default search action
Yi Sun 0006
Person information
- affiliation (PhD 2015): Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China
Other persons with the same name
- Yi Sun — disambiguation page
- Yi Sun 0001 — University of Hertfordshire, Science and Technology Research Institute, School of Computer Science, UK (and 1 more)
- Yi Sun 0002 — Shanghai University, School of Mechatronic Engineering and Automation, China (and 2 more)
- Yi Sun 0003 — Google Inc., Mountain View, CA, USA (and 1 more)
- Yi Sun 0004 — Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China
- Yi Sun 0005 — City University of New York, City College, Electrical Engineering Department, NY, USA (and 1 more)
- Yi Sun 0007 — North China Electric Power University, School of Electric and Electronic Engineering, Beijing, China
- Yi Sun 0008 — University of Sydney, New South Wales, Australia (and 1 more)
- Yi Sun 0009 — Dalian University of Technology, School of Information and Communication Engineering, China
- Yi Sun 0010 — University of Chicago, IL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Renhai Dong, Baojiang Cui, Yi Sun, Jun Yang:
Ins Finder: A Practical CPU Undocumented Instruction Detection Framework. J. Circuits Syst. Comput. 33(3) (2024) - [j25]Zirun Zhao, Yi Sun, Ali Kashif Bashir, Zhaowen Lin:
AdaDpFed: A Differentially Private Federated Learning Algorithm With Adaptive Noise on Non-IID Data. IEEE Trans. Consumer Electron. 70(1): 2536-2545 (2024) - [j24]Yi Sun, Kaixiang Lin, Ali Kashif Bashir:
KeyLight: Intelligent Traffic Signal Control Method Based on Improved Graph Neural Network. IEEE Trans. Consumer Electron. 70(1): 2861-2871 (2024) - [j23]Renhai Dong, Baojiang Cui, Yi Sun, Jun Yang:
BTIDEC: A Novel Detection Scheme for CPU Security of Consumer Electronics. IEEE Trans. Consumer Electron. 70(1): 4515-4523 (2024) - 2023
- [j22]Yuning Cui, Yi Sun, Zhaowen Lin:
DroidHook: a novel API-hook based Android malware dynamic analysis sandbox. Autom. Softw. Eng. 30(1): 10 (2023) - [j21]Yuning Cui, Yi Sun, Zhaowen Lin, Baoquan Ma, Yujie Li:
Potentially Unwanted App Detection for Blockchain-Based Android App Marketplace. IEEE Internet Things J. 10(24): 21154-21167 (2023) - [j20]Yu Tang, Jiawen Yan, Chinmay Chakraborty, Yi Sun:
Hedera: A Permissionless and Scalable Hybrid Blockchain Consensus Algorithm in Multiaccess Edge Computing for IoT. IEEE Internet Things J. 10(24): 21187-21202 (2023) - [j19]Yu Tang, Yi Sun, Bin Ning, Jun Wun, Zhaowen Lin:
DRMT: A Decentralized IoT Device Recognition and Management Technology in Smart Cities. J. Circuits Syst. Comput. 32(11): 2350194:1-2350194:25 (2023) - [j18]Yi Sun, Keping Yu, Ali Kashif Bashir, Xin Liao:
Bl-IEA: A Bit-Level Image Encryption Algorithm for Cognitive Services in Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(1): 1062-1074 (2023) - [j17]Cai Xiaohong, Yi Sun, Zhaowen Lin, Muhammad Imran, Keping Yu:
Web-based practical privacy-preserving distributed image storage for financial services in cloud computing. World Wide Web (WWW) 26(3): 1223-1241 (2023) - [c14]Yi Sun, Tong Xu, Ali Kashif Bashir, Jie Liu, Marwan Omar:
BcIIS: Blockchain-Based Intelligent Identification Scheme of Massive IoT Devices. GLOBECOM 2023: 1277-1282 - 2022
- [j16]Yonghui Huang, Yi Sun, Kaixiang Lin, Bowen Xie, Jiayang Fan, Yan Ma:
An Effective Reconstruction Method of the APT Attack Based on Hidden Markov Model. J. Circuits Syst. Comput. 31(6): 2250108:1-2250108:16 (2022) - [j15]Yi Sun, Jie Liu, Keping Yu, Mamoun Alazab, Kaixiang Lin:
PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare. IEEE Trans. Ind. Informatics 18(3): 1981-1990 (2022) - 2021
- [j14]Yi Sun, Ali Kashif Bashir, Usman Tariq, Fei Xiao:
Effective malware detection scheme based on classified behavior graph in IIoT. Ad Hoc Networks 120: 102558 (2021) - [j13]Yi Sun, Yuning Cui, Yonghui Huang, Zhaowen Lin:
SDMP: A secure detector for epidemic disease file based on DNN. Inf. Fusion 68: 1-7 (2021) - [j12]Yin Zhang, Yi Sun, Renchao Jin, Kaixiang Lin, Wei Liu:
High-Performance Isolation Computing Technology for Smart IoT Healthcare in Cloud Environments. IEEE Internet Things J. 8(23): 16872-16879 (2021) - [c13]Jie Liu, Yi Sun, Fengkai Xu, Keping Yu, Ali Kashif Bashir, Zhaoli Liu:
IIS: Intelligent Identification Scheme of Massive IoT Devices. COMPSAC 2021: 1623-1626 - 2020
- [c12]Maryam Hassanlou, Yi Sun, Fang Fang:
Minimizing Response Time of IoT-Based Traffic Information System through Decentralized Server System. HICSS 2020: 1-5
2010 – 2019
- 2019
- [j11]Donggao Du, Yi Sun, Yan Ma, Fei Xiao:
A Novel Approach to Detect Malware Variants Based on Classified Behaviors. IEEE Access 7: 81770-81782 (2019) - [j10]Yin Zhang, Haider Abbas, Yi Sun:
Smart e-commerce integration with recommender systems. Electron. Mark. 29(2): 219-220 (2019) - 2018
- [j9]Zhaowen Lin, Fei Xiao, Yi Sun, Yan Ma, Cong-Cong Xing, Jun Huang:
A Secure Encryption-Based Malware Detection System. KSII Trans. Internet Inf. Syst. 12(4): 1799-1818 (2018) - [j8]Yin Zhang, Limei Peng, Yi Sun, Huimin Lu:
Editorial: Intelligent Industrial IoT Integration with Cognitive Computing. Mob. Networks Appl. 23(2): 185-187 (2018) - 2016
- [j7]Yudong Zhang, Xian-Qing Chen, Tianming Zhan, Zhu-Qing Jiao, Yi Sun, Zhi-Min Chen, Yu Yao, Lan-Ting Fang, Yi-Ding Lv, Shuihua Wang:
Fractal Dimension Estimation for Developing Pathological Brain Detection System Based on Minkowski-Bouligand Method. IEEE Access 4: 5937-5947 (2016) - [j6]Yudong Zhang, Yi Sun, Preetha Phillips, Ge Liu, Xingxing Zhou, Shuihua Wang:
A Multilayer Perceptron Based Smart Pathological Brain Detection System by Fractional Fourier Entropy. J. Medical Syst. 40(7): 173:1-173:11 (2016) - [j5]Jun Huang, Yi Sun, Zi Xiong, Qiang Duan, Yanxiao Zhao, Xianghui Cao, Wei Wang:
Modeling and Analysis on Access Control for Device-to-Device Communications in Cellular Network: A Network-Calculus-Based Approach. IEEE Trans. Veh. Technol. 65(3): 1615-1626 (2016) - [c11]Yi Sun, Gaochao Li, Zhaowen Lin, Fei Xiao, Xiaoming Yang:
A completely fair secret sharing scheme without dealer. ICCE-TW 2016: 35-36 - 2015
- [j4]Jun Huang, Yi Sun, Qianbin Chen:
GALLERY: A Game-Theoretic Resource Allocation Scheme for Multicell Device-to-Device Communications Underlaying Cellular Networks. IEEE Internet Things J. 2(6): 504-514 (2015) - [j3]Yi Sun, Qiaoyan Wen:
A general two-party bi-input private function evaluation protocol. Secur. Commun. Networks 8(15): 2536-2544 (2015) - [j2]Jun Huang, Yi Sun, Jibi Li, Yanxiao Zhao:
Resource Allocation for Multicell Device-to-Device Communications in Cellular Network: A Game Theoretic Approach. EAI Endorsed Trans. Serious Games 2(5): e1 (2015) - [c10]Jun Huang, Fang Fang, Yi Sun, Huifang Yan, Cong-Cong Xing, Qiang Duan, Wei Wang:
A New Economic Model in Cloud Computing: Cloud Service Provider vs. Network Service Provider. GLOBECOM 2015: 1-6 - [c9]Jun Huang, Ying Yin, Yi Sun, Yanxiao Zhao, Cong-Cong Xing, Qiang Duan:
Game theoretic resource allocation for multicell D2D communications with incomplete information. ICC 2015: 3039-3044 - [c8]Jun Huang, Yi Sun, Fang Fang, Cong-Cong Xing, Yanxiao Zhao, Kun Hua:
Multiple Service Providers with IP Flow Mobility: From an Economic Perspective. ICCCN 2015: 1-8 - [c7]Jun Huang, Meisong Sun, Shitong Zhu, Yi Sun, Cong-Cong Xing, Qiang Duan:
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs. SAC 2015: 688-694 - [c6]Jun Huang, Yi Sun, Cong-Cong Xing, Yanxiao Zhao, Qianbin Chen:
A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network. WASA 2015: 222-231 - 2014
- [j1]Yi Sun, Qiaoyan Wen, Yudong Zhang, Wenmin Li:
Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks. Comput. Math. Methods Medicine 2014: 214841:1-214841:9 (2014) - [c5]Jun Huang, Donggai Du, Qiang Duan, Yi Sun, Ying Yin, Tiantian Zhou, Yanguang Zhang:
Modeling and analysis on congestion control in the Internet of Things. ICC 2014: 434-439 - [c4]Jun Huang, Xiang Li, Yin Ying, Yi Sun, Qiang Duan, Cong-Cong Xing:
FAMOUS: a novel fast multi-constrained multicast routing algorithm. RACS 2014: 149-154 - 2012
- [c3]Zhaoxing Wang, Qiaoyan Wen, Yi Sun, Hua Zhang:
A Fault Detection Scheme Based on Self-Clustering Nodes Sets for Wireless Sensor Networks. CIT 2012: 921-925 - 2011
- [c2]Yi Sun, Hongxiang Sun, Qiaoyan Wen, Hua Zhang:
A Deterministic Protocol for Rational Secret Sharing in Asynchronous Model. IPTC 2011: 5-8 - 2010
- [c1]Yi Sun, Hongxiang Sun, Hua Zhang, Qiao-Yan Wen:
A Secure Protocol for Point-Segment Position Problem. WISM 2010: 212-219
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint