Information theoretic framework of trust modeling and evaluation for ad hoc networks YL Sun, W Yu, Z Han, KJR Liu IEEE Journal on Selected Areas in Communications 24 (2), 305-317, 2006 | 840 | 2006 |
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks YL Sun, Z Han, W Yu, KJR Liu INFOCOM 2006. 25th IEEE International Conference on Computer Communications …, 2006 | 437 | 2006 |
Defense of trust management vulnerabilities in distributed networks Y Sun, Z Han, KJR Liu IEEE Communications Magazine 46 (2), 112-119, 2008 | 353 | 2008 |
Cascading failure analysis with DC power flow model and transient stability analysis J Yan, Y Tang, H He, Y Sun IEEE Transactions on Power Systems 30 (1), 285-297, 2014 | 213 | 2014 |
Attack-proof collaborative spectrum sensing in cognitive radio networks W Wang, H Li, Y Sun, Z Han 2009 43rd Annual Conference on Information Sciences and Systems, 130-134, 2009 | 208 | 2009 |
Scalable hierarchical access control in secure group communications Y Sun, KJR Liu IEEE INFOCOM 2004 2, 1296-1306, 2004 | 189 | 2004 |
Revealing cascading failure vulnerability in power grids using risk-graph Y Zhu, J Yan, YL Sun, H He IEEE Transactions on Parallel and Distributed Systems 25 (12), 3274-3284, 2014 | 171 | 2014 |
A scalable multicast key management scheme for heterogeneous wireless networks Y Sun, W Trappe, KJR Liu IEEE/ACM Transactions on networking 12 (4), 653-666, 2004 | 145 | 2004 |
Catchit: Detect malicious nodes in collaborative spectrum sensing W Wang, H Li, Y Sun, Z Han Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 1-6, 2009 | 137 | 2009 |
Resilience analysis of power grids under the sequential attack Y Zhu, J Yan, Y Tang, YL Sun, H He IEEE Transactions on Information Forensics and Security 9 (12), 2340-2354, 2014 | 122 | 2014 |
Integrated security analysis on cascading failure in complex networks J Yan, H He, Y Sun IEEE Transactions on Information Forensics and Security 9 (3), 451-463, 2014 | 122 | 2014 |
Security of online reputation systems: The evolution of attacks and defenses Y Sun, Y Liu IEEE Signal Processing Magazine 29 (2), 87-97, 2012 | 122 | 2012 |
Trust modeling and evaluation in ad hoc networks Y Sun, W Yu, Z Han, KJR Liu Global Telecommunications Conference, 2005. GLOBECOM'05. IEEE 3, 6 pp., 2005 | 116 | 2005 |
A survey of security and privacy challenges in cloud computing: solutions and future directions Y Liu, Y Sun, J Ryoo, S Rizvi, AV Vasilakos Journal of Computing Science and Engineering 9 (3), 119-133, 2015 | 106 | 2015 |
Attacks on trust evaluation in distributed networks YL Sun, Z Han, W Yu, KJR Liu Information sciences and systems, 2006 40th annual conference on, 1461-1466, 2006 | 106 | 2006 |
Fog Computing in Medical Internet-of-Things: Architecture, Implementation, and Applications KM H. Dubey, A. Monteiro, N. Constant, M. Abtahi, D. Borthakur, L. Mahler, Y ... Handbook of Large-Scale Distributed Computing in Smart Healthcare, 281-321, 2017 | 101 | 2017 |
Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks W Wang, H Li, Y Sun, Z Han EURASIP Journal on Advances in Signal Processing 2010, 1-15, 2009 | 96 | 2009 |
Design of a robust EMG sensing interface for pattern classification H Huang, F Zhang, YL Sun, H He Journal of neural engineering 7 (5), 056005, 2010 | 95 | 2010 |
Defending online reputation systems against collaborative unfair raters through signal modeling and trust Y Yang, YL Sun, S Kay, Q Yang Proceedings of the 2009 ACM symposium on Applied Computing, 1308-1315, 2009 | 91 | 2009 |
Reliability-oriented single-path routing protocols in wireless sensor networks AE Zonouz, L Xing, VM Vokkarane, YL Sun IEEE Sensors Journal 14 (11), 4059-4068, 2014 | 88 | 2014 |