Select Publications

Journal articles

Dong H; Wang H; Hazell PJ; Sun N; Dura HB; Escobedo-Diaz JP, 2025, 'Effects of printing parameters on the quasi-static and dynamic compression behaviour of 3D-printed re-entrant auxetic structures', Thin-Walled Structures, 210, http://dx.doi.org/10.1016/j.tws.2025.113000

Deng D; Huang H; Hu L; Sun N, 2025, 'Anomaly-Aware Tropical Cyclone Track Prediction Using Multi-Scale Generative Adversarial Networks', Remote Sensing, http://dx.doi.org/10.3390/rs17040583

Huang H; Deng D; Hu L; Sun N, 2025, 'Anomaly-Aware Tropical Cyclone Track Prediction Using Multi-Scale Generative Adversarial Networks', Remote Sensing, http://dx.doi.org/10.3390/rs17040583

Qu Y; Ding M; Sun N; Thilakarathna K; Zhu T; Niyato D, 2025, 'The Frontier of Data Erasure: A Survey on Machine Unlearning for Large Language Models', Computer, 58, pp. 45 - 57, http://dx.doi.org/10.1109/MC.2024.3405397

Tani Bertuol M; Sun N; Jiang J; Zhang Y; Jha S, 2025, 'Can LLM-Generated Misinformation Be Detected: A Study On Cyber Threat Intelligence', Future generations computer systems, pp. 107877 - 107877, http://dx.doi.org/10.1016/j.future.2025.107877

Sun N; Zhang J; Gao S; Zhang LY; Camtepe S; Xiang Y, 2023, 'Cyber Information Retrieval Through Pragmatics Understanding and Visualization', IEEE Transactions on Dependable and Secure Computing, 20, pp. 1186 - 1199, http://dx.doi.org/10.1109/TDSC.2022.3151148

Sun N; Ding M; Jiang J; Xu W; Mo X; Tai Y; Zhang J, 2023, 'Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives', IEEE Communications Surveys and Tutorials, 25, pp. 1748 - 1774, http://dx.doi.org/10.1109/COMST.2023.3273282

Sun N; Li CT; Chan H; Islam MZ; Islam MR; Armstrong W, 2023, 'On the Development of a Protection Profile Module for Encryption Key Management Components', IEEE Access, 11, pp. 9113 - 9121, http://dx.doi.org/10.1109/ACCESS.2023.3239043

Sun N; Li CT; Chan H; Dung Le B; Islam MZ; Zhang LY; Islam MR; Armstrong W, 2022, 'Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges', IEEE Access, 10, pp. 44756 - 44777, http://dx.doi.org/10.1109/ACCESS.2022.3168716

Sun N; Li CT; Chan H; Islam MZ; Islam MR; Armstrong W, 2022, 'How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond', IEEE Access, 10, pp. 71749 - 71763, http://dx.doi.org/10.1109/ACCESS.2022.3187211

Sun N; Lin G; Qiu J; Rimba P, 2022, 'Near real-time twitter spam detection with machine learning techniques', International Journal of Computers and Applications, 44, pp. 338 - 348, http://dx.doi.org/10.1080/1206212X.2020.1751387

Sun N; Zhang J; Rimba P; Gao S; Zhang LY; Xiang Y, 2019, 'Data-Driven Cybersecurity Incident Prediction: A Survey', IEEE Communications Surveys and Tutorials, 21, pp. 1744 - 1772, http://dx.doi.org/10.1109/COMST.2018.2885561

Lin G; Sun N; Nepal S; Zhang J; Xiang Y; Hassan H, 2017, 'Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability', IEEE Access, 5, pp. 11142 - 11154, http://dx.doi.org/10.1109/ACCESS.2017.2710540

Conference Papers

Xu S; Dong J; Cai W; Li J; Shaghaghi A; Sun N; Ma S, 2025, 'Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis', in Proceedings 2025 Network and Distributed System Security Symposium, Internet Society, presented at Network and Distributed System Security Symposium, http://dx.doi.org/10.14722/ndss.2025.240576

Chang YT; Hu Z; Li X; Yang S; Jiang J; Sun N, 2024, 'DiHAN: A Novel Dynamic Hierarchical Graph Attention Network for Fake News Detection', in International Conference on Information and Knowledge Management, Proceedings, pp. 197 - 206, http://dx.doi.org/10.1145/3627673.3679675

Wang M; Boshuijzen-van Burken C; Sun N; Kasra Kermanshahi S; Zhang Y; Hu J, 2024, 'VirtuGuard: Ethically Aligned Artificial Intelligence Framework for Cyberbullying Mitigation', Singapore, presented at 2024 IEEE Conference on Artificial Intelligence (CAI), Singapore, 23 June 2024, http://dx.doi.org/10.1109/CAI59869.2024.00271

Mo X; Zhang Y; Zhang LY; Luo W; Sun N; Hu S; Gao S; Xiang Y, 2024, 'Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics', in Proceedings - IEEE Symposium on Security and Privacy, pp. 2048 - 2066, http://dx.doi.org/10.1109/SP54263.2024.00174

Mo X; Zhang LY; Sun N; Luo W; Gao S, 2023, 'Backdoor Attack on Deep Neural Networks in Perception Domain', in Proceedings of the International Joint Conference on Neural Networks, http://dx.doi.org/10.1109/IJCNN54540.2023.10191661

Huang H; Sun N; Lin X; Moustafa N, 2022, 'Towards Generalized Deepfake Detection With Continual Learning On Limited New Data', in 2022 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, pp. 1 - 7, presented at 2022 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 30 November 2022 - 02 December 2022, http://dx.doi.org/10.1109/dicta56598.2022.10034569

Zhang L; Sun N; Wu X; Luo D, 2022, 'Advanced Face Anti-Spoofing with Depth Segmentation', in Proceedings of the International Joint Conference on Neural Networks, http://dx.doi.org/10.1109/IJCNN55064.2022.9892826

Huang H; Sun N; Lin X, 2022, 'Blockwise Spectral Analysis for Deepfake Detection in High-fidelity Videos', in Proceedings - 2022 IEEE 9th International Conference on Data Science and Advanced Analytics, DSAA 2022, http://dx.doi.org/10.1109/DSAA54385.2022.10032370

Sun N; Gao S; Zhang LY; Camtepe S; Zhang J; Xiang Y, 2021, 'My security: An interactive search engine for cybersecurity', in Proceedings of the Annual Hawaii International Conference on System Sciences, pp. 6206 - 6215

Sun N; Zhang J; Gao S; Zhang LY; Camtepe S; Xiang Y, 2020, 'Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 3 - 21, http://dx.doi.org/10.1007/978-3-030-65745-1_1

Preprints

Xu S; Dong J; Cai W; Li J; Shaghaghi A; Sun N; Ma S, 2024, Enhancing Security in Third-Party Library Reuse -- Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis, http://dx.doi.org/10.48550/arxiv.2411.19648

Sun N; Li C-T; Chan H; Islam MZ; Islam MR; Armstrong W, 2022, How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond, http://dx.doi.org/10.1109/ACCESS.2022.3187211

Sun N; Li C-T; Chan H; Le BD; Islam MDZ; Zhang LY; Islam MDR; Armstrong W, 2022, Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges, http://dx.doi.org/10.1109/ACCESS.2022.3168716


Back to profile page