Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Guozi Sun is active.

Publication


Featured researches published by Guozi Sun.


international conference on computer communications and networks | 2014

A privacy protection policy combined with privacy homomorphism in the Internet of Things

Guozi Sun; Siqi Huang; Wan Bao; Yitao Yang; Zhiwei Wang

Recently, IOT (Internet of Things) develops very rapidly. However, the personal privacy protection is one of directly important factors that impact the large-scale applications of IOT. To solve this problem, this paper proposes a privacy protection policy based on privacy homomorphism. It can protect the security of personal information well by processing the needs of users without acquiring of plaintext. In another aspect, it also greatly improves the performance of the original multiplication homomorphism algorithm.


Multimedia Tools and Applications | 2017

A security carving approach for AVI video based on frame size and index

Yitao Yang; Zheng Xu; Liying Liu; Guozi Sun

Recovery of fragmented files is an important part of digital forensics. Video files are more likely to be fragmented since their sizes are relatively large that recovering video files without the file system information is meaningful. This paper presents a video recovery technique of a fragmented video file using the frame size information in every frame and the index. Many existing video recovery techniques attempt to recover videos using file system information or header/footer flag. These approaches may fail in the situations which the file system information is unknown or videos are fragmented. The proposed method addresses how to extract AVI file fragments from data images and map all the extracted fragments into original order. Experiments result show that mapping the AVI fragments according to the frame size information in every fragment and index is credible and the non-overwritten part of the fragmented video can be recovered using the method.


international conference on communications | 2015

Dump and analysis of Android volatile memory on Wechat

Fan Zhou; Yitao Yang; Zhaokun Ding; Guozi Sun

With the popularity of smartphones, various types of mobile crimes emerge endlessly. Evidence from mobile phones is mostly obtained by non-volatile physical memory dump and file system analysis. The two methods can extract lots of private data, but often invalid for encrypted and deleted data. In this paper, we discuss the Android volatile memory and introduce some methods to dump the memory. Analysis on the Android volatile memory are also presented using software tools. At last the paper provides an in-depth analysis of Android memory structures to extract the encrypted chats and deleted messages on a popular social network application called Wechat [1]. The results show that all chats can be extracted in the form of plaintext, including some deleted messages.


Security and Communication Networks | 2015

Design and implementation of a malware detection system based on network behavior

L. Xue; Guozi Sun

With the increasing of new malicious software attacks, the host-based malware detection methods cannot always detect the latest unknown malware. Intrusion detection system does not focus on malware detection, whereas the behavior-based detection methods still have some difficulties in being deployed in the network layer. This paper presents a malware detection method based on network behavior evidence chains. The proposed new method will detect the specific network behavior characteristics on three different stages as connection establishment, operating control, and connection maintenance. Then a final detection decision will be concluded according to the results detected in the different stages before. A system prototype is implemented to proof concept the proposed malware detection methods. Copyright


asia-pacific services computing conference | 2014

Topic Detection from Microblog Based on Text Clustering and Topic Model Analysis

Siqi Huang; Yitao Yang; Huakang Li; Guozi Sun

This paper raises a Microblog topic detection method based on text clustering and topic model analysis. It solves the problem that the traditional topic detection method is mainly applicable for traditional media text, which is not very effective in handling sparse Micro blog short texts. In consequence of the structural data of the Microblog, which exists rich inter-textual contextual information such as retweets, comments, user hash tag, embedded link URL, we first put forward a feature weight pre-processing method. We also use a clustering algorithm based on word vectors to enrich the feature information of the data. On this basis, we extend the conventional LDA (Latent Dirichlet allocation) topic model to extract the hot topics in the Micro blog data. Compared with the traditional methods, the method raised in this paper is much more effective in the collected text corpus in Sina Microblog.


international conference on behavioral economic and socio cultural computing | 2015

An opinion leader perceptual model based on PageRank algorithm

Huakang Li; Siqi Huang; Guozi Sun

With more and more social public attention from microblog opinion leaders, they have gradually become the essential role to publicize information and influence public opinion in microblog platform, whose ability in monitoring and guiding public opinions also causes public focus. The thesis first proposes to start evaluation about influence of microblog opinion leaders from perspectives of individual activity, node attention degree, and user node quality and so on based on influence characters owned by microblog opinion leaders and constructs the analytical model of microblog information influence combined with PageRank. It can be found from research results that the method proposed in the thesis can analyze accurately and efficiently the influence of information in propagation route of microblog social communication network.


2014 IEEE 8th International Symposium on Embedded Multicore/Manycore SoCs | 2014

An Information Classification Approach Based on Knowledge Network

Huakang Li; Guozi Sun; Bei Xu; Li Li; Jie Huang; Keita Tanno; Wenxu Wu; Changen Xu

Numerous critical Internet applications with high-quality services, such as Web directory, search engine, Web crawler, recommendation system and user profile detector, etc. Almost depend on the efficient and accurate of web page classification system. Traditional supervised or semi-supervised machine learning methods become more and more difficult to adapt to the explosive Internet information. This paper proposed a web page classification method based on the topological structure of Wikipedia knowledge network. The kinship-relation association based on content similarity was proposed to solve the unbalance problem when a category node inherited the probability from multiple fathers. We used N-gram based on Wikipedia words to extract the keywords from web page, and introduce Bayes classifier to estimate the page class probability. Experimental results shown that the proposed method has very good scalability, robustness and reliability for different web pages.


International Journal of Distributed Sensor Networks | 2013

Data Deduplication in Wireless Multimedia Monitoring Network

Yitao Yang; Xiaolin Qin; Guozi Sun; Yong Xu; Zhongxue Yang; Zhiyue Zu

Wireless sensor network has been applied to many areas for a long time. A new kind of wireless sensors equipped with a camera and a microphone has been emerging recently. This kind of sensor is called wireless multimedia sensor (WMS) because it can capture and process multimedia data such as image, sound, and video. The visual monitoring network is a typical scenario of WMS application. Massive data would be produced in a short time because of the intensive WMS deployment. Many data aggregation and compression technologies have been proposed for addressing how to transfer data efficiently. However, data aggregation technologies need highly efficient router algorithm, and compression algorithms might consume more computation time and memory because of the high complexity. This paper applies data deduplication technology to this scenario. It can eliminate the redundant data from raw data to exploit the network bandwidth efficiently. Moreover, a chunking algorithm with low computation complexity is presented in this paper, and its efficiency has been proved through the experiments.


software engineering and knowledge engineering | 2016

DFIPS: Toward Distributed Flexible Intrusion Prevention System in Software Defined Network.

Xuesong Jia; Danni Ren; Yitao Yang; Huakang Li; Guozi Sun

With the evolution of the innovative software defined network (SDN), security issues have been taken into consideration. Intrusion prevention system (IPS) has widely deployed as a crucial measure in traditional network architecture to protect network from malignity. In spite of good capability of protection, IPS is still complained in many aspects, such as fixed deployment, single-point-detection and low utilization rate. In this paper, we propose a distributed flexible intrusion prevention system in software defined network (DFIPS). Our proposed DFIPS has three main modules: a classifier, a detector pool and a control agent. The classifier is in charge of slicing traffic. The detector pool then generates several detector nodes for detecting. The control agent interacts with the classifier and the detector pool, as well as higher level SDN controller APPs and OpenFlow switches. DFIPS integrating with SDN controller can easily achieve good load balancing among DFIPSs without repetitive deployment. We evaluate the two forms of DFIPS interaction and latency to show the advantage of DFIPS. In future, we would implement a more comprehensive DFIPS emulation to prove feasibility. We believe that the proposed DFIPS will be adapted in real networks eventually. Keywords—Intrusion prevention system (IPS); Software defined network (SDN); OpenFlow


Systematic Approaches to Digital Forensic Engineering (SADFE), 2013 Eighth International Workshop on | 2013

MapReduce-based frequent itemset mining for analysis of electronic evidence

Xueqing Jiang; Guozi Sun

Association rules can mine the relevant evidence of computer crime from the massive data and association rules among data itemset, and further mine crime trends and connections among different crimes. They can help polices detect case and prevent crime with clues and criterions. Frequent itemset mining (FIM) plays a fundamental role in mining associations, correlations and many real-world data mining fields such as electronic evidence analysis area. FP-growth is the most famous FIM algorithm for discovering frequent patterns. As the data incrementing, the cost of time and space will be the bottleneck of FP-growth mining algorithms. One of the existing incremental frequent pattern mining algorithms called SPO-tree can perform incremental mining by a single scan for incremental mining. But how to apply this algorithm to the analysis of electronic evidence more effectively will become the focus of this paper. In the past research, little people take care of the item mined to the frequent item needing to update or inserted a little data. The past algorithms are not suit for this problem especially in forensic area. So, in this paper, we propose a novel parallelized algorithm called PISPO based on the cloud-computing framework MapReduce, which is widely used to cope with large-scale data and captures both the content and state to be distributed to the changed and original of the transactions dataset to SPO-tree.

Collaboration


Dive into the Guozi Sun's collaboration.

Top Co-Authors

Avatar

Yitao Yang

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Huakang Li

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Danwei Chen

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Zhiwei Wang

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Siqi Huang

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Liying Liu

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Qiufeng Ding

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Wan Bao

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Xinwen Zhang

Nanjing University of Posts and Telecommunications

View shared research outputs
Researchain Logo
Decentralizing Knowledge