Yi Sun

Orcid: 0000-0002-1427-8682

Affiliations:
  • Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China (PhD 2015)


According to our database1, Yi Sun authored at least 22 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Ins Finder: A Practical CPU Undocumented Instruction Detection Framework.
J. Circuits Syst. Comput., February, 2024

2023
DRMT: A Decentralized IoT Device Recognition and Management Technology in Smart Cities.
J. Circuits Syst. Comput., July, 2023

DroidHook: a novel API-hook based Android malware dynamic analysis sandbox.
Autom. Softw. Eng., June, 2023

Web-based practical privacy-preserving distributed image storage for financial services in cloud computing.
World Wide Web (WWW), May, 2023

Bl-IEA: A Bit-Level Image Encryption Algorithm for Cognitive Services in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023

Hedera: A Permissionless and Scalable Hybrid Blockchain Consensus Algorithm in Multiaccess Edge Computing for IoT.
IEEE Internet Things J., 2023

Potentially Unwanted App Detection for Blockchain-Based Android App Marketplace.
IEEE Internet Things J., 2023

2022
PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare.
IEEE Trans. Ind. Informatics, 2022

An Effective Reconstruction Method of the APT Attack Based on Hidden Markov Model.
J. Circuits Syst. Comput., 2022

2021
High-Performance Isolation Computing Technology for Smart IoT Healthcare in Cloud Environments.
IEEE Internet Things J., 2021

SDMP: A secure detector for epidemic disease file based on DNN.
Inf. Fusion, 2021

Effective malware detection scheme based on classified behavior graph in IIoT.
Ad Hoc Networks, 2021

2019
A Novel Approach to Detect Malware Variants Based on Classified Behaviors.
IEEE Access, 2019

2018
A Secure Encryption-Based Malware Detection System.
KSII Trans. Internet Inf. Syst., 2018

2016
A Multilayer Perceptron Based Smart Pathological Brain Detection System by Fractional Fourier Entropy.
J. Medical Syst., 2016

Fractal Dimension Estimation for Developing Pathological Brain Detection System Based on Minkowski-Bouligand Method.
IEEE Access, 2016

A completely fair secret sharing scheme without dealer.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2016

2015
A general two-party bi-input private function evaluation protocol.
Secur. Commun. Networks, 2015

2014
Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks.
Comput. Math. Methods Medicine, 2014

2012
A Fault Detection Scheme Based on Self-Clustering Nodes Sets for Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
A Deterministic Protocol for Rational Secret Sharing in Asynchronous Model.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

2010
A Secure Protocol for Point-Segment Position Problem.
Proceedings of the Web Information Systems and Mining - International Conference, 2010


  Loading...