Jinyuan Sun

Affiliations:
  • University of Tennessee, Knoxville, USA


According to our database1, Jinyuan Sun authored at least 62 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Smart Driver Monitoring Robotic System to Enhance Road Safety : A Comprehensive Review.
CoRR, 2024

HRI Challenges Influencing Low Usage of Robotic Systems in Disaster Response and Rescue Operations.
CoRR, 2024

2023
BubbleMap: Privilege Mapping for Behavior-Based Implicit Authentication Systems.
IEEE Trans. Mob. Comput., August, 2023

Graph Neural Network Framework for Security Assessment Informed by Topological Measures.
CoRR, 2023

Mitigating Adversarial Effects of False Data Injection Attacks in Power Grid.
CoRR, 2023

Deep Learning model integrity checking mechanism using watermarking technique.
CoRR, 2023

Early Alarm: Robust Event Analysis for Power Systems using 1-D Fully Convolutional Network.
Proceedings of the IEEE International Conference on Communications, 2023

Thinking Image Color Aesthetics Assessment: Models, Datasets and Benchmarks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

2022
EchoIA: A Cloud-Based Implicit Authentication Leveraging User Feedback.
Network, 2022

Exploring Physical-Based Constraints in Short-Term Load Forecasting: A Defense Mechanism Against Cyberattack.
CoRR, 2022

2021
Profit-Oriented False Data Injection on Electricity Market: Reviews, Analyses, and Insights.
IEEE Trans. Ind. Informatics, 2021

Differentially Private Binary- and Matrix-Valued Data Query: An XOR Mechanism.
Proc. VLDB Endow., 2021

Privacy-Preserving Computation for Large-Scale Security-Constrained Optimal Power Flow Problem in Smart Grid.
IEEE Access, 2021

ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks.
CoRR, 2020

EchoIA: Implicit Authentication System Based on User Feedback.
CoRR, 2020

ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems.
CoRR, 2020

SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

2019
PersonaIA: A Lightweight Implicit Authentication System Based on Customized User Behavior Selection.
IEEE Trans. Dependable Secur. Comput., 2019

Dynamic Detection of False Data Injection Attack in Smart Grid using Deep Learning.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2019

A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Economic-Robust Transmission Opportunity Auction for D2D Communications in Cognitive Mesh Assisted Cellular Networks.
IEEE Trans. Mob. Comput., 2018

Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing.
IEEE Trans. Emerg. Top. Comput., 2018

Dynamic Detection of False Data Injection Attack in Smart Grid using Deep Learning.
CoRR, 2018

A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data.
CoRR, 2018

Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices.
CoRR, 2018

Vulnerability Assessment for PMU Communication Networks.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018

Latent Group Structured Multi-task Learning.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2017
Energy-efficient W-layer for behavior-based implicit authentication on mobile devices.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
SPA: A Secure and Private Auction Framework for Decentralized Online Social Networks.
IEEE Trans. Parallel Distributed Syst., 2016

Password-Controlled Encryption with Accountable Break-Glass Access.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks: Detection and Defense.
IEEE Trans. Mob. Comput., 2015

Guest Editorial Special Issue on Internet of Things for Smart and Connected Health.
IEEE Internet Things J., 2015

Privacy-preserving spectral estimation in smart grid.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Retraining and Dynamic Privilege for Implicit Authentication Systems.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Network steganography based on traffic behavior in dynamically changing wireless sensor networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Outsourcing Power System Simulations.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks.
IEEE Trans. Mob. Comput., 2014

Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability.
IEEE J. Biomed. Health Informatics, 2014

Practical private information retrieval supporting keyword search in the cloud.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014

2013
$S^{3}A$ : A Secure Data Sharing Mechanism for Situational Awareness in The Power Grid.
IEEE Trans. Smart Grid, 2013

Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking.
IEEE J. Sel. Areas Commun., 2013

Economic-robust transmission opportunity auction in multi-hop wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Towards auditable cloud-assisted access of encrypted health data.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Secure Cooperative Data Storage and Query Processing in Unattended Tiered Sensor Networks.
IEEE J. Sel. Areas Commun., 2012

Fine-grained private matching for proximity-based mobile social networking.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

PAAS: A Privacy-Preserving Attribute-Based Authentication System for eHealth Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

2011
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks.
IEEE Trans. Dependable Secur. Comput., 2011

RescueMe: Location-Based Secure and Dependable VANETs for Disaster Rescue.
IEEE J. Sel. Areas Commun., 2011

Purging the Back-Room Dealing: Secure Spectrum Auction Leveraging Paillier Cryptosystem.
IEEE J. Sel. Areas Commun., 2011

Fast identification of the missing tags in a large RFID system.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
Privacy and emergency response in e-healthcare leveraging wireless body sensor networks.
IEEE Wirel. Commun., 2010

An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks.
IEEE Trans. Parallel Distributed Syst., 2010

Cross-Domain Data Sharing in Distributed Electronic Health Record Systems.
IEEE Trans. Parallel Distributed Syst., 2010

Privacy and security for online social networks: challenges and opportunities.
IEEE Netw., 2010

A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Preserving Privacy in Emergency Response Based on Wireless Body Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2009
Defense against misbehavior in anonymous vehicular ad hoc networks.
Ad Hoc Networks, 2009

2008
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008


  Loading...