PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare Y Sun, J Liu, K Yu, M Alazab, K Lin IEEE Transactions on Industrial Informatics 18 (3), 1981-1990, 2021 | 187 | 2021 |
Malware detection based on deep learning of behavior graphs F Xiao, Z Lin, Y Sun, Y Ma Mathematical Problems in Engineering 2019 (1), 8195395, 2019 | 128 | 2019 |
DRRS-BC: Decentralized routing registration system based on blockchain H Lu, Y Tang, Y Sun IEEE/CAA Journal of Automatica Sinica 8 (12), 1868-1876, 2021 | 82 | 2021 |
High-performance isolation computing technology for smart IoT healthcare in cloud environments Y Zhang, Y Sun, R Jin, K Lin, W Liu IEEE Internet of Things Journal 8 (23), 16872-16879, 2021 | 56 | 2021 |
RETRACTED: Hybrid blockchain–based privacy-preserving electronic medical records sharing scheme across medical information control system Y Cao, Y Sun, J Min Measurement and Control 53 (7-8), 1286-1299, 2020 | 44 | 2020 |
An authenticated group key transfer protocol based on secret sharing Y Sun, Q Wen, H Sun, W Li, Z Jin, H Zhang Procedia Engineering 29, 403-408, 2012 | 32 | 2012 |
Modeling and analysis on access control for device-to-device communications in cellular network: A network-calculus-based approach J Huang, Y Sun, Z Xiong, Q Duan, Y Zhao, X Cao, W Wang IEEE Transactions on Vehicular Technology 65 (3), 1615-1626, 2015 | 31 | 2015 |
Smart e-commerce integration with recommender systems Y Zhang, H Abbas, Y Sun Electronic Markets 29, 219-220, 2019 | 28 | 2019 |
Modeling and analysis on congestion control in the internet of things J Huang, D Du, Q Duan, Y Sun, Y Yin, T Zhou, Y Zhang 2014 IEEE International Conference on Communications (ICC), 434-439, 2014 | 26 | 2014 |
Effective malware detection scheme based on classified behavior graph in IIoT Y Sun, AK Bashir, U Tariq, F Xiao Ad Hoc Networks 120, 102558, 2021 | 25 | 2021 |
Bl-IEA: A Bit-Level Image Encryption Algorithm for Cognitive Services in Intelligent Transportation Systems Y Sun, K Yu, AK Bashir, X Liao IEEE Transactions on Intelligent Transportation Systems 24 (1), 1062-1074, 2021 | 23 | 2021 |
A secure encryption-based malware detection system Z Lin, F Xiao, Y Sun, Y Ma, CC Xing, J Huang KSII Transactions on Internet and Information Systems (TIIS) 12 (4), 1799-1818, 2018 | 22 | 2018 |
Privacy‐preserving self‐helped medical diagnosis scheme based on secure two‐party computation in wireless sensor networks Y Sun, Q Wen, Y Zhang, W Li Computational and mathematical methods in medicine 2014 (1), 214841, 2014 | 20 | 2014 |
A novel approach to detect malware variants based on classified behaviors D Du, Y Sun, Y Ma, F Xiao IEEE Access 7, 81770-81782, 2019 | 19 | 2019 |
Game theoretic resource allocation for multicell D2D communications with incomplete information J Huang, Y Yin, Y Sun, Y Zhao, C Xing, Q Duan 2015 IEEE International Conference on Communications (ICC), 3039-3044, 2015 | 19 | 2015 |
A novel malware classification method based on crucial behavior F Xiao, Y Sun, D Du, X Li, M Luo Mathematical Problems in Engineering 2020 (1), 6804290, 2020 | 18 | 2020 |
Two‐Cloud‐Servers‐Assisted Secure Outsourcing Multiparty Computation Y Sun, Q Wen, Y Zhang, H Zhang, Z Jin, W Li The Scientific World Journal 2014 (1), 413265, 2014 | 14 | 2014 |
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs J Huang, M Sun, S Zhu, Y Sun, C Xing, Q Duan Proceedings of the 30th annual ACM symposium on applied computing, 688-694, 2015 | 11 | 2015 |
SDMP: A secure detector for epidemic disease file based on DNN Y Sun, Y Cui, Y Huang, Z Lin Information Fusion 68, 1-7, 2021 | 10 | 2021 |
Hedera: A permissionless and scalable hybrid blockchain consensus algorithm in multiaccess edge computing for IoT Y Tang, J Yan, C Chakraborty, Y Sun IEEE Internet of Things Journal 10 (24), 21187-21202, 2023 | 9 | 2023 |