孙轲 | 上海大学 | 论文发表
图书章节
I. Esnaola, S. M. Perlaza, and K. Sun, ‘‘Data-Injection Attacks,’’ in ‘‘Advanced Data Analytics for Power Systems’’, A. Tajer, S. M. Perlaza and H. V. Poor, Eds., Chapter 9, pp. 197-229, Cambridge University Press, Cambridge, UK, 2021.
期刊论文
Q. Liu, K. Sun, W. Liu, Y. Li*, X. Zheng, C. Cao, J. Li. and W. Tao, ‘‘Quantitative risk assessment for connected automated vehicles: Integrating improved STPA-SafeSec and Bayesian network,’’ Reliability Engineering & System Safety, vol. 253, pp.110528, Jan. 2025. (中科院一区TOP, IF = 9.4)
Q. Liu, X. Li, K. Sun, Y. Li*, and Y. Liu*, ‘‘SISSA: Real-time monitoring of hardware functional safety and cybersecurity with in-vehicle SOME/IP ethernet traffic,’’ IEEE Internet of Things J. , vol. 11, no. 16, pp.27322-27339, Aug. 2024 (中科院一区TOP,IF = 8.2)
K. Sun and Z. Li*, ‘‘Sparse data injection attacks on smart grid: An information-theoretic approach,’’ IEEE Sensors Journal, vol. 22, no. 14, pp. 14553 - 14562, Jul. 2022. (中科院二区,IF = 4.3)
K. Sun*, I. Esnaola, O. Okorie, F. Charnley, M. Moreno, and A. Tiwari, ‘‘Data-driven modeling and monitoring of fuel cell performance,’’ International Journal of Hydrogen Energy, vol. 46, no. 66, pp. 33206-33217, Sep. 2021. (中科院二区,IF = 8.1)
K. Sun*, I. Esnaola, S. M. Perlaza, and H. V. Poor, ‘‘Stealth attacks on the smart grid,’’ IEEE Trans. Smart Grid, vol. 11 , no. 2, pp. 1276-1285, Mar. 2020. (中科院一区TOP,IF = 8.6)
会议论文
J. Wang, Z. Li*, K. Sun, X. Liu, and Y. Zhou, ‘‘DVPE: Divided view position embedding for multi-view 3Dobject detection,’’ in Proc. Int. Joint Conf. on Artificial Intelligence (IJCAI), Jeju, South Korea, Aug. 2024, pp. 6877 - 6885. (CCF A,人工智能顶会)
D. Li, Y. Li*, G. Zhang, K. Sun, and J. Li, ‘‘Fooling object detectors in the physical world with natural adversarial camouflage,’’ in Proc. IEEE Conf. on Trust, Security and Privacy in Computing and Commun., Exeter, UK, Nov. 2023, pp. 141 - 148. (CCF C)
K. Sun*, S. M. Perlaza, and A. Jean-Marie, ‘‘2×2 zero-sum games with commitments and noisy observations,’’, in Proc. IEEE Int. Symp. on Information Theory, Taipei, Taiwan, Jun. 2023, pp. 2254 - 2259. (信息论顶会)
K. Sun*, I. Esnaola, A. M. Tulino and H. V. Poor, ‘‘Learning requirements for stealth attacks,’’ in Proc. IEEE Int. Conf. on Acoust., Speech, and Signal Process., Brighton, UK, May 2019, pp. 8102-8106. (invited paper) (CCF B,信号处理顶会)
K. Sun*, I. Esnaola, S. M. Perlaza, and H. V. Poor, ‘‘Information-theoretic attacks in the smart grid,’’ in Proc. IEEE Int. Conf. on Smart Grid Commun., Dresden, Germany, Oct. 2017, pp. 455-460.
Z. Yu*, W. Shao, H. Qu, K. Sun, and W. Xu, ‘‘A comparative study of pricing control algorithms in deregulated electricity market,’’ in Proc. of Chinese Intelligent Automation Conf., Fuzhou, China, Jan. 2015, pp. 373-381.
技术报告
海报
I. Esnaola, K. Sun, R. Boynton, and M. A. Balikhin, ‘‘What are the solar wind parameters that control fluxes of relativistic electrons at GEO?’’, in AGU Fall Meeting, Dec. 2020.
K. Sun, ‘‘An information-theoretic approach to cybersecurity of smart grid’’, in Proc. 9th National Doctoral Researcher Awards Competition, Virtual Conference, Sep. 2020.
K. Sun, I. Esnaola, A. M. Tulino and H. V. Poor, ‘‘Learning requirements for stealth attacks’’, in Proc. 5th London Symp. on Inform. Theory , London, UK, May 2019.
毕业论文
|