Yan Lindsay Sun
Cited by
Cited by
Information theoretic framework of trust modeling and evaluation for ad hoc networks
YL Sun, W Yu, Z Han, KJR Liu
IEEE Journal on Selected Areas in Communications 24 (2), 305-317, 2006
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
YL Sun, Z Han, W Yu, KJR Liu
INFOCOM 2006. 25th IEEE International Conference on Computer Communications …, 2006
Defense of trust management vulnerabilities in distributed networks
Y Sun, Z Han, KJR Liu
IEEE Communications Magazine 46 (2), 112-119, 2008
Cascading failure analysis with DC power flow model and transient stability analysis
J Yan, Y Tang, H He, Y Sun
IEEE Transactions on Power Systems 30 (1), 285-297, 2014
Attack-proof collaborative spectrum sensing in cognitive radio networks
W Wang, H Li, Y Sun, Z Han
2009 43rd Annual Conference on Information Sciences and Systems, 130-134, 2009
Scalable hierarchical access control in secure group communications
Y Sun, KJR Liu
IEEE INFOCOM 2004 2, 1296-1306, 2004
Revealing cascading failure vulnerability in power grids using risk-graph
Y Zhu, J Yan, YL Sun, H He
IEEE Transactions on Parallel and Distributed Systems 25 (12), 3274-3284, 2014
A scalable multicast key management scheme for heterogeneous wireless networks
Y Sun, W Trappe, KJR Liu
IEEE/ACM Transactions on networking 12 (4), 653-666, 2004
Catchit: Detect malicious nodes in collaborative spectrum sensing
W Wang, H Li, Y Sun, Z Han
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 1-6, 2009
Resilience analysis of power grids under the sequential attack
Y Zhu, J Yan, Y Tang, YL Sun, H He
IEEE Transactions on Information Forensics and Security 9 (12), 2340-2354, 2014
Security of online reputation systems: The evolution of attacks and defenses
Y Sun, Y Liu
IEEE Signal Processing Magazine 29 (2), 87-97, 2012
Integrated security analysis on cascading failure in complex networks
J Yan, H He, Y Sun
IEEE Transactions on Information Forensics and Security 9 (3), 451-463, 2014
Trust modeling and evaluation in ad hoc networks
Y Sun, W Yu, Z Han, KJR Liu
Global Telecommunications Conference, 2005. GLOBECOM'05. IEEE 3, 6 pp., 2005
Attacks on trust evaluation in distributed networks
YL Sun, Z Han, W Yu, KJR Liu
Information sciences and systems, 2006 40th annual conference on, 1461-1466, 2006
Fog Computing in Medical Internet-of-Things: Architecture, Implementation, and Applications
KM H. Dubey, A. Monteiro, N. Constant, M. Abtahi, D. Borthakur, L. Mahler, Y ...
Handbook of Large-Scale Distributed Computing in Smart Healthcare, 281-321, 2017
A survey of security and privacy challenges in cloud computing: solutions and future directions
Y Liu, Y Sun, J Ryoo, S Rizvi, AV Vasilakos
Journal of Computing Science and Engineering 9 (3), 119-133, 2015
Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks
W Wang, H Li, Y Sun, Z Han
EURASIP Journal on Advances in Signal Processing 2010, 1-15, 2009
Design of a robust EMG sensing interface for pattern classification
H Huang, F Zhang, YL Sun, H He
Journal of neural engineering 7 (5), 056005, 2010
Defending online reputation systems against collaborative unfair raters through signal modeling and trust
Y Yang, YL Sun, S Kay, Q Yang
Proceedings of the 2009 ACM symposium on Applied Computing, 1308-1315, 2009
Reliability-oriented single-path routing protocols in wireless sensor networks
AE Zonouz, L Xing, VM Vokkarane, YL Sun
IEEE Sensors Journal 14 (11), 4059-4068, 2014
The system can't perform the operation now. Try again later.
Articles 1–20