|
Ke Sun | Shanghai University | Publications
Preprint
Book Chapter
I. Esnaola, S. M. Perlaza, and K. Sun, ‘‘Data-Injection Attacks,’’ in ‘‘Advanced Data Analytics for Power Systems’’, A. Tajer, S. M. Perlaza and H. V. Poor, Eds., Chapter 9, pp. 197-229, Cambridge University Press, Cambridge, UK, 2021.
Journals
Z. Li, Q. Zhu, Y. Cai, K. Sun*, Z. Wang, and Y. Peng, ‘‘Dynamic Multi-Scale Integration Network with Multivariate Interaction for Probabilistic Sea Surface Temperature Forecasting,’’ IEEE Trans. Geoscience and Remote Sensing, vol. 53, pp.4209312, Jul. 2025.
Q. Liu, K. Sun, W. Liu, Y. Li*, X. Zheng, C. Cao, J. Li. and W. Tao, ‘‘Quantitative risk assessment for connected automated vehicles: Integrating improved STPA-SafeSec and Bayesian network,’’ Reliability Engineering & System Safety, vol. 253, pp.110528, Jan. 2025.
Q. Liu, X. Li, K. Sun, Y. Li*, and Y. Liu*, ‘‘SISSA: Real-time monitoring of hardware functional safety and cybersecurity with in-vehicle SOME/IP ethernet traffic,’’ IEEE Internet of Things J., vol. 11, no. 16, pp.27322-27339, Aug. 2024.
Y. Li, W. Liu, Q. Liu, X. Zheng, K. Sun*, C. Huang, Complying with ISO 26262 and ISO/SAE 21434: A Safety and Security Co-Analysis Method for Intelligent Connected Vehicle,’’ Sensors, vol. 24, no. 6, pp.1848, Mar. 2024.
K. Sun and Z. Li*, ‘‘Sparse data injection attacks on smart grid: An information-theoretic approach,’’ IEEE Sensors Journal, vol. 22, no. 14, pp. 14553 - 14562, Jul. 2022.
K. Sun*, I. Esnaola, O. Okorie, F. Charnley, M. Moreno, and A. Tiwari, ‘‘Data-driven modeling and monitoring of fuel cell performance,’’ International Journal of Hydrogen Energy, vol. 46, no. 66, pp. 33206-33217, Sep. 2021.
K. Sun*, I. Esnaola, S. M. Perlaza, and H. V. Poor, ‘‘Stealth attacks on the smart grid,’’ IEEE Trans. Smart Grid, vol. 11 , no. 2, pp. 1276-1285, Mar. 2020.
Conferences
J. Wang, Z. Li*, K. Sun, X. Liu, and Y. Zhou, ‘‘DVPE: Divided view position embedding for multi-view 3Dobject detection,’’ in Proc. Int. Joint Conf. on Artificial Intelligence (IJCAI), Jeju, South Korea, Aug. 2024, pp. 6877 - 6885.
D. Li, Y. Li*, G. Zhang, K. Sun, and J. Li, ‘‘Fooling object detectors in the physical world with natural adversarial camouflage,’’ in Proc. IEEE Conf. on Trust, Security and Privacy in Computing and Communications, Exeter, UK, Nov. 2023, pp. 141 - 148.
K. Sun*, S. M. Perlaza, and A. Jean-Marie, ‘‘2×2 zero-sum games with commitments and noisy observations,’’, in Proc. IEEE Int. Symp. on Information Theory, Taipei, Taiwan, Jun. 2023, pp. 2254 - 2259.
K. Sun*, I. Esnaola, A. M. Tulino and H. V. Poor, ‘‘Learning requirements for stealth attacks,’’ in Proc. IEEE Int. Conf. on Acoust., Speech, and Signal Process., Brighton, UK, May 2019, pp. 8102-8106. (invited paper)
K. Sun*, I. Esnaola, S. M. Perlaza, and H. V. Poor, ‘‘Information-theoretic attacks in the smart grid,’’ in Proc. IEEE Int. Conf. on Smart Grid Commun., Dresden, Germany, Oct. 2017, pp. 455-460.
Z. Yu*, W. Shao, H. Qu, K. Sun, and W. Xu, ‘‘A comparative study of pricing control algorithms in deregulated electricity market,’’ in Proc. of Chinese Intelligent Automation Conf., Fuzhou, China, Jan. 2015, pp. 373-381.
Patents
K. Sun, W. Zhang, J. Yan, Z. Li, S. Xie, H. You, Y. Li, and X. Luo, ‘‘A Low-Cost Moving Target Defense Method Against False Data Injection Attacks,’’ China Patent 202511426221.X, Sep. 30, 2025. (Application Accepted)
Technical Reports
Thesis
|