Yanbin Sun

Orcid: 0000-0002-8157-5337

According to our database1, Yanbin Sun authored at least 60 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimizing Mobility-Aware Task Offloading in Smart Healthcare for Internet of Medical Things Through Multiagent Reinforcement Learning.
IEEE Internet Things J., April, 2024

Intelligent Event-Triggered Control Supervised by Mini-Batch Machine Learning and Data Compression Mechanism for T-S Fuzzy NCSs Under DoS Attacks.
IEEE Trans. Fuzzy Syst., March, 2024

Fuzzy Memory Controller Design Based-Machine Learning Algorithm and Stability Analysis for Nonlinear NCSs Under Asynchronous Cyber Attacks.
IEEE Trans. Syst. Man Cybern. Syst., February, 2024

Performance Analysis and Design of Intelligent Optimising Integral-Based Event-Trigger Control for Autonomous Ground Vehicles Under DoS Attacks.
IEEE Trans. Intell. Veh., January, 2024

Security analysis of a reversible data hiding scheme in encrypted images by redundant space transfer.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

An Adaptive Cuckoo Algorithm-Based Optimization Method for Tourist Traffic Routes.
J. Circuits Syst. Comput., January, 2024

An Access Control Method Against Unauthorized and Noncompliant Behaviors of Real-Time Data in Industrial IoT.
IEEE Internet Things J., January, 2024

2023
Digital Twin-Based Cyber Range for Industrial Internet of Things.
IEEE Consumer Electron. Mag., November, 2023

Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

Hierarchical Name-based Routing for Content Provider Mobility in ICN.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Robust Truth Discovery Against Multi-round Data Poisoning Attacks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

2021
LocJury: An IBN-Based Location Privacy Preserving Scheme for IoCV.
IEEE Trans. Intell. Transp. Syst., 2021

Honeypot Identification in Softwarized Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

Building Agile and Resilient UAV Networks Based on SDN and Blockchain.
IEEE Netw., 2021

Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets.
Mob. Networks Appl., 2021

Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis.
Mob. Networks Appl., 2021

Review on Fuzz Testing for Protocols in Industrial Control Systems.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Networked Device Identification: A Survey.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
User and Entity Behavior Analysis under Urban Big Data.
Trans. Data Sci., 2020

Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation.
IEEE Netw., 2020

Location Privacy Challenges in Mobile Edge Computing: Classification and Exploration.
IEEE Netw., 2020

Automated Attack and Defense Framework toward 5G Security.
IEEE Netw., 2020

XWM: a high-speed matching algorithm for large-scale URL rules in wireless surveillance applications.
Multim. Tools Appl., 2020

Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems.
IEEE Internet Things J., 2020

Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city.
Future Gener. Comput. Syst., 2020

Advanced persistent threat organization identification based on software gene of malware.
Trans. Emerg. Telecommun. Technol., 2020

Summary of Research on Information Security Protection of Smart Grid.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Signal processing for extracting velocity information from spatial filtering signals.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2020

2019
Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment.
IEEE Trans. Ind. Informatics, 2019

Block-DEF: A secure digital evidence framework using blockchain.
Inf. Sci., 2019

Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers.
CoRR, 2019

Lightweight Anonymous Geometric Routing for Internet of Things.
IEEE Access, 2019

Centralized Fusion Based on Interacting Multiple Model and Adaptive Kalman Filter for Target Tracking in Underwater Acoustic Sensor Networks.
IEEE Access, 2019

Salaxy: Enabling USB Debugging Mode Automatically to Control Android Devices.
IEEE Access, 2019

A Review of the Factorization Problem of Large Integers.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Research on Content Extraction of Rich Text Web Pages.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Bitcoin Network Size Estimation Based on Coupon Collection Model.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Implementation of MD5 Collision Attack in Program.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Survey of Privacy-Preserving Techniques for Blockchain.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Survey of Software Reverse Engineering Applications.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Network Protocol Analysis Base on WeChat PC Version.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Comparison of Machine Learning Algorithms for Detecting XSS Attacks.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Research on SQL Injection and Defense Technology.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Preserving Location Privacy in Mobile Edge Computing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Design of Optimization Platform for Energy Absorption Structure of High Speed Train.
Proceedings of the 23rd IEEE International Conference on Computer Supported Cooperative Work in Design, 2019

2018
Answering the Min-Cost Quality-Aware Query on Multi-Sources in Sensor-Cloud Systems.
Sensors, 2018

Currency Preserving Query: Selecting the Newest Values from Multiple Tables.
IEICE Trans. Inf. Syst., 2018

Uncertain Rule Based Method for Determining Data Currency.
IEICE Trans. Inf. Syst., 2018

Greedy Embedding Strategy for Dynamic Graphs Based on Spanning Tree.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Quality-Aware Query Based on Relative Source Quality.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Succinct and practical greedy embedding for geometric routing.
Comput. Commun., 2017

2016
SNGR: Scalable Name-Based Geometric Routing for ICN.
IEICE Trans. Commun., 2016

2015
An ICN-Oriented Name-Based Routing Scheme.
Proceedings of the Intelligent Computation in Big Data Era, 2015

Matrix-based parallel pattern matching method.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Geometric Routing on Flat Names for ICN.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2013
Comment on Lee et al.'s group signature and e-auction scheme.
Inf. Syst. Frontiers, 2013

2009
Study of Grey Model Theory and Neural Network Algorithm for Improving Dynamic Measure Precision in Low Cost IMU.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2007
An Embedded System of Face Recognition Based on ARM and HMM.
Proceedings of the Entertainment Computing, 2007

2004
Expected value model for a fuzzy random warehouse layout problem.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2004


  Loading...