Engineering Technology

Papers and Publications

Journal Publications

  • A Deep Learning based DDoS Detection in Software-defined Networking (SDN) [Link]
    Quamar Niyaz, Weiqing Sun, and Ahmad Javaid
    EAI Endorsed Transactions on Security and Safety, 17(12): e2, Dec. 2017

  • Analysis of Global Positioning System-based attacks and a novel Global Positioning System spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation [Link]
    Ahmad Javaid, Farha Jahan, and Weiqing Sun
    Simulation, Vol. 93, no. 5 (May 2017): 427-441

  • GNSSim: An open source GNSS/GPS framework for Unmanned Aerial Vehicular Network Simulation [Link]
    Farha Jahan, Ahmad Javaid, Weiqing Sun, and Mansoor Alam
    EAI Endorsed Transactions on Mobile Communication and Application, Vol. 2 Issue 6, 2015

  • Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation [Link]
    Ahmad Javaid, Weiqing Sun, and Mansoor Alam
    EAI Endorsed Transactions on Scalable Information Systems, Vol. 2 Issue 4, pp 1-11, 2015
  • Trust System Design Optimization in Smart Grid Network Infrastructure [Link]
    Yichi Zhang, Lingfeng Wang, and Weiqing Sun
    IEEE Transactions on Smart Grid, pp. 184-195, vol. 4, no. 1, March 2013
  • Distributed Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids [Link]
    Yichi Zhang, Lingfeng Wang, Weiqing Sun, Robert C. Green II, and Mansoor Alam
    IEEE Transactions on Smart Grid, Special issue on Cyber, Physical and System Security for Smart Grid, Vol. PP, Issue 99, July 2011
  • Alcatraz: An Isolated Environment for Experimenting with Untrusted Software [Link]
    Zhenkai Liang, Weiqing Sun, R. Sekar and V.N. Venkatakrishnan
    ACM Transactions on Information and System Security (TISSEC), Vol. 12, No. 3, January 2009

  Peer-reviewed Conference/Workshop Publication

  • Security Enhancement of Over-the-Air Update for Connected Vehicles
    Akshay Chawan, Weiqing Sun, Ahmad Javaid, and Umesh Gurav
    2018 International Workshop on Security and Privacy Assurance Technologies for Emerging Networks (SPATEN 2018)
    Tianjin, China, June 20-22, 2018.

  • A Web-based Lightweight Testbed for Supporting Network Security Hands-on Labs
    Wei Liu, Quamar Niyaz, Weiqing Sun, and Ahmad Y Javaid
    18th Annual IEEE International Conference On Electro Information Technology (EIT 2018)
    Rochester, Michigan, USA, May 3-5, 2018.

  • Efficient Isolation Enabled Role-Based Access Control for Database Systems
    Mohammad Rahat Helal, Weiqing Sun, and Ahmad Y Javaid
    2017 International Conference on Security and Management (SAM 2017)
    Las Vegas, USA, July 17-20, 2017.

  • Normal and Anomalous Traffic Flow Pattern Analysis for Organizational Networks
    Safia Rahmat, Quamar Niyaz, Ahmad Y Javaid, and Weiqing Sun
    2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)
    Windsor, ON, April 30-May 3, 2017.

  • Distributed Network Traffic Feature Extraction for a Real-time IDS
    Ahmad M Karimi, Quamar Niyaz, Weiqing Sun, Ahmad Y Javaid, and Vijay K Devabhaktuni
    17th IEEE Electro/Information Technology (EIT 2016)
    Grand Forks, North Dakota, May 2016.

  • Efficient Spam Detection across Online Social Networks
    Hailu Xu, Weiqing Sun, and Ahmad Y Javaid
    IEEE International Conference on Big Data Analysis (ICBDA)
    Hangzhou, China, March 2016.

  • A Deep Learning Approach for Network Intrusion Detection System
    Quamar Niyaz, Weiqing Sun, Ahmad Y Javaid, and Mansoor Alam
    9th EAI International Conference on Bio-inspired Information and Communications Technologies
    New York City, NY, Dec. 2015.

  • LightVN: A Light-Weight Testbed for Network and Security Experiments [pdf]
    Quamar Niyaz, Weiqing Sun, Rao Xu, and Mansoor Alam
    12th International Conference on Information Technology: Next Generations (ITNG 15)
    Las Vegas, Nevada, April 2015.
  • Impact on SDN Powered Network Services under Adversarial Attacks
    Quamar Niyaz, Weiqing Sun, and Mansoor Alam
    2015 International Conference on Soft Computing and Software Engineering (SCSE'15)
    Berkeley, CA, Mar. 2015.
  • Security Enhancement of Secure USB Debugging in Android System
    Mingzhe Xu, Weiqing Sun, and Mansoor Alam
    12th Annual IEEE Consumer Communications & Networking Conference (CCNC 2015)
    Las Vegas, Nevada, January 2015.
  • UAVNet Simulation in UAVSim: A Performance Evaluation and Enhancement
    Ahmad Javaid, Weiqing Sun, and Mansoor Alam
    9th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TridentCom 2014)
    Guangzhou, China, May 2014.
  • A Smart Home Network Simulation Testbed for Cybersecurity Experimentation
    Jizhou Tong, Weiqing Sun, and Lingfeng Wang
    9th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TridentCom 2014)
    Guangzhou, China, May 2014.
  • Impact of UPFC on Power System Reliability Considering its Cyber Vulnerability [Link]
    Yingmeng Xiang, Yichi Zhang, Lingfeng Wang, and Weiqing Sun
    2014 IEEE PES T&D Conference and Exposition
    Chicago, IL, USA, April 2014.
  • UAVSim: A Simulation Testbed for Unmanned Aerial Vehicle Network Cyber Security Analysis
    Ahmad Javaid, Weiqing Sun, and Mansoor Alam
    4th International Workshop on Wireless Networking and Control for Unmanned Autonomous Vehicles (Wi-UAV 2013)
    Atlanta, Georgia, USA, December 09, 2013.
  • A Flexible Role-Based Delegation Model with Dynamic Delegation Role Structure[pdf]
    Zidong Liu, Weiqing Sun, and Mansoor Alam
    The 2013 International Conference on Security and Management (SAM'13)
    Las Vegas, USA, July 2013.
  • A Preliminary Study of Power System Reliability Evaluation Considering Cyber Attack Effects[Link]
    Yichi Zhang, Lingfeng Wang, and Weiqing Sun
    2013 IEEE PES General Meeting
    Vancouver, BC, Canada, July 2013.
  • Placement of Primary-Secondary Trust Nodes in Smart Grid Communication Network[Link]
    Yichi Zhang, Weiqing Sun, and Lingfeng Wang
    2013 IEEE PES General Meeting
    Vancouver, BC, Canada, July 2013.
  • An Information Flow Security Model for Home Area Network of Smart Grid
    Jizhou Tong, Weiqing Sun, and Lingfeng Wang
    3rd IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems (IEEE-CYBER 2013)
    Nanjing, China, May 2013.
  • Investigating the Impact of Cyber Attacks on Power System Reliability
    Yichi Zhang, Lingfeng Wang, and Weiqing Sun
    3rd IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems (IEEE-CYBER 2013)
    Nanjing, China, May 2013.
  • Efficient Trust Node Aware Routing in ZigBee Communication Network of Smart Grid[Link]
    Yichi Zhang, Weiqing Sun, and Lingfeng Wang
    The 10th International Power and Energy Conference (IPEC 2012)
    Ho Chi Minh City, Vietnam, December 2012.
  • Cyber Security Threat Analysis and Modeling of an Unmanned Aerial Vehicle System[Link]
    Ahmad Javaid, Weiqing Sun, Vijay Devabhaktuni, and Mansoor Alam
    2012 IEEE International Conference on Technologies for Homeland Security (HST' 12)
    Waltham, MA, November 2012.
  • A Neural Network Based Distributed Intrusion Detection System on Cloud Platform[Link]
    Zhe Li, Weiqing Sun, and Lingfeng Wang
    2012 2nd IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS 2012)
    Hangzhou, China, Oct. 30-Nov. 1, 2012.
  • Location and Communication Routing Optimization of Trust Nodes in Smart Grid Network Infrastructure[Link]
    Yichi Zhang, Weiqing Sun, and Lingfeng Wang
    2012 IEEE Power & Energy Society General Meeting
    San Diego, California, July 2012.
  • A Real-Time Testbed for Routing Network[pdf]
    Kang Yao, Weiqing Sun, Mansoor Alam, Mingzhe Xu, and Vijay Devabhaktuni
    8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom 2012)
    Thessaloniki, Greece, June 2012.
  • FPGA based Trustworthy Authentication Technique using Physically Unclonable Functions and Artificial Intelligence[Link]
    Swetha Pappala, Mohammed Niamat, and Weiqing Sun
    IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2012)
    San Francisco, California, June 2012.
  • Fault-tolerant Optimal Routing of Trust Nodes in Smart Grid Communications[Link]
    Yichi Zhang, Weiqing Sun, and Lingfeng Wang
    2nd IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems (IEEE-CYBER 2012)
    Bangkok, Thailand, May 2012.
  • A Healthcare Information System with Augmented Access Controls[pdf]
    Nagajyothi Gunti, Weiqing Sun, Mingzhe Xu, Zidong Liu, Mohammed Niamat, and Mansoor Alam
    14th Asia-Pacific Web Conference (APWeb 2012)
    Kunming, China, Apr. 2012
  • A Multi-Level Communication Architecture of Smart Grid Based on Congestion Aware Wireless Mesh Network[Link]
    Yichi Zhang, Weiqing Sun, Lingfeng Wang, Hong Wang, Robert C. Green II, and Mansoor Alam
    2011 North American Power Symposium (NAPS 2011)
    Boston, MA, Aug. 4-6, 2011.
  • I-RBAC: Isolation Enabled Role-Based Access Control[pdf]
    Ngajyothi Gunti, Weiqing Sun, and Mohammed Niamat
    Ninth Annual Conference on Privacy, Security and Trust (PST 2011)
    Montreal, Quebec, Canada, July 19-21, 2011.
  • Artificial Immune System based Intrusion Detection in A Distributed Hierarchical Network Architecture of Smart Grids[Link]
    Yichi Zhang, Lingfeng Wang, Weiqing Sun, Robert C. Green II, and Mansoor Alam
    2011 IEEE Power & Energy Society General Meeting
    Detroit, Michigan, July 2011.
  • Collabra: A Xen Hypervisor based Collaborative Intrusion Detection System[pdf]
    Saketh Bharadwaja, Weiqing Sun, Mohammed Niamat and Fangyang Shen
    8th International Conference on Information Technology: Next Generations (ITNG 11)
    Las Vegas, NV, Apr. 2011.
  • Experiences from a Time-Condensed Computer Security Class[pdf]
    Weiqing Sun
    7th International Conference on Information Technology: Next Generations (ITNG 10)
    Las Vegas, NV, Apr. 2010.
  • V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments[pdf]
    Weiqing Sun, Varun Katta, Kumar Krishna and R. Sekar
    Workshop on Cyber Security Experimentation and Test (CSET 08)
    San Jose, CA, July 2008.
  • Expanding Malware Defense by Securing Software Installations[pdf]
    Weiqing Sun, R. Sekar, Zhenkai Liang and V.N. Venkatakrishnan
    5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 08)
    Paris, France, July 2008.
  • Practical Proactive Integrity Preservation: A Basis for Malware Defense[pdf]
    Weiqing Sun, R. Sekar, Gaurav Poothia, and Tejas Karandikar
    2008 IEEE Symposium on Security and Privacy (S&P 2008)
    Oakland, CA, May 2008.
  • One-way Isolation: An Effective Approach for Realizing Safe Execution Environments [pdf]
    Weiqing Sun, Zhenkai Liang, R. Sekar and V.N. Venkatakrishnan
    12th Annual Network and Distributed System Security Symposium (NDSS 05)
    San Diego, California, Feb. 2005.
  • V-NetLab: A Cost-Effective Platform to Support Course Projects in Computer Security [pdf]
    Kumar Krishna, Weiqing Sun, Pratik Rana, Tianning Li and R. Sekar
    9th Annual Colloquium for Information Systems Security Education (CISSE 05)
    Atlanta, GA, Jun. 2005.

Dissertation and Thesis


Practical Information Flow Based Techniques to Safeguard Host Integrity
Weiqing Sun
Ph.D. Dissertation
Department of Computer Science, Stony Brook University, May 2008.

 

 

 

 

 

 

 

 

Last Updated: 6/27/22