Follow
Yan Lindsay Sun
Title
Cited by
Cited by
Year
Information theoretic framework of trust modeling and evaluation for ad hoc networks
YL Sun, W Yu, Z Han, KJR Liu
IEEE Journal on Selected Areas in Communications 24 (2), 305-317, 2006
8772006
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
YL Sun, Z Han, W Yu, KJR Liu
INFOCOM 2006. 25th IEEE International Conference on Computer Communications …, 2006
4632006
Defense of trust management vulnerabilities in distributed networks
Y Sun, Z Han, KJR Liu
IEEE Communications Magazine 46 (2), 112-119, 2008
3582008
Cascading failure analysis with DC power flow model and transient stability analysis
J Yan, Y Tang, H He, Y Sun
IEEE Transactions on Power Systems 30 (1), 285-297, 2014
2392014
Attack-proof collaborative spectrum sensing in cognitive radio networks
W Wang, H Li, Y Sun, Z Han
2009 43rd Annual Conference on Information Sciences and Systems, 130-134, 2009
2092009
Scalable hierarchical access control in secure group communications
Y Sun, KJR Liu
IEEE INFOCOM 2004 2, 1296-1306, 2004
1982004
Revealing cascading failure vulnerability in power grids using risk-graph
Y Zhu, J Yan, YL Sun, H He
IEEE Transactions on Parallel and Distributed Systems 25 (12), 3274-3284, 2014
1842014
A scalable multicast key management scheme for heterogeneous wireless networks
Y Sun, W Trappe, KJR Liu
IEEE/ACM Transactions on networking 12 (4), 653-666, 2004
1512004
Catchit: Detect malicious nodes in collaborative spectrum sensing
W Wang, H Li, Y Sun, Z Han
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 1-6, 2009
1402009
Resilience analysis of power grids under the sequential attack
Y Zhu, J Yan, Y Tang, YL Sun, H He
IEEE Transactions on Information Forensics and Security 9 (12), 2340-2354, 2014
1312014
Security of online reputation systems: The evolution of attacks and defenses
Y Sun, Y Liu
IEEE Signal Processing Magazine 29 (2), 87-97, 2012
1302012
Integrated security analysis on cascading failure in complex networks
J Yan, H He, Y Sun
IEEE Transactions on Information Forensics and Security 9 (3), 451-463, 2014
1262014
Trust modeling and evaluation in ad hoc networks
Y Sun, W Yu, Z Han, KJR Liu
Global Telecommunications Conference, 2005. GLOBECOM'05. IEEE 3, 6 pp., 2005
1202005
A survey of security and privacy challenges in cloud computing: solutions and future directions
Y Liu, YL Sun, J Ryoo, AV Vasilakos
Korean Institute of Information Scientists and Engineers (KIISE), 2015
1192015
Attacks on trust evaluation in distributed networks
YL Sun, Z Han, W Yu, KJR Liu
Information sciences and systems, 2006 40th annual conference on, 1461-1466, 2006
1152006
Fog Computing in Medical Internet-of-Things: Architecture, Implementation, and Applications
KM H. Dubey, A. Monteiro, N. Constant, M. Abtahi, D. Borthakur, L. Mahler, Y ...
Handbook of Large-Scale Distributed Computing in Smart Healthcare, 281-321, 2017
1092017
Angel: An intelligent digital twin framework for microgrid security
W Danilczyk, Y Sun, H He
2019 North American power symposium (NAPS), 1-6, 2019
1032019
Trust management for defending on-off attacks
Y Chae, LC DiPippo, YL Sun
IEEE Transactions on Parallel and Distributed Systems 26 (4), 1178-1191, 2014
1022014
Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks
W Wang, H Li, Y Sun, Z Han
EURASIP Journal on Advances in Signal Processing 2010, 1-15, 2009
1002009
Design of a robust EMG sensing interface for pattern classification
H Huang, F Zhang, YL Sun, H He
Journal of neural engineering 7 (5), 056005, 2010
992010
The system can't perform the operation now. Try again later.
Articles 1–20