學科專業(yè)(學術(shù)型/專業(yè)型):網(wǎng)絡(luò)空間安全/計算機技術(shù)
長期從事信息安全技術(shù)研發(fā)和重要信息系統(tǒng)設(shè)計集成工作,主持和參與國家級和省部級科研項目50多項,曾獲國家科技進步獎二等獎1項,省部級科技進步獎一二三等獎20余項,新世紀百千萬人才工程國家級人選,享受國務(wù)院政府特殊津貼。
[1] Li, Ce, Lv, Qiujian, Li, Ning, Wang, Yan, Sun, Degang, Qiao, Yuanyuan. A novel deep framework for dynamic malware detection based on API sequence intrinsic features.COMPUTERS &SECURITY[J]. 2022, 116: http://dx.doi.org/10.1016/j.cose.2022.102686.
[2] Yang, Haitian, Zhao, Xuan, Wang, Yan, Sun, Degang, Chen, Wei, Huang, Weiqing. BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection.KNOWLEDGE ANDINFORMATIONSYSTEMS. 2022.
[3] Ce Li, Zijun Cheng, He Zhu, Leiqi Wang, Qiujian Lv, Yan Wang, Ning Li, Degang Sun. DMalNet: Dynamic Malware Analysis Based on API Feature Engineering and Graph Learning. Computers & Security. http://dx.doi.org/10.1016/j.cose.2022.102872.
[4] Ou, Changhai, Lam, SiewKei, Sun, Degang, Zhou, Xinping, Qiao, Kexin, Wang, Qu. SNR-Centric Power Trace Extractors for Side-Channel Attacks. IEEETRANSACTIONS ONCOMPUTER-AIDED DESIGN OFINTEGRATEDCIRCUITS ANDSYSTEMS[J]. 2021, 40(4): 620-632, https://www.webofscience.com/wos/woscc/full-record/WOS:000633495300002.
[5] Sun Degang. DeepMIT: A Novel Malicious Insider Treat Detection Framework based on Recurreent Neural Network. Proceedings of the 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design. 2021.
[6] 王婷婷, 呂遒健, 胡波, Sun Degang. A Few-Shot Class-Incremental Learning Approach for Intrusion Detection.. The 30th International Conference on Computer Communication and Networks (ICCCN)[J]. 2021.
[7] Yang, Yang, Li, Min, Meng, Bo, Ren, Junxing, Sun, Degang, Huang, Zihao. Rethinking the Aligned and Misaligned Features in One-stage Object Detection. 2021.
[8] Yang, Yang, Li, Min, Meng, Bo, Huang, Zihao, Ren, Junxing, Sun, Degang. Objects as Extreme Points. 2021, http://arxiv.org/abs/2104.14066.
[9] Sun, Degang, Liu, Meichen, Li, Meimei, Shi, Zhixin, Liu, Pengcheng, Wang, Xu, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network.PROCEEDINGS OF THE 2021 IEEE 24THINTERNATIONALCONFERENCE ONCOMPUTERSUPPORTEDCOOPERATIVE WORK IN DESIGN (CSCWD)null. 2021, 335-341.
[10] 王思葉. URTracker: unauthorized reader detection and localization using COTS RFID. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 12937 LNCS, p 339-350, 2021, Wireless Algorithms, Systems, and Applications - 16th International Conference, WASA 2021, Proceedings;. 2021
[11] Wang, Tingting, Zhao, Xufeng, Lv, Qiujian, Hu, Bo, Sun, Degang, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. Density Weighted Diversity Based Query Strategy for Active Learning.PROCEEDINGS OF THE 2021 IEEE 24THINTERNATIONALCONFERENCE ONCOMPUTERSUPPORTEDCOOPERATIVE WORK IN DESIGN (CSCWD)null. 2021, 156-161.
[12] 孫德剛, 郭韻婷, 喻民,姜建國, 黃偉慶. FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching. IJCNNnull. 2021.