Ke Sun | Shanghai University | Publications
Preprint
Book Chapter
I. Esnaola, S. M. Perlaza, and K. Sun, ‘‘Data-Injection Attacks,’’ in ‘‘Advanced Data Analytics for Power Systems’’, A. Tajer, S. M. Perlaza and H. V. Poor, Eds., Chapter 9, pp. 197-229, Cambridge University Press, Cambridge, UK, 2021.
Journals
Q. Liu, K. Sun, W. Liu, Y. Li*, X. Zheng, C. Cao, J. Li. and W. Tao, ‘‘Quantitative risk assessment for connected automated vehicles: Integrating improved STPA-SafeSec and Bayesian network,’’ Reliability Engineering & System Safety, vol. 253, pp.110528, Jan. 2025.
Q. Liu, X. Li, K. Sun, Y. Li*, and Y. Liu*, ‘‘SISSA: Real-time monitoring of hardware functional safety and cybersecurity with in-vehicle SOME/IP ethernet traffic,’’ IEEE Internet of Things J., vol. 11, no. 16, pp.27322-27339, Aug. 2024
K. Sun and Z. Li*, ‘‘Sparse data injection attacks on smart grid: An information-theoretic approach,’’ IEEE Sensors Journal, vol. 22, no. 14, pp. 14553 - 14562, Jul. 2022.
K. Sun*, I. Esnaola, O. Okorie, F. Charnley, M. Moreno, and A. Tiwari, ‘‘Data-driven modeling and monitoring of fuel cell performance,’’ International Journal of Hydrogen Energy, vol. 46, no. 66, pp. 33206-33217, Sep. 2021.
K. Sun*, I. Esnaola, S. M. Perlaza, and H. V. Poor, ‘‘Stealth attacks on the smart grid,’’ IEEE Trans. Smart Grid, vol. 11 , no. 2, pp. 1276-1285, Mar. 2020.
Conferences
J. Wang, Z. Li*, K. Sun, X. Liu, and Y. Zhou, ‘‘DVPE: Divided view position embedding for multi-view 3Dobject detection,’’ in Proc. Int. Joint Conf. on Artificial Intelligence (IJCAI), Jeju, South Korea, Aug. 2024, pp. 6877 - 6885.
D. Li, Y. Li*, G. Zhang, K. Sun, and J. Li, ‘‘Fooling object detectors in the physical world with natural adversarial camouflage,’’ in Proc. IEEE Conf. on Trust, Security and Privacy in Computing and Communications, Exeter, UK, Nov. 2023, pp. 141 - 148.
K. Sun*, S. M. Perlaza, and A. Jean-Marie, ‘‘2×2 zero-sum games with commitments and noisy observations,’’, in Proc. IEEE Int. Symp. on Information Theory, Taipei, Taiwan, Jun. 2023, pp. 2254 - 2259.
K. Sun*, I. Esnaola, A. M. Tulino and H. V. Poor, ‘‘Learning requirements for stealth attacks,’’ in Proc. IEEE Int. Conf. on Acoust., Speech, and Signal Process., Brighton, UK, May 2019, pp. 8102-8106. (invited paper)
K. Sun*, I. Esnaola, S. M. Perlaza, and H. V. Poor, ‘‘Information-theoretic attacks in the smart grid,’’ in Proc. IEEE Int. Conf. on Smart Grid Commun., Dresden, Germany, Oct. 2017, pp. 455-460.
Z. Yu*, W. Shao, H. Qu, K. Sun, and W. Xu, ‘‘A comparative study of pricing control algorithms in deregulated electricity market,’’ in Proc. of Chinese Intelligent Automation Conf., Fuzhou, China, Jan. 2015, pp. 373-381.
Technical Reports
Posters
I. Esnaola, K. Sun, R. Boynton, and M. A. Balikhin, ‘‘What are the solar wind parameters that control fluxes of relativistic electrons at GEO?’’, in AGU Fall Meeting, Dec. 2020.
K. Sun, ‘‘An information-theoretic approach to cybersecurity of smart grid’’, in Proc. 9th National Doctoral Researcher Awards Competition, Virtual Conference, Sep. 2020.
K. Sun, I. Esnaola, A. M. Tulino and H. V. Poor, ‘‘Learning requirements for stealth attacks’’, in Proc. 5th London Symp. on Inform. Theory , London, UK, May 2019.
Thesis
|