Networks (2020)

  11. No Access

    Chapter and Conference Paper

    UBER: Combating Sandbox Evasion via User Behavior Emulators

    Sandbox-enabled dynamic malware analysis has been widely used by cyber security teams to handle the threat of malware. Correspondingly, malware authors have developed various anti-sandbox techniques to evade t...

    Pengbin Feng, Jianhua Sun, Songsong Liu, Kun Sun in Information and Communications Security (2020)

  12. No Access

    Chapter and Conference Paper

    Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts

    Software-Defined Networking (SDN) enables diversified network functionalities with plentiful applications deployed on a logically-centralized controller. In order to work properly, applications are naturally ...

    Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu in Security and Privacy in Communication Netw… (2019)

  13. No Access

    Chapter and Conference Paper

    OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform

    On mobile devices, security-sensitive tasks (e.g., mobile payment, one-time password) involve not only sensitive data such as cryptographic keying material, but also sensitive I/O operations such as inputting ...

    Dawei Chu, Yuewu Wang, Lingguang Lei, Yanchu Li in Computer Security – ESORICS 2019 (2019)

  14. No Access

    Chapter and Conference Paper

    Automated IoT Device Fingerprinting Through Encrypted Stream Classification

    The explosive growth of the Internet of Things (IoT) has enabled a wide range of new applications and services. Meanwhile, the massive scale and enormous heterogeneity (e.g., in device vendors and types) of Io...

    Jianhua Sun, Kun Sun, Chris Shenefiel in Security and Privacy in Communication Networks (2019)

  15. No Access

    Chapter and Conference Paper

    LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection

    Android enables inter-app collaboration and function reusability by providing flexible Inter-Component Communication (ICC) across apps. Meanwhile, ICC introduces serious privacy leakage problems due to compone...

    Yi He, Qi Li, Kun Sun in Security and Privacy in Communication Networks (2018)

  16. No Access

    Chapter and Conference Paper

    BluePass: A Secure Hand-Free Password Manager

    With the growing number of online accounts a user possesses, managing passwords has been unprecedentedly challenging. Users are prone to sacrifice security for usability, leaving their accounts vulnerable to v...

    Yue Li, Haining Wang, Kun Sun in Security and Privacy in Communication Networks (2018)

  17. No Access

    Chapter and Conference Paper

    Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack

    The emerging Software-Defined Networking (SDN) is being adopted by data centers and cloud service providers to enable flexible control. Meanwhile, the current SDN design brings new vulnerabilities. In this pap...

    Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun in Security and Privacy in Communication Netw… (2018)

  18. Chapter and Conference Paper

    Massively Parallel Image Index for Vocabulary Tree Based Image Retrieval

    Although vocabulary tree based algorithm has high efficiency for image retrieval, it still faces a dilemma when dealing with large data. In this paper, we show that image indexing is the main bottleneck of voc...

    Qingshan Xu, Kun Sun, Wenbing Tao, Liman Liu in Computer Vision (2017)

  19. Chapter and Conference Paper

    GPU Accelerated Image Matching with Cascade Hashing

    SIFT feature is widely used in image matching. However, matching massive images is time consuming because SIFT feature is a high dimensional vector. In this paper, we proposed a GPU accelerated image matching ...

    Tao Xu, Kun Sun, Wenbing Tao in Computer Vision (2017)

  20. No Access

    Chapter and Conference Paper

    Vibration Suppression of an Axially Moving System with Restrained Boundary Tension

    In this paper, we concentrate on the vibration suppression of an axially moving string system subject to the restrained boundary tension. By introducing an appropriate barrier Lyapunov function, a boundary con...

    Zhijia Zhao, Yu Liu, Kun Sun in Neural Information Processing (2017)

previous disabled Page of 2