Selected Publish Paper:
(1)Yan Li, Zhenrui Zhang, Zhiyu Lang, Xiang Li, Jia Zhang, Donghong Sun: Wolf in Sheep's Clothing: Understanding and Detecting Mobile Cloaking in Blackhat SEO. ACNS (2) 2025: 74-103
(2)Guodong Zhang, Tianyu Yao, Jiawei Qin, Yitao Li, Qiao Ma, Donghong Sun,CodeSAGE:A multi-feature fusion vulnerability detection approach using code attribute graphs and attention mechanisms, J. Inf. Secur. Appl. 89: 103973,2025
(3)Yubo Chen, Chuhan Wu, Tao Qi, Zhigang Yuan, Yuesong Zhang, Shuai Yang, Jian Guan, Donghong Sun, Yongfeng Huang,Semi-supervised named entity recognition in multi-level contexts. Neurocomputing 520: 194-204,2023
(4)Mingxuan Liu, Zihan Zhang, Yiming Zhang, Chao Zhang, Zhou Li, Qi Li, Haixin Duan, Donghong Sun, Automatic Generation of Adversarial Readable Chinese Texts. IEEE Trans. Dependable Secur. Comput. 20(2): 1756-1770,2023
(5)Zihan Zhang, Jinfeng Li, Ning Shi, Bo Yuan, Xiangyu Liu, Rong Zhang, Hui Xue, Donghong Sun, Chao Zhang: RoChBert: Towards Robust BERT Fine-tuning for Chinese. EMNLP (Findings) 2022: 3502-3516
(6)Chuyun Deng, Mingxuan Liu, Yue Qin, Jia Zhang, Hai-Xin Duan, Donghong Sun: ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model. NAACL-HLT 2022: 1735-1746
(7)Di Cao, Shan Chang, Zhijian Lin, Guohua Liu, Donghong Sun:Understanding Distributed Poisoning Attack in Federated Learning. ICPADS 2019: 233-239
(8)Shanila Azhar, Shan Chang, Ye Liu, Yuting Tao, Guohua Liu, Donghong Sun:Utility-Aware Participant Selection with Budget Constraints for Mobile Crowd Sensing. QSHINE 2019: 38-49
(9)Cheng Ling, Tsuyoshi Hamada, Jing-Yang Gao, Guoguang Zhao, Donghong Sun, Weifeng Shi:MrBayes tgMC3++: A High Performance and Resource-Efficient GPU-Oriented Phylogenetic Analysis Method. IEEE ACM Trans. Comput. Biol. Bioinform. 13(5): 845-854,2016
(10)Donghong Sun, Wu Liu, Ping Ren, Ke Liu:Reputation and attribute based dynamic access control framework in cloud computing environment for privacy protection. ICNC-FSKD 2016: 1239-1245
(11)Longhui Wang, Guoguang Zhao, Donghong Sun:Modeling Documents with Event Model. Algorithms 8(3): 562-572,2015
(12)Ping Ren, Wu Liu, Donghong Sun, Ke Liu:Node Localization based on Convex Optimization in Wireless Sensor Networks. FSKD 2015: 2169-2173
(13)Wu Liu, Ping Ren, Donghong Sun, Yawei Zhao, Ke Liu:Study on attacking and defending techniques in IPv6 networks. DSP 2015
(14)Wang Yongke,Zhuge Jianwei,Sun Donghong,Liu Wu,Li Fenghua: ActivityFuzzer: Detecting the Security Vulnerabilities of Android Activity Components,2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SMTA), 2015
(15)Donghong Sun,Zhibiao Shu,Wu Liu,Ping Ren, Analysis of Network Security Data Using Wavelet Transforms, Journal of Algorithms & Computational Technology,2014
(16)Wu Liu, Donghong Sun, Ping Ren, Yihui Zhang,Co-SRL: A Convex Optimization Algorithm for Anchor Localization in Wireless Sensor Networks,AASRI Conference on Parallel and Distributed Computing and Systems,2013
(17)Dongbin Sun, Wu Liu, Donghong Sun, Ping Ren:Study on Anti-Attack Model for Low-Latency Anonymous Communication System. CGC 2012: 327-328
(18)WuLiu,Donghong Sun, Ping Ren, Haibin Xiong: Path-Calculation-Based XML Data Cube Model. ICHIT (1) 2012: 541-549
(19)Donghong Sun,Wu Liu,Ping Ren:A Data Security Protection Mechanism Based on Transparent Biometric Authentication for Mobile Intelligent Terminals,Third Cybercrime and Trustworthy Computing Workshop,2012
(20)Liu Wu, Ren Ping, Sun Donghong, Zhao Yawei, Wu Jian-ping:Protocol Analysis and Online Forensics in IPv6 Network Environment,ICWCNMC 2012
(21)Sun Donghong, Guo Yunchuan, Yin Lihua, Hu Changzhen:COMPARISON OF MEASURING INFORMATION LEAKAGE FOR FULLY PROBABILISTIC SYSTEMS,International Journal of Innovative Computing Information and Control, 2012
(22)Sun DongHong, Liu Li, Zhang Peng, Zhu Xingquan, Shi Yong,Decision Rule Extraction for Regularized Multiple Criteria Linear Programming Model,International Journal of Data Warehousing and Mining, 2011