Information theoretic framework of trust modeling and evaluation for ad hoc networks YL Sun, W Yu, Z Han, KJR Liu IEEE Journal on Selected Areas in Communications 24 (2), 305-317, 2006 | 876 | 2006 |
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks YL Sun, Z Han, W Yu, KJR Liu INFOCOM 2006. 25th IEEE International Conference on Computer Communications …, 2006 | 464 | 2006 |
Defense of trust management vulnerabilities in distributed networks Y Sun, Z Han, KJR Liu IEEE Communications Magazine 46 (2), 112-119, 2008 | 358 | 2008 |
Cascading failure analysis with DC power flow model and transient stability analysis J Yan, Y Tang, H He, Y Sun IEEE Transactions on Power Systems 30 (1), 285-297, 2014 | 239 | 2014 |
Attack-proof collaborative spectrum sensing in cognitive radio networks W Wang, H Li, Y Sun, Z Han 2009 43rd Annual Conference on Information Sciences and Systems, 130-134, 2009 | 210 | 2009 |
Scalable hierarchical access control in secure group communications Y Sun, KJR Liu IEEE INFOCOM 2004 2, 1296-1306, 2004 | 195 | 2004 |
Revealing cascading failure vulnerability in power grids using risk-graph Y Zhu, J Yan, YL Sun, H He IEEE Transactions on Parallel and Distributed Systems 25 (12), 3274-3284, 2014 | 185 | 2014 |
A scalable multicast key management scheme for heterogeneous wireless networks Y Sun, W Trappe, KJR Liu IEEE/ACM Transactions on networking 12 (4), 653-666, 2004 | 150 | 2004 |
Catchit: Detect malicious nodes in collaborative spectrum sensing W Wang, H Li, Y Sun, Z Han Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 1-6, 2009 | 142 | 2009 |
Security of online reputation systems: The evolution of attacks and defenses Y Sun, Y Liu IEEE Signal Processing Magazine 29 (2), 87-97, 2012 | 134 | 2012 |
Resilience analysis of power grids under the sequential attack Y Zhu, J Yan, Y Tang, YL Sun, H He IEEE Transactions on Information Forensics and Security 9 (12), 2340-2354, 2014 | 131 | 2014 |
Integrated security analysis on cascading failure in complex networks J Yan, H He, Y Sun IEEE Transactions on Information Forensics and Security 9 (3), 451-463, 2014 | 127 | 2014 |
Trust modeling and evaluation in ad hoc networks Y Sun, W Yu, Z Han, KJR Liu Global Telecommunications Conference, 2005. GLOBECOM'05. IEEE 3, 6 pp., 2005 | 119 | 2005 |
A survey of security and privacy challenges in cloud computing: solutions and future directions Y Liu, YL Sun, J Ryoo, AV Vasilakos Korean Institute of Information Scientists and Engineers (KIISE), 2015 | 118 | 2015 |
Attacks on trust evaluation in distributed networks YL Sun, Z Han, W Yu, KJR Liu Information sciences and systems, 2006 40th annual conference on, 1461-1466, 2006 | 115 | 2006 |
Fog Computing in Medical Internet-of-Things: Architecture, Implementation, and Applications KM H. Dubey, A. Monteiro, N. Constant, M. Abtahi, D. Borthakur, L. Mahler, Y ... Handbook of Large-Scale Distributed Computing in Smart Healthcare, 281-321, 2017 | 110 | 2017 |
Angel: An intelligent digital twin framework for microgrid security W Danilczyk, Y Sun, H He 2019 North American power symposium (NAPS), 1-6, 2019 | 103 | 2019 |
Trust management for defending on-off attacks Y Chae, LC DiPippo, YL Sun IEEE Transactions on Parallel and Distributed Systems 26 (4), 1178-1191, 2014 | 103 | 2014 |
Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks W Wang, H Li, Y Sun, Z Han EURASIP Journal on Advances in Signal Processing 2010, 1-15, 2009 | 101 | 2009 |
Design of a robust EMG sensing interface for pattern classification H Huang, F Zhang, YL Sun, H He Journal of neural engineering 7 (5), 056005, 2010 | 99 | 2010 |