Yan Lindsay Sun
Title
Cited by
Cited by
Year
Information theoretic framework of trust modeling and evaluation for ad hoc networks
YL Sun, W Yu, Z Han, KJR Liu
IEEE Journal on Selected Areas in Communications 24 (2), 305-317, 2006
8032006
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
YL Sun, Z Han, W Yu, KJR Liu
INFOCOM 2006. 25th IEEE International Conference on Computer Communications …, 2006
4232006
Defense of trust management vulnerabilities in distributed networks
Y Sun, Z Han, KJR Liu
IEEE Communications Magazine 46 (2), 112-119, 2008
3402008
Attack-proof collaborative spectrum sensing in cognitive radio networks
W Wang, H Li, Y Sun, Z Han
2009 43rd Annual Conference on Information Sciences and Systems, 130-134, 2009
1972009
Scalable hierarchical access control in secure group communications
Y Sun, KJR Liu
IEEE INFOCOM 2004 2, 1296-1306, 2004
1872004
Cascading failure analysis with DC power flow model and transient stability analysis
J Yan, Y Tang, H He, Y Sun
IEEE Transactions on Power Systems 30 (1), 285-297, 2014
1642014
A scalable multicast key management scheme for heterogeneous wireless networks
Y Sun, W Trappe, KJR Liu
IEEE/ACM Transactions on networking 12 (4), 653-666, 2004
1452004
Revealing cascading failure vulnerability in power grids using risk-graph
Y Zhu, J Yan, YL Sun, H He
IEEE Transactions on Parallel and Distributed Systems 25 (12), 3274-3284, 2014
1402014
Catchit: Detect malicious nodes in collaborative spectrum sensing
W Wang, H Li, Y Sun, Z Han
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 1-6, 2009
1312009
Trust modeling and evaluation in ad hoc networks
Y Sun, W Yu, Z Han, KJR Liu
Global Telecommunications Conference, 2005. GLOBECOM'05. IEEE 3, 6 pp., 2005
1122005
Resilience analysis of power grids under the sequential attack
Y Zhu, J Yan, Y Tang, YL Sun, H He
IEEE Transactions on Information Forensics and Security 9 (12), 2340-2354, 2014
1052014
Security of online reputation systems: The evolution of attacks and defenses
Y Sun, Y Liu
IEEE Signal Processing Magazine 29 (2), 87-97, 2012
1052012
Integrated security analysis on cascading failure in complex networks
J Yan, H He, Y Sun
IEEE Transactions on Information Forensics and Security 9 (3), 451-463, 2014
982014
Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks
W Wang, H Li, YL Sun, Z Han
EURASIP Journal on Advances in Signal Processing 2010 (1), 695750, 2009
942009
Attacks on trust evaluation in distributed networks
YL Sun, Z Han, W Yu, KJR Liu
Information sciences and systems, 2006 40th annual conference on, 1461-1466, 2006
942006
Defending online reputation systems against collaborative unfair raters through signal modeling and trust
Y Yang, YL Sun, S Kay, Q Yang
Proceedings of the 2009 ACM symposium on Applied Computing, 1308-1315, 2009
862009
HADOF: Defense against routing disruptions in mobile ad hoc networks
W Yu, Y Sun, KJR Liu
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
812005
Cross-layer attack and defense in cognitive radio networks
W Wang, Y Sun, H Li, Z Han
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
792010
Design of a robust EMG sensing interface for pattern classification
H Huang, F Zhang, YL Sun, H He
Journal of neural engineering 7 (5), 056005, 2010
792010
A survey of security and privacy challenges in cloud computing: solutions and future directions
Y Liu, Y Sun, J Ryoo, S Rizvi, AV Vasilakos
Journal of Computing Science and Engineering 9 (3), 119-133, 2015
772015
The system can't perform the operation now. Try again later.
Articles 1–20