default search action
Ke Sun 0014
Person information
- affiliation: University of Sheffield, Department of Automatic Control and Systems Engineering, Sheffield, UK
- affiliation (2012 - 2015): Tongji University, College of Electronics and Information Engineering, Shanghai, China
Other persons with the same name
- Ke Sun — disambiguation page
- Ke Sun 0001 — CSIRO, Data61, Sydney, Australia (and 6 more)
- Ke Sun 0002 — Carnegie Mellon University, Pittsburgh, PA, USA
- Ke Sun 0003 — Tsinghua University, Beijing, China
- Ke Sun 0004 — Guangxi Normal University, Guilin, China
- Ke Sun 0005 — Baidu, Beijing, China
- Ke Sun 0006 — Shenzhen University, College of Computer Science and Software Engineering, China (and 1 more)
- Ke Sun 0007 — Harbin Institute of Technology, China
- Ke Sun 0008 — University of Pennsylvania, GRASP Lab, Philadelphia, PA, USA
- Ke Sun 0009 — University of Science and Technology of China, CAS Key Laboratory of Technology in Geo-Spatial Information Processing and Application System, Hefei, China
- Ke Sun 0010 — Wuhan University, China
- Ke Sun 0011 — Dalian University of Technology, School of Software, China
- Ke Sun 0012 — University of California San Diego, Department of Computer Science and Engineering, San Diego, CA, USA (and 1 more)
- Ke Sun 0013 — University of Alberta, Department of Mathematical and Statistical Sciences, Edmonton, Canada (and 1 more)
- Ke Sun 0015 — Shenyang Normal University, Software College, Shenyang , China (and 1 more)
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j7]Xiaorui Dang, Guiqi Zhang, Ke Sun, Yufeng Li:
A trust model for VANETs using malicious-aware multiple routing. Comput. Secur. 148: 104145 (2025) - [j6]Qi Liu, Ke Sun, Wenqi Liu, Yufeng Li, Xiangyu Zheng, Chenhong Cao, Jiangtao Li, Wutao Qin:
Quantitative risk assessment for connected automated Vehicles: Integrating improved STPA-SafeSec and Bayesian network. Reliab. Eng. Syst. Saf. 253: 110528 (2025) - 2024
- [j5]Yufeng Li, Chengjian Huang, Qi Liu, Xiangyu Zheng, Ke Sun:
Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system. Comput. Secur. 142: 103890 (2024) - [j4]Qi Liu, Xingyu Li, Ke Sun, Yufeng Li, Yanchen Liu:
SISSA: Real-Time Monitoring of Hardware Functional Safety and Cybersecurity With In-Vehicle SOME/IP Ethernet Traffic. IEEE Internet Things J. 11(16): 27322-27339 (2024) - [j3]Yufeng Li, Wenqi Liu, Qi Liu, Xiangyu Zheng, Ke Sun, Chengjian Huang:
Complying with ISO 26262 and ISO/SAE 21434: A Safety and Security Co-Analysis Method for Intelligent Connected Vehicle. Sensors 24(6): 1848 (2024) - [i7]Qi Liu, Xingyu Li, Ke Sun, Yufeng Li, Yanchen Liu:
SISSA: Real-time Monitoring of Hardware Functional Safety and Cybersecurity with In-vehicle SOME/IP Ethernet Traffic. CoRR abs/2402.14862 (2024) - 2023
- [j2]Ke Sun, Iñaki Esnaola, Antonia M. Tulino, H. Vincent Poor:
Asymptotic Learning Requirements for Stealth Attacks on Linearized State Estimation. IEEE Trans. Smart Grid 14(4): 3189-3200 (2023) - [c5]Ke Sun, Samir M. Perlaza, Alain Jean-Marie:
2×2 Zero-Sum Games with Commitments and Noisy Observations. ISIT 2023: 2254-2259 - [c4]Dandan Li, Yufeng Li, Guiqi Zhang, Ke Sun, Jiangtao Li:
Fooling Object Detectors in the Physical World with Natural Adversarial Camouflage. TrustCom 2023: 141-148 - 2022
- [i6]Ke Sun, Samir M. Perlaza, Alain Jean-Marie:
Zero-Sum Games with Noisy Observations. CoRR abs/2211.01703 (2022) - 2021
- [i5]Iñaki Esnaola, Samir M. Perlaza, Ke Sun:
Data-Injection Attacks. CoRR abs/2102.01925 (2021) - [i4]Ke Sun, Iñaki Esnaola, Antonia M. Tulino, H. Vincent Poor:
Asymptotic Learning Requirements for Stealth Attacks. CoRR abs/2112.14698 (2021) - 2020
- [j1]Ke Sun, Iñaki Esnaola, Samir M. Perlaza, H. Vincent Poor:
Stealth Attacks on the Smart Grid. IEEE Trans. Smart Grid 11(2): 1276-1285 (2020)
2010 – 2019
- 2019
- [c3]Ke Sun, Inaki Esnaola, Antonia M. Tulino, H. Vincent Poor:
Learning Requirements for Stealth Attacks. ICASSP 2019: 8102-8106 - [i3]Ke Sun, Iñaki Esnaola, Antonia M. Tulino, H. Vincent Poor:
Learning requirements for stealth attacks. CoRR abs/1902.08222 (2019) - 2018
- [i2]Ke Sun, Iñaki Esnaola, Samir Medina Perlaza, H. Vincent Poor:
Stealth Attacks on the Smart Grid. CoRR abs/1808.04184 (2018) - 2017
- [c2]Ke Sun, Inaki Esnaola, Samir Medina Perlaza, H. Vincent Poor:
Information-theoretic attacks in the smart grid. SmartGridComm 2017: 455-460 - [i1]Ke Sun, Inaki Esnaola, Samir Medina Perlaza, H. Vincent Poor:
Information-Theoretic Attacks in the Smart Grid. CoRR abs/1708.07810 (2017) - 2014
- [c1]Ke Sun, Weihui Shao, Zhiyu Xu, Weisheng Xu:
Islanding partition of the distribution system with distributed generations based on Memetic algorithm. ICSAI 2014: 197-201
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 01:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint