Weiqing Sun
-
Professor
Director of Master's Programs in Cyber Security
Cyber Security Faculty Fellow, Engineering Technology , College of Engineering
Overview
overview
-
Dr. Weiqing Sun is a professor at Computer Science and Engineering Technology Program, and program director of Master's Programs in Cyber Security, College of Engineering at The University of Toledo. He obtained his Ph.D. degree from Computer Science Department at Stony Brook University (SUNY at Stony Brook) in 2008. He holds B.E and M.E. in Computer Science and Engineering from Tongji University, Shanghai, China. Dr. Sun has been working in the area of computer and network security for more than 20 years. His expertise covers a wide range of topics such as malware defense and detection, security policy development, security testbed development, intrusion detection, and security issues with software-defined networking, unmanned aerial vehicles, cloud computing, healthcare information system, transportation information system, and smart grids. He has advised over 40 Masters and Ph.D. students resulting in more than 60 peer-reviewed articles published in reputed journals and international conferences. His research has been supported by Department of Energy, Ohio Department of Transportation and the University of Toledo. He has led the efforts to establish the Master’s Programs in Cyber Security at UT College of Engineering and serves as its founding Director. He also serves as the Cyber Security Faculty Fellow for UT DTAS (Division of Technology and Advanced Solutions).
Publications
selected publications
-
Article (Faculty180)
-
2022
-
2019Security Modeling of Autonomous Systems: A Survey. ACM Computing Surveys . 52.
-
2017A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN). EAI Endorsed Transactions on Security and Safety. 4.
-
2015GNSSim: An Open Source GNSS/GPS Framework for Unmanned Aerial Vehicular Network Simulation. EAI Endorsed Transactions on Mobile Communications and Applications. 2.
-
2015Impact on SDN Powered Network Services Under Adversarial Attacks. Procedia Computer Science. 62:228-235.
-
2015Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation. EAI Endorsed Transactions on Scalable Information Systems. 2.
-
2013Trust System Design Optimization in Smart Grid Network Infrastructure. IEEE Transactions on Smart Grid. 4:184-195.
-
2011Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids. IEEE Transactions on Smart Grid. 2:796-808.
-
2009Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. ACM Trans. Inf. Syst. Secur.. 12:14:1.
-
-
Article (Web of Science)
-
2019Security Modeling of Autonomous Systems: A Survey. ACM COMPUTING SURVEYS. 52.Full Text via DOI: 10.1145/3337791
-
2017Analysis of Global Positioning System-based attacks and a novel Global Positioning System spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation. SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL. 93:427-441.Full Text via DOI: 10.1177/0037549716685874
-
2015Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation. ICST Transactions on Scalable Information Systems. 2:e4.Full Text via DOI: 10.4108/sis.2.4.e4
-
2013Trust System Design Optimization in Smart Grid Network Infrastructure. IEEE TRANSACTIONS ON SMART GRID. 4:184-195.Full Text via DOI: 10.1109/TSG.2012.2224390
-
2013Trust System Design Optimization in Smart Grid Network Infrastructure. IEEE TRANSACTIONS ON SMART GRID. 4:184-195.Full Text via DOI: 10.1109/tsg.2012.2224390
-
2011Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids. IEEE TRANSACTIONS ON SMART GRID. 2:796-808.Full Text via DOI: 10.1109/TSG.2011.2159818
-
2011Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids. IEEE TRANSACTIONS ON SMART GRID. 2:796-808.Full Text via DOI: 10.1109/tsg.2011.2159818
-
2009Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY. 12.Full Text via DOI: 10.1145/1455526.1455527
-
-
Chapter (Faculty180)
-
2018Application of deep learning as a pattern recognition technique in information security. Advances in Pattern Recognition Research. 141-172.
-
-
Proceedings (Faculty180)
-
Proceedings Paper (Web of Science)
-
2021Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets. ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY. 160-171.Full Text via DOI: 10.5220/0010253501600171
-
2018Security Enhancement of Over-the-Air Update for Connected Vehicles. 853-864.Full Text via DOI: 10.1007/978-3-319-94268-1_78
-
2016Distributed Network Traffic Feature Extraction for a Real-time IDS. 2014 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT). 522-526.
-
2016Efficient Spam Detection across Online Social Networks. PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA). 225-230.
-
2015Impact on SDN Powered Network Services under Adversarial Attacks. COMPLEX ADAPTIVE SYSTEMS. 228-235.Full Text via DOI: 10.1016/j.procs.2015.08.444
-
2015LightVN: A Light-Weight Testbed for Network and Security Experiments. 2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS. 459-464.Full Text via DOI: 10.1109/ITNG.2015.79
-
2015Security Enhancement of Secure USB Debugging in Android System. 2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE. 134-139.
-
2015Light VN: A Light-Weight Testbed for Network and Security ExperimentsFull Text via DOI: 10.1109/itng.2015.79
-
2014Impact of UPFC on Power System Reliability Considering its Cyber Vulnerability. 2014 IEEE PES T&D CONFERENCE AND EXPOSITION.
-
2013A Preliminary Study of Power System Reliability Evaluation Considering Cyber Attack Effects. 2011 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING.
-
2013An Information Flow Security Model for Home Area Network of Smart Grid. 2013 IEEE 3RD ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL AND INTELLIGENT SYSTEMS (CYBER). 456-+.
-
2013Investigating the Impact of Cyber Attacks on Power System Reliability. 2013 IEEE 3RD ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL AND INTELLIGENT SYSTEMS (CYBER). 462-+.
-
2013Placement of Primary-Secondary Trust Nodes in Smart Grid Communication Network. 2011 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING.
-
2013Reliability Evaluation of Power Grids Considering Worm Spreading Pattern in SCADA. 2013 IEEE PES ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC).
-
2013UAVSim: A Simulation Testbed for Unmanned Aerial Vehicle Network Cyber Security Analysis. 2013 IEEE GLOBECOM WORKSHOPS (GC WKSHPS). 1432-1436.
-
2012A NEURAL NETWORK BASED DISTRIBUTED INTRUSION DETECTION SYSTEM ON CLOUD PLATFORM. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3. 75-79.
-
2012Cyber Security Threat Analysis and Modeling of an Unmanned Aerial Vehicle System. 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY. 585-590.
-
2012Efficient Trust Node Aware Routing in ZigBee Communication Network of Smart Grid. 2012 CONFERENCE ON POWER & ENERGY - IPEC. 321-326.
-
2012FPGA Based Device Specific Key Generation Method using Physically Uncloanble Functions and Neural Networks. 2012 IEEE 55TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS). 330-333.
-
2012Location and Communication Routing Optimization of Trust Nodes in Smart Grid Network Infrastructure. 2011 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING.
-
2011Artificial Immune System based Intrusion Detection in A Distributed Hierarchical Network Architecture of Smart Grid. 2011 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING.
-
2011I-RBAC: Isolation Enabled Role-Based Access Control. 2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST. 79-86.
-
2008Practical Proactive Integrity Preservation: A Basis for Malware Defense. 2008 IEEE Symposium on Security and Privacy (sp 2008).Full Text via DOI: 10.1109/sp.2008.35
-
Contact
full name
- Weiqing Sun