Yan Lindsay Sun
TitleCited byYear
Information theoretic framework of trust modeling and evaluation for ad hoc networks
YL Sun, W Yu, Z Han, KJR Liu
IEEE Journal on Selected Areas in Communications 24 (2), 305-317, 2006
7342006
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
YL Sun, Z Han, W Yu, KJR Liu
INFOCOM 2006. 25th IEEE International Conference on Computer Communications …, 2006
3832006
Defense of trust management vulnerabilities in distributed networks
Y Sun, Z Han, KJR Liu
IEEE Communications Magazine 46 (2), 112-119, 2008
2982008
Scalable hierarchical access control in secure group communications
Y Sun, KJR Liu
IEEE INFOCOM 2004 2, 1296-1306, 2004
1732004
Attack-proof collaborative spectrum sensing in cognitive radio networks
W Wang, H Li, Y Sun, Z Han
2009 43rd Annual Conference on Information Sciences and Systems, 130-134, 2009
1682009
A scalable multicast key management scheme for heterogeneous wireless networks
Y Sun, W Trappe, KJR Liu
IEEE/ACM Transactions on networking 12 (4), 653-666, 2004
1362004
Catchit: Detect malicious nodes in collaborative spectrum sensing
W Wang, H Li, Y Sun, Z Han
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 1-6, 2009
1222009
Cascading failure analysis with DC power flow model and transient stability analysis
J Yan, Y Tang, H He, Y Sun
IEEE Transactions on Power Systems 30 (1), 285-297, 2014
1162014
Trust modeling and evaluation in ad hoc networks
Y Sun, W Yu, Z Han, KJR Liu
Global Telecommunications Conference, 2005. GLOBECOM'05. IEEE 3, 6 pp., 2005
1102005
Revealing cascading failure vulnerability in power grids using risk-graph
Y Zhu, J Yan, YL Sun, H He
IEEE Transactions on Parallel and Distributed Systems 25 (12), 3274-3284, 2014
1022014
Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks
W Wang, H Li, Y Sun, Z Han
EURASIP Journal on Advances in Signal Processing 2010, 4, 2010
852010
Security of online reputation systems: The evolution of attacks and defenses
Y Sun, Y Liu
IEEE Signal Processing Magazine 29 (2), 87-97, 2012
842012
Attacks on trust evaluation in distributed networks
YL Sun, Z Han, W Yu, KJR Liu
Information sciences and systems, 2006 40th annual conference on, 1461-1466, 2006
792006
Defending online reputation systems against collaborative unfair raters through signal modeling and trust
Y Yang, YL Sun, S Kay, Q Yang
Proceedings of the 2009 ACM symposium on Applied Computing, 1308-1315, 2009
782009
HADOF: Defense against routing disruptions in mobile ad hoc networks
W Yu, Y Sun, KJR Liu
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
732005
Integrated security analysis on cascading failure in complex networks
J Yan, H He, Y Sun
IEEE Transactions on Information Forensics and Security 9 (3), 451-463, 2014
722014
Hierarchical group access control for secure multicast communications
Y Sun, KJR Liu
IEEE/ACM Transactions on Networking 15 (6), 1514-1526, 2007
722007
Resilience analysis of power grids under the sequential attack
Y Zhu, J Yan, Y Tang, YL Sun, H He
IEEE Transactions on Information Forensics and Security 9 (12), 2340-2354, 2014
712014
Anomaly detection in feedback-based reputation systems through temporal and correlation analysis
Y Liu, Y Sun
2010 IEEE Second International Conference on Social Computing, 65-72, 2010
642010
Cooperative transmission for underwater acoustic communications
Z Han, YL Sun, H Shi
2008 IEEE International Conference on Communications, 2028-2032, 2008
632008
The system can't perform the operation now. Try again later.
Articles 1–20