Jianhua Sun
Jianhua Sun
Verified email at
Cited by
Cited by
DESIR: Decoy-enhanced seamless IP randomization
J Sun, K Sun
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
SPEAKER: Split-phase execution of application containers
L Lei, J Sun, K Sun, C Shenefiel, R Ma, Y Wang, Q Li
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
HPar: A practical parallel parser for HTML--taming HTML complexities for parallel parsing
Z Zhao, M Bebenita, D Herman, J Sun, X Shen
ACM Transactions on Architecture and Code Optimization (TACO) 10 (4), 1-25, 2013
CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms
J Sun, K Sun, Q Li
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
UBER: Combating Sandbox Evasion via User Behavior Emulators
P Feng, J Sun, S Liu, K Sun
21st International Conference on Information and Communications Security, 2019
A scalable high fidelity decoy framework against sophisticated cyber attacks
J Sun, S Liu, K Sun
Proceedings of the 6th ACM Workshop on Moving Target Defense, 37-46, 2019
SATIN: A secure and trustworthy asynchronous introspection on multi-core ARM processors
S Wan, J Sun, K Sun, N Zhang, Q Li
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
Automated iot device fingerprinting through encrypted stream classification
J Sun, K Sun, C Shenefiel
Security and Privacy in Communication Networks: 15th EAI International …, 2019
Call sequence prediction through probabilistic calling automata
Z Zhao, B Wu, M Zhou, Y Ding, J Sun, X Shen, Y Wu
ACM SIGPLAN Notices 49 (10), 745-762, 2014
Towards a Believable Decoy System: Replaying Network Activities from Real System
J Sun, K Sun, Q Li
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
Cookie-based amplification repression protocol
J Zheng, J Sun, K Sun, B Wu, Q Li
2017 IEEE 36th International Performance Computing and Communications …, 2017
The system can't perform the operation now. Try again later.
Articles 1–11