Suivre
Yan Lindsay Sun
Titre
Citée par
Citée par
Année
Information theoretic framework of trust modeling and evaluation for ad hoc networks
YL Sun, W Yu, Z Han, KJR Liu
IEEE Journal on Selected Areas in Communications 24 (2), 305-317, 2006
8682006
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
YL Sun, Z Han, W Yu, KJR Liu
INFOCOM 2006. 25th IEEE International Conference on Computer Communications …, 2006
4602006
Defense of trust management vulnerabilities in distributed networks
Y Sun, Z Han, KJR Liu
IEEE Communications Magazine 46 (2), 112-119, 2008
3552008
Cascading failure analysis with DC power flow model and transient stability analysis
J Yan, Y Tang, H He, Y Sun
IEEE Transactions on Power Systems 30 (1), 285-297, 2014
2332014
Attack-proof collaborative spectrum sensing in cognitive radio networks
W Wang, H Li, Y Sun, Z Han
2009 43rd Annual Conference on Information Sciences and Systems, 130-134, 2009
2072009
Scalable hierarchical access control in secure group communications
Y Sun, KJR Liu
IEEE INFOCOM 2004 2, 1296-1306, 2004
1972004
Revealing cascading failure vulnerability in power grids using risk-graph
Y Zhu, J Yan, YL Sun, H He
IEEE Transactions on Parallel and Distributed Systems 25 (12), 3274-3284, 2014
1812014
A scalable multicast key management scheme for heterogeneous wireless networks
Y Sun, W Trappe, KJR Liu
IEEE/ACM Transactions on networking 12 (4), 653-666, 2004
1502004
Catchit: Detect malicious nodes in collaborative spectrum sensing
W Wang, H Li, Y Sun, Z Han
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 1-6, 2009
1382009
Resilience analysis of power grids under the sequential attack
Y Zhu, J Yan, Y Tang, YL Sun, H He
IEEE Transactions on Information Forensics and Security 9 (12), 2340-2354, 2014
1292014
Integrated security analysis on cascading failure in complex networks
J Yan, H He, Y Sun
IEEE Transactions on Information Forensics and Security 9 (3), 451-463, 2014
1262014
Security of online reputation systems: The evolution of attacks and defenses
Y Sun, Y Liu
IEEE Signal Processing Magazine 29 (2), 87-97, 2012
1252012
Trust modeling and evaluation in ad hoc networks
Y Sun, W Yu, Z Han, KJR Liu
Global Telecommunications Conference, 2005. GLOBECOM'05. IEEE 3, 6 pp., 2005
1202005
A survey of security and privacy challenges in cloud computing: solutions and future directions
Y Liu, YL Sun, J Ryoo, AV Vasilakos
Korean Institute of Information Scientists and Engineers (KIISE), 2015
1142015
Attacks on trust evaluation in distributed networks
YL Sun, Z Han, W Yu, KJR Liu
Information sciences and systems, 2006 40th annual conference on, 1461-1466, 2006
1122006
Fog Computing in Medical Internet-of-Things: Architecture, Implementation, and Applications
KM H. Dubey, A. Monteiro, N. Constant, M. Abtahi, D. Borthakur, L. Mahler, Y ...
Handbook of Large-Scale Distributed Computing in Smart Healthcare, 281-321, 2017
1072017
Trust management for defending on-off attacks
Y Chae, LC DiPippo, YL Sun
IEEE Transactions on Parallel and Distributed Systems 26 (4), 1178-1191, 2014
1002014
Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks
W Wang, H Li, Y Sun, Z Han
EURASIP Journal on Advances in Signal Processing 2010, 1-15, 2009
1002009
Design of a robust EMG sensing interface for pattern classification
H Huang, F Zhang, YL Sun, H He
Journal of neural engineering 7 (5), 056005, 2010
992010
Reliability-oriented single-path routing protocols in wireless sensor networks
AE Zonouz, L Xing, VM Vokkarane, YL Sun
IEEE Sensors Journal 14 (11), 4059-4068, 2014
942014
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20