Data-driven cybersecurity incident prediction: A survey N Sun, J Zhang, P Rimba, S Gao, LY Zhang, Y Xiang IEEE Communications Surveys & Tutorials 21 (2), 1744-1772, 2019 | 318 | 2019 |
Near real-time twitter spam detection with machine learning techniques N Sun, G Lin, J Qiu, P Rimba International Journal of Computers and Applications 44 (4), 338-348, 2020 | 64 | 2020 |
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives N Sun, M Ding, J Jiang, W Xu, X Mo, Y Tai, J Zhang IEEE Communications Surveys & Tutorials, 2023 | 53 | 2023 |
Statistical twitter spam detection demystified: performance, stability and scalability G Lin, N Sun, S Nepal, J Zhang, Y Xiang, H Hassan IEEE access 5, 11142-11154, 2017 | 52 | 2017 |
Defining security requirements with the Common Criteria: applications, adoptions, and challenges N Sun, CT Li, H Chan, BD Le, MD Islam, LY Zhang, MD Islam, ... IEEE Access 10, 44756 - 44777, 2022 | 19 | 2022 |
How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond N Sun, CT Li, H Chan, MZ Islam, MR Islam, W Armstrong IEEE Access 10 (10.1109/ACCESS.2022.3187211), pp. 71749 - 71763, 2022 | 12 | 2022 |
Data analytics of crowdsourced resources for cybersecurity intelligence N Sun, J Zhang, S Gao, LY Zhang, S Camtepe, Y Xiang Network and System Security: 14th International Conference, NSS 2020 …, 2020 | 8 | 2020 |
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics X Mo, Y Zhang, LY Zhang, W Luo, N Sun, S Hu, S Gao, Y Xiang 2024 IEEE Symposium on Security and Privacy (SP), 171-171, 2024 | 4 | 2024 |
Advanced Face Anti-Spoofing with Depth Segmentation L Zhang, N Sun, X Wu, D Luo 2022 International Joint Conference on Neural Networks (IJCNN), 1-6, 2022 | 4 | 2022 |
Cyber Information Retrieval Through Pragmatics Understanding and Visualization N Sun, J Zhang, S Gao, LY Zhang, S Camtepe, Y Xiang IEEE Transactions on Dependable and Secure Computing 20 (2), 1186-1199, 2022 | 2 | 2022 |
Towards Generalized Deepfake Detection With Continual Learning On Limited New Data H Huang, N Sun, X Lin, N Moustafa The 2022 International Conference on Digital Image Computing: Techniques and …, 2022 | 2 | 2022 |
My Security: An interactive search engine for cybersecurity N Sun, J Zhang, S Gao, LY Zhang, S Camtepe, Y Xiang Proceedings of the 54th Hawaii International Conference on System Sciences …, 2021 | 2 | 2021 |
On the Development of a Protection Profile Module for Encryption Key Management Components N Sun, CT Li, H Chan, MZ Islam, MR Islam, W Armstrong IEEE Access 11, 9113-9121, 2023 | 1 | 2023 |
Blockwise Spectral Analysis for Deepfake Detection in High-fidelity Videos H Huang, N Sun, X Lin The 9th IEEE International Conference on Data Science and Advanced Analytics, 2022 | 1 | 2022 |
The Frontier of Data Erasure: Machine Unlearning for Large Language Models Y Qu, M Ding, N Sun, K Thilakarathna, T Zhu, D Niyato arXiv preprint arXiv:2403.15779, 2024 | | 2024 |
Backdoor Attack on Deep Neural Networks in Perception Domain X Mo, LY Zhang, N Sun, W Luo, S Gao 2023 International Joint Conference on Neural Networks (IJCNN), 01-08, 2023 | | 2023 |
Data-driven cybersecurity incident prediction and discovery N Sun Deakin University, 2020 | | 2020 |