Остановите войну!
for scientists:
default search action
Yi Sun 0006
- > Home > Persons > Yi Sun 0006
Publications
- 2023
- [j17]Yuning Cui, Yi Sun, Zhaowen Lin:
DroidHook: a novel API-hook based Android malware dynamic analysis sandbox. Autom. Softw. Eng. 30(1): 10 (2023) - [j16]Yuning Cui, Yi Sun, Zhaowen Lin, Baoquan Ma, Yujie Li:
Potentially Unwanted App Detection for Blockchain-Based Android App Marketplace. IEEE Internet Things J. 10(24): 21154-21167 (2023) - [j15]Yu Tang, Jiawen Yan, Chinmay Chakraborty, Yi Sun:
Hedera: A Permissionless and Scalable Hybrid Blockchain Consensus Algorithm in Multiaccess Edge Computing for IoT. IEEE Internet Things J. 10(24): 21187-21202 (2023) - [j14]Yu Tang, Yi Sun, Bin Ning, Jun Wun, Zhaowen Lin:
DRMT: A Decentralized IoT Device Recognition and Management Technology in Smart Cities. J. Circuits Syst. Comput. 32(11): 2350194:1-2350194:25 (2023) - [j13]Yi Sun, Keping Yu, Ali Kashif Bashir, Xin Liao:
Bl-IEA: A Bit-Level Image Encryption Algorithm for Cognitive Services in Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(1): 1062-1074 (2023) - [j12]Cai Xiaohong, Yi Sun, Zhaowen Lin, Muhammad Imran, Keping Yu:
Web-based practical privacy-preserving distributed image storage for financial services in cloud computing. World Wide Web (WWW) 26(3): 1223-1241 (2023) - 2022
- [j11]Yonghui Huang, Yi Sun, Kaixiang Lin, Bowen Xie, Jiayang Fan, Yan Ma:
An Effective Reconstruction Method of the APT Attack Based on Hidden Markov Model. J. Circuits Syst. Comput. 31(6): 2250108:1-2250108:16 (2022) - [j10]Yi Sun, Jie Liu, Keping Yu, Mamoun Alazab, Kaixiang Lin:
PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare. IEEE Trans. Ind. Informatics 18(3): 1981-1990 (2022) - 2021
- [j9]Yi Sun, Ali Kashif Bashir, Usman Tariq, Fei Xiao:
Effective malware detection scheme based on classified behavior graph in IIoT. Ad Hoc Networks 120: 102558 (2021) - [j8]Yi Sun, Yuning Cui, Yonghui Huang, Zhaowen Lin:
SDMP: A secure detector for epidemic disease file based on DNN. Inf. Fusion 68: 1-7 (2021) - [j7]Yin Zhang, Yi Sun, Renchao Jin, Kaixiang Lin, Wei Liu:
High-Performance Isolation Computing Technology for Smart IoT Healthcare in Cloud Environments. IEEE Internet Things J. 8(23): 16872-16879 (2021) - 2019
- [j6]Donggao Du, Yi Sun, Yan Ma, Fei Xiao:
A Novel Approach to Detect Malware Variants Based on Classified Behaviors. IEEE Access 7: 81770-81782 (2019) - 2018
- [j5]Zhaowen Lin, Fei Xiao, Yi Sun, Yan Ma, Cong-Cong Xing, Jun Huang:
A Secure Encryption-Based Malware Detection System. KSII Trans. Internet Inf. Syst. 12(4): 1799-1818 (2018) - 2016
- [j4]Yudong Zhang, Xian-Qing Chen, Tianming Zhan, Zhu-Qing Jiao, Yi Sun, Zhi-Min Chen, Yu Yao, Lan-Ting Fang, Yi-Ding Lv, Shuihua Wang:
Fractal Dimension Estimation for Developing Pathological Brain Detection System Based on Minkowski-Bouligand Method. IEEE Access 4: 5937-5947 (2016) - [j3]Yudong Zhang, Yi Sun, Preetha Phillips, Ge Liu, Xingxing Zhou, Shuihua Wang:
A Multilayer Perceptron Based Smart Pathological Brain Detection System by Fractional Fourier Entropy. J. Medical Syst. 40(7): 173:1-173:11 (2016) - [c4]Yi Sun, Gaochao Li, Zhaowen Lin, Fei Xiao, Xiaoming Yang:
A completely fair secret sharing scheme without dealer. ICCE-TW 2016: 35-36 - 2015
- [j2]Yi Sun, Qiaoyan Wen:
A general two-party bi-input private function evaluation protocol. Secur. Commun. Networks 8(15): 2536-2544 (2015) - 2014
- [j1]Yi Sun, Qiaoyan Wen, Yudong Zhang, Wenmin Li:
Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks. Comput. Math. Methods Medicine 2014: 214841:1-214841:9 (2014) - 2012
- [c3]Zhaoxing Wang, Qiaoyan Wen, Yi Sun, Hua Zhang:
A Fault Detection Scheme Based on Self-Clustering Nodes Sets for Wireless Sensor Networks. CIT 2012: 921-925 - 2011
- [c2]Yi Sun, Hongxiang Sun, Qiaoyan Wen, Hua Zhang:
A Deterministic Protocol for Rational Secret Sharing in Asynchronous Model. IPTC 2011: 5-8 - 2010
- [c1]Yi Sun, Hongxiang Sun, Hua Zhang, Qiao-Yan Wen:
A Secure Protocol for Point-Segment Position Problem. WISM 2010: 212-219
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint