


default search action
Xiaoshan Sun
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c17]Junjie Wang, Peng Xu, Jinyang Li, Xiaoshan Sun, Wenchong Tian, Jie Ling, Wei Zheng, Hengchang Liu:
Towards an Efficient Cyber-Physical System for First-Mile Taxi Transit in Urban Complex. HASE 2019: 9-16 - 2018
- [c16]Xiaoshan Sun, Yu Fu, Yun Dong, Zhihao Liu, Yang Zhang:
Improving Fitness Function for Language Fuzzing with PCFG Model. COMPSAC (1) 2018: 655-660 - [c15]Qi Liu, Jinyang Li, Xiaoshan Sun, Junjie Wang, Yang Ning, Wei Zheng, Jian Li, Hengchang Liu:
Towards an Efficient and Real-Time Scheduling Platform for Mobile Charging Vehicles. ICA3PP (3) 2018: 402-416 - [c14]Peng Xu, Xiaoshan Sun, Junjie Wang, Jinyang Li, Wei Zheng, Hengchang Liu:
Dynamic pricing at electric vehicle charging stations for waiting time reduction. ICCIP 2018: 204-211 - [c13]Jinyang Li, Zhiheng Xie, Xiaoshan Sun, Jian Tang, Hengchang Liu, John A. Stankovic:
An Automatic and Accurate Localization System for Firefighters. IoTDI 2018: 13-24 - [c12]Jinyang Li, Xiaoshan Sun, Qi Liu, Wei Zheng, Hengchang Liu, John A. Stankovic:
Planning Electric Vehicle Charging Stations Based on User Charging Behavior. IoTDI 2018: 225-236 - [c11]Qi Liu, Jinyang Li, Xiaoshan Sun, Peng Xu, Junjie Wang, Wei Zheng, Jian Li, Hengchang Liu:
Planning Mobile Charging Vehicles Based on User Charging Behavior. IoPARTS@MobiSys 2018: 37-42 - [c10]Jinyang Li, Tingzhi Li, Xiaoshan Sun, Peng Xu, Junjie Wang, Qi Liu, Wei Zheng, Jian Li, Hengchang Liu:
Towards Accurate and Real-time Information Extrapolation on Charging Pile Network. IoPARTS@MobiSys 2018: 43-48 - 2017
- [c9]Peng Xu, Jinyang Li, Xiaoshan Sun, Wei Zheng, Hengchang Liu:
Dynamic Pricing at Electric Vehicle Charging Stations for Queueing Delay Reduction. ICDCS 2017: 2565-2566 - [c8]Junjie Wang, Jinyang Li, Tianshu Pang, Xiaoshan Sun, Qi Liu, Hengchang Liu:
Towards a holistic and optimized framework for smart grid regulation. IPCCC 2017: 1-8 - 2016
- [j2]Xiaoshan Sun, Shaohan Hu, Lu Su, Tarek F. Abdelzaher, Pan Hui, Wei Zheng, Hengchang Liu, John A. Stankovic:
Participatory Sensing Meets Opportunistic Sharing: Automatic Phone-to-Phone Communication in Vehicles. IEEE Trans. Mob. Comput. 15(10): 2550-2563 (2016) - [c7]Xiaoshan Sun, Jinyang Li, Wei Zheng, Hengchang Liu:
Towards a Sustainable Incentive Mechanism for Participatory Sensing. IoTDI 2016: 49-60 - 2015
- [c6]Yang Zhang, Xiaoshan Sun, Yi Deng, Liang Cheng, Shuke Zeng, Yu Fu, Dengguo Feng:
Improving Accuracy of Static Integer Overflow Detection in Binary. RAID 2015: 247-269 - 2014
- [j1]Liang Cheng
, Yang Zhang, Zhihui Han, Yi Deng, Xiaoshan Sun, Dengguo Feng:
Evaluating and comparing the quality of access control in different operating systems. Comput. Secur. 47: 26-40 (2014) - [c5]Zhihui Han, Liang Cheng, Yang Zhang, Shuke Zeng, Yi Deng, Xiaoshan Sun:
Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones. TrustCom 2014: 432-439 - 2013
- [c4]Xiaoshan Sun, Liang Cheng, Yang Zhang, Yi Deng, Jingbiao Hou:
Refining the Pointer Analysis by Exploiting Constraints on the CFL-Paths. APSEC (1) 2013: 17-24 - [c3]Dong Chen, Yang Zhang, Liang Cheng, Yi Deng, Xiaoshan Sun:
Heuristic Path Pruning Algorithm Based on Error Handling Pattern Recognition in Detecting Vulnerability. COMPSAC Workshops 2013: 95-100 - [c2]Yi Deng, Yang Zhang, Liang Cheng, Xiaoshan Sun:
Static Integer Overflow Vulnerability Detection in Windows Binary. IWSEC 2013: 19-35 - 2011
- [c1]Xiaoshan Sun, Liang Cheng, Yang Zhang:
A Covert Timing Channel via Algorithmic Complexity Attacks: Design and Analysis. ICC 2011: 1-5
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint