关注
SUN Yi
SUN Yi
在 bupt.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare
Y Sun, J Liu, K Yu, M Alazab, K Lin
IEEE Transactions on Industrial Informatics 18 (3), 1981-1990, 2021
1872021
Malware detection based on deep learning of behavior graphs
F Xiao, Z Lin, Y Sun, Y Ma
Mathematical Problems in Engineering 2019 (1), 8195395, 2019
1282019
DRRS-BC: Decentralized routing registration system based on blockchain
H Lu, Y Tang, Y Sun
IEEE/CAA Journal of Automatica Sinica 8 (12), 1868-1876, 2021
822021
High-performance isolation computing technology for smart IoT healthcare in cloud environments
Y Zhang, Y Sun, R Jin, K Lin, W Liu
IEEE Internet of Things Journal 8 (23), 16872-16879, 2021
562021
RETRACTED: Hybrid blockchain–based privacy-preserving electronic medical records sharing scheme across medical information control system
Y Cao, Y Sun, J Min
Measurement and Control 53 (7-8), 1286-1299, 2020
442020
An authenticated group key transfer protocol based on secret sharing
Y Sun, Q Wen, H Sun, W Li, Z Jin, H Zhang
Procedia Engineering 29, 403-408, 2012
322012
Modeling and analysis on access control for device-to-device communications in cellular network: A network-calculus-based approach
J Huang, Y Sun, Z Xiong, Q Duan, Y Zhao, X Cao, W Wang
IEEE Transactions on Vehicular Technology 65 (3), 1615-1626, 2015
312015
Smart e-commerce integration with recommender systems
Y Zhang, H Abbas, Y Sun
Electronic Markets 29, 219-220, 2019
282019
Modeling and analysis on congestion control in the internet of things
J Huang, D Du, Q Duan, Y Sun, Y Yin, T Zhou, Y Zhang
2014 IEEE International Conference on Communications (ICC), 434-439, 2014
262014
Effective malware detection scheme based on classified behavior graph in IIoT
Y Sun, AK Bashir, U Tariq, F Xiao
Ad Hoc Networks 120, 102558, 2021
252021
Bl-IEA: A Bit-Level Image Encryption Algorithm for Cognitive Services in Intelligent Transportation Systems
Y Sun, K Yu, AK Bashir, X Liao
IEEE Transactions on Intelligent Transportation Systems 24 (1), 1062-1074, 2021
232021
A secure encryption-based malware detection system
Z Lin, F Xiao, Y Sun, Y Ma, CC Xing, J Huang
KSII Transactions on Internet and Information Systems (TIIS) 12 (4), 1799-1818, 2018
222018
Privacy‐preserving self‐helped medical diagnosis scheme based on secure two‐party computation in wireless sensor networks
Y Sun, Q Wen, Y Zhang, W Li
Computational and mathematical methods in medicine 2014 (1), 214841, 2014
202014
A novel approach to detect malware variants based on classified behaviors
D Du, Y Sun, Y Ma, F Xiao
IEEE Access 7, 81770-81782, 2019
192019
Game theoretic resource allocation for multicell D2D communications with incomplete information
J Huang, Y Yin, Y Sun, Y Zhao, C Xing, Q Duan
2015 IEEE International Conference on Communications (ICC), 3039-3044, 2015
192015
A novel malware classification method based on crucial behavior
F Xiao, Y Sun, D Du, X Li, M Luo
Mathematical Problems in Engineering 2020 (1), 6804290, 2020
182020
Two‐Cloud‐Servers‐Assisted Secure Outsourcing Multiparty Computation
Y Sun, Q Wen, Y Zhang, H Zhang, Z Jin, W Li
The Scientific World Journal 2014 (1), 413265, 2014
142014
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs
J Huang, M Sun, S Zhu, Y Sun, C Xing, Q Duan
Proceedings of the 30th annual ACM symposium on applied computing, 688-694, 2015
112015
SDMP: A secure detector for epidemic disease file based on DNN
Y Sun, Y Cui, Y Huang, Z Lin
Information Fusion 68, 1-7, 2021
102021
Hedera: A permissionless and scalable hybrid blockchain consensus algorithm in multiaccess edge computing for IoT
Y Tang, J Yan, C Chakraborty, Y Sun
IEEE Internet of Things Journal 10 (24), 21187-21202, 2023
92023
系统目前无法执行此操作,请稍后再试。
文章 1–20