default search action
Yanbin Sun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j42]Xiong Chen, Mohan Li, Yanbin Sun, Zhihong Tian:
Invisible trigger image: A dynamic neural backdoor attack based on hidden feature. Neurocomputing 639: 130296 (2025) - [j41]Xiao Cai
, Yanbin Sun
, Kaibo Shi
, Xiangpeng Xie
, Yeng Chai Soh
, Cheng Qiao
, Zhihong Tian
:
Enhancing Networked Control System Resilience to TCP/IP Protocol DoS Attacks: Performance Analysis and Intelligent Controller Design. IEEE Trans Autom. Sci. Eng. 22: 6608-6618 (2025) - [j40]Xiao Cai
, Yanbin Sun
, Kaibo Shi
, Huaicheng Yan
, Shiping Wen
, Cheng Qiao
, Zhihong Tian
:
Communication Security and Stability in NNCSs: Realistic DoS Attacks Model and ISTA-Supervised Adaptive Event-Triggered Controller Design. IEEE Trans. Cybern. 55(2): 615-624 (2025) - [j39]Xiao Cai
, Yanbin Sun
, Xiangpeng Xie
, Nan Wei
, Kaibo Shi
, Huaicheng Yan
, Zhihong Tian
:
Enhancing Networked Control Systems Resilience Against DoS Attacks: A Data-Driven Approach With Adaptive Sampled-Data and Compression. IEEE Trans. Inf. Forensics Secur. 20: 4100-4109 (2025) - [j38]Hao Liu
, Yinghai Zhou
, Binxing Fang, Yanbin Sun
, Ning Hu
, Zhihong Tian
:
PHCG: PLC Honeypoint Communication Generator for Industrial IoT. IEEE Trans. Mob. Comput. 24(1): 198-209 (2025) - [j37]Wenjun Yao, Yanbin Sun
, Guodong Wu, Binxing Fang, Yuan Liu
, Zhihong Tian
:
AOIFF: A Precise Attack Method for PLCs Based on Awareness of Industrial Field Information. IEEE Trans. Sustain. Comput. 10(2): 232-243 (2025) - 2024
- [j36]Jingpei Wang
, Ming Zhu, Mohan Li
, Yanbin Sun
, Zhihong Tian
:
An Access Control Method Against Unauthorized and Noncompliant Behaviors of Real-Time Data in Industrial IoT. IEEE Internet Things J. 11(1): 708-727 (2024) - [j35]Chongwu Dong
, Yanbin Sun
, Muhammad Shafiq
, Ning Hu
, Yuan Liu, Zhihong Tian
:
Optimizing Mobility-Aware Task Offloading in Smart Healthcare for Internet of Medical Things Through Multiagent Reinforcement Learning. IEEE Internet Things J. 11(8): 13677-13691 (2024) - [j34]Qian Hong
, Yanbin Sun:
An Adaptive Cuckoo Algorithm-Based Optimization Method for Tourist Traffic Routes. J. Circuits Syst. Comput. 33(2) (2024) - [j33]Lingfeng Qu
, Mohan Li
, Yanbin Sun, Shen Su, Yuan Liu
, Lejun Zhang
:
Security analysis of a reversible data hiding scheme in encrypted images by redundant space transfer. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101914 (2024) - [j32]Zhihong Tian, Wei Shi
, Zhiyuan Tan, Jing Qiu
, Yanbin Sun, Feng Jiang, Yan Liu:
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mob. Networks Appl. 29(5): 1680-1689 (2024) - [j31]Chongwu Dong
, Muhammad Shafiq
, Maryam M. Al Dabel
, Yanbin Sun
, Zhihong Tian
:
DNN Inference Acceleration for Smart Devices in Industry 5.0 by Decentralized Deep Reinforcement Learning. IEEE Trans. Consumer Electron. 70(1): 1519-1530 (2024) - [j30]Xiao Cai
, Kaibo Shi
, Yanbin Sun
, Jinde Cao
, Shiping Wen
, Zhihong Tian
:
Intelligent Event-Triggered Control Supervised by Mini-Batch Machine Learning and Data Compression Mechanism for T-S Fuzzy NCSs Under DoS Attacks. IEEE Trans. Fuzzy Syst. 32(3): 804-815 (2024) - [j29]Xiao Cai
, Kaibo Shi
, Yanbin Sun
, Jinde Cao
, Shiping Wen
, Cheng Qiao
, Zhihong Tian
:
Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning Supervision. IEEE Trans. Inf. Forensics Secur. 19: 3857-3865 (2024) - [j28]Xiao Cai
, Kaibo Shi
, Yanbin Sun
, Jinde Cao
, Oh-Min Kwon
, Cheng Qiao
, Zhihong Tian
:
Design of Intelligent Control Under Machine Learning Supervision and Signal Compression Mechanism Design for NCSs Under DoS Attacks. IEEE Trans. Intell. Transp. Syst. 25(10): 15116-15121 (2024) - [j27]Xiao Cai
, Kaibo Shi
, Yanbin Sun
, YengChai Soh
, Zhihong Tian
:
Performance Analysis and Design of Intelligent Optimising Integral-Based Event-Trigger Control for Autonomous Ground Vehicles Under DoS Attacks. IEEE Trans. Intell. Veh. 9(1): 2149-2159 (2024) - [j26]Xiao Cai
, Kaibo Shi
, Yanbin Sun
, Shiping Wen
, Huaicheng Yan
, Yuanlun Xie
:
Fuzzy Memory Controller Design Based-Machine Learning Algorithm and Stability Analysis for Nonlinear NCSs Under Asynchronous Cyber Attacks. IEEE Trans. Syst. Man Cybern. Syst. 54(2): 1082-1093 (2024) - [c32]Xiaowei Xu, Yixiao Xu, Xiong Chen, Peng Chen, Mohan Li, Yanbin Sun:
Watch Your Words: Successfully Jailbreak LLM by Mitigating the "Prompt Malice". APWeb/WAIM (1) 2024: 295-309 - [c31]Zilong Chen, Li Xu, Mohan Li, Yanbin Sun:
Smart Grid Attack Region Partitioning Strategy Based on Node Importance. DSC 2024: 85-92 - 2023
- [j25]Haifeng Zhou, Mohan Li
, Yanbin Sun
, Lei Yun, Zhihong Tian
:
Digital Twin-Based Cyber Range for Industrial Internet of Things. IEEE Consumer Electron. Mag. 12(6): 66-77 (2023) - [c30]Zhenshan Li, Hao Liu
, Ruijie Shan, Yanbin Sun, Yu Jiang, Ning Hu:
Binary Code Similarity Detection: State and Future. CloudNet 2023: 408-412 - [c29]Shen Su, Yue Xue
, Liansheng Lin, Chao Wang, Hui Lu, Jing Qiu, Yanbin Sun, Yuan Liu, Zhihong Tian:
Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects. GLOBECOM 2023: 5122-5128 - [c28]Yanbin Sun, Jianxun Zhou, Bo Hu, Xiaoming Zhou, Wei Song, Mohan Li, Zhihong Tian:
Hierarchical Name-based Routing for Content Provider Mobility in ICN. IWCMC 2023: 941-946 - [c27]Weicheng Li, Hui Lu, Yanbin Sun, Shen Su, Jing Qiu, Zhihong Tian:
Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis. IWQoS 2023: 1-2 - [c26]Qi Yan, Mohan Li, Yanbin Sun:
Neighborhood Matching Entity Alignment Model for Vulnerability Knowledge Graphs. TrustCom 2023: 38-45 - 2022
- [c25]Hongniu Zhang, Mohan Li, Yanbin Sun, Guanqun Qu:
Robust Truth Discovery Against Multi-round Data Poisoning Attacks. WASA (1) 2022: 258-270 - 2021
- [j24]Yanbin Sun, Mohan Li, Shen Su, Zhihong Tian
, Wei Shi
, Meng Han:
Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets. Mob. Networks Appl. 26(2): 940-948 (2021) - [j23]Hui Lu, Chengjie Jin, Xiaohan Helu, Man Zhang, Yanbin Sun
, Yi Han, Zhihong Tian:
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis. Mob. Networks Appl. 26(4): 1723-1732 (2021) - [j22]Ning Hu, Zhihong Tian, Yanbin Sun, Lihua Yin, Baokang Zhao, Xiaojiang Du, Nadra Guizani:
Building Agile and Resilient UAV Networks Based on SDN and Blockchain. IEEE Netw. 35(1): 57-63 (2021) - [j21]Yanbin Sun
, Zhihong Tian
, Mohan Li
, Shen Su
, Xiaojiang Du
, Mohsen Guizani
:
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems. IEEE Trans. Ind. Informatics 17(8): 5542-5551 (2021) - [j20]Yuhang Wang
, Zhihong Tian
, Yanbin Sun
, Xiaojiang Du
, Nadra Guizani
:
LocJury: An IBN-Based Location Privacy Preserving Scheme for IoCV. IEEE Trans. Intell. Transp. Syst. 22(8): 5028-5037 (2021) - [c24]Huiying Lan, Yanbin Sun:
Review on Fuzz Testing for Protocols in Industrial Control Systems. DSC 2021: 433-438 - [c23]Yu Jiang, Yuying Li, Yanbin Sun:
Networked Device Identification: A Survey. DSC 2021: 543-548 - 2020
- [j19]Weixiang Chen, Xiaohan Helu, Chengjie Jin, Man Zhang, Hui Lu
, Yanbin Sun, Zhihong Tian:
Advanced persistent threat organization identification based on software gene of malware. Trans. Emerg. Telecommun. Technol. 31(12) (2020) - [j18]Muhammad Shafiq
, Zhihong Tian, Yanbin Sun, Xiaojiang Du, Mohsen Guizani:
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Future Gener. Comput. Syst. 107: 433-442 (2020) - [j17]Mohan Li
, Yanbin Sun
, Hui Lu
, Sabita Maharjan
, Zhihong Tian
:
Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems. IEEE Internet Things J. 7(7): 6266-6278 (2020) - [j16]Shuzhuang Zhang, Yanbin Sun
, Fanzhi Meng, Yunsheng Fu, Bowei Jia, Zhigang Wu:
XWM: a high-speed matching algorithm for large-scale URL rules in wireless surveillance applications. Multim. Tools Appl. 79(23-24): 16245-16263 (2020) - [j15]Zhihong Tian, Yuhang Wang
, Yanbin Sun, Jing Qiu:
Location Privacy Challenges in Mobile Edge Computing: Classification and Exploration. IEEE Netw. 34(2): 52-56 (2020) - [j14]Yuhang Wang
, Zhihong Tian, Yanbin Sun, Xiaojiang Du, Nadra Guizani:
Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation. IEEE Netw. 34(4): 284-290 (2020) - [j13]Yanbin Sun, Zhihong Tian, Mohan Li, Chunsheng Zhu, Nadra Guizani:
Automated Attack and Defense Framework toward 5G Security. IEEE Netw. 34(5): 247-253 (2020) - [j12]Zhihong Tian, Chaochao Luo, Hui Lu, Shen Su, Yanbin Sun, Man Zhang:
User and Entity Behavior Analysis under Urban Big Data. Trans. Data Sci. 1(3): 16:1-16:19 (2020) - [c22]Yanbin Sun, Jianmei Zhou, Shanshan Chen, Xiangkai Zeng, Xia Sun:
Signal processing for extracting velocity information from spatial filtering signals. CyberC 2020: 379-383 - [c21]Li Xu, Yanbin Sun:
Summary of Research on Information Security Protection of Smart Grid. ICAIS (2) 2020: 365-379
2010 – 2019
- 2019
- [j11]Jing Qiu
, Zirui Xing, Chunsheng Zhu
, Kunfeng Lu, Jialuan He, Yanbin Sun
, Lihua Yin:
Centralized Fusion Based on Interacting Multiple Model and Adaptive Kalman Filter for Target Tracking in Underwater Acoustic Sensor Networks. IEEE Access 7: 25948-25958 (2019) - [j10]Yanbin Sun
, Zhihong Tian
, Yuhang Wang, Mohan Li, Shen Su, Xianzhi Wang
, Dunqiu Fan:
Lightweight Anonymous Geometric Routing for Internet of Things. IEEE Access 7: 29754-29762 (2019) - [j9]Hui Lu, Xiaohan Helu, Chengjie Jin
, Yanbin Sun
, Man Zhang
, Zhihong Tian
:
Salaxy: Enabling USB Debugging Mode Automatically to Control Android Devices. IEEE Access 7: 178321-178330 (2019) - [j8]Zhihong Tian
, Mohan Li, Meikang Qiu
, Yanbin Sun, Shen Su
:
Block-DEF: A secure digital evidence framework using blockchain. Inf. Sci. 491: 151-165 (2019) - [j7]Zhihong Tian
, Wei Shi
, Yuhang Wang
, Chunsheng Zhu
, Xiaojiang Du
, Shen Su
, Yanbin Sun
, Nadra Guizani:
Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment. IEEE Trans. Ind. Informatics 15(7): 4285-4294 (2019) - [c20]Xiaojun Zheng, Jiang Zhong, Yanbin Sun, Yanjun Shi, Zhizheng Xu, Hao Sun:
Design of Optimization Platform for Energy Absorption Structure of High Speed Train. CSCWD 2019: 279-283 - [c19]Yuhang Wang
, Zhihong Tian, Shen Su, Yanbin Sun, Chunsheng Zhu:
Preserving Location Privacy in Mobile Edge Computing. ICC 2019: 1-6 - [c18]Zongshi Chen, Mohan Li, Xiang Cui, Yanbin Sun:
Research on SQL Injection and Defense Technology. ICAIS (4) 2019: 191-201 - [c17]Xinguo Zhang, Mohan Li, Yu Jiang, Yanbin Sun:
A Review of the Factorization Problem of Large Integers. ICAIS (4) 2019: 202-213 - [c16]XiaoLong Chen, Mohan Li, Yu Jiang, Yanbin Sun:
A Comparison of Machine Learning Algorithms for Detecting XSS Attacks. ICAIS (4) 2019: 214-224 - [c15]Yuchong Cui, Bing Pan, Yanbin Sun:
A Survey of Privacy-Preserving Techniques for Blockchain. ICAIS (4) 2019: 225-234 - [c14]Zhuangyou Chen, Bing Pan, Yanbin Sun:
A Survey of Software Reverse Engineering Applications. ICAIS (4) 2019: 235-245 - [c13]Hangfeng Yang, Hui Lu, Shudong Li, Mohan Li, Yanbin Sun:
Research on Content Extraction of Rich Text Web Pages. ICAIS (4) 2019: 279-287 - [c12]Weixiang Chen, Hui Lu, Mohan Li, Yanbin Sun:
Network Protocol Analysis Base on WeChat PC Version. ICAIS (4) 2019: 288-297 - [c11]Runnan Tan, Xiangyi Kong, Yu Zhang, Qingfeng Tan, Hui Lu, Mohan Li, Yanbin Sun:
Bitcoin Network Size Estimation Based on Coupon Collection Model. ICAIS (4) 2019: 298-307 - [c10]Yuying Li, Xiaohan Helu, Mohan Li, Yanbin Sun, Le Wang:
Implementation of MD5 Collision Attack in Program. ICAIS (1) 2019: 595-604 - [i2]Zhihong Tian, Yanbin Sun, Shen Su, Mohan Li, Xiaojiang Du, Mohsen Guizani:
Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers. CoRR abs/1902.04009 (2019) - [i1]Zhihong Tian, Wei Shi, Yuhang Wang, Chunsheng Zhu, Xiaojiang Du, Shen Su, Yanbin Sun, Nadra Guizani:
Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment. CoRR abs/1902.04387 (2019) - 2018
- [j6]Mohan Li, Jianzhong Li, Siyao Cheng, Yanbin Sun:
Uncertain Rule Based Method for Determining Data Currency. IEICE Trans. Inf. Syst. 101-D(10): 2447-2457 (2018) - [j5]Mohan Li, Yanbin Sun:
Currency Preserving Query: Selecting the Newest Values from Multiple Tables. IEICE Trans. Inf. Syst. 101-D(12): 3059-3072 (2018) - [j4]Mohan Li, Yanbin Sun, Yu Jiang, Zhihong Tian
:
Answering the Min-Cost Quality-Aware Query on Multi-Sources in Sensor-Cloud Systems. Sensors 18(12): 4486 (2018) - [c9]Mohan Li, Yanbin Sun, Le Wang, Hui Lu:
Quality-Aware Query Based on Relative Source Quality. ICCCS (2) 2018: 3-8 - [c8]Yanbin Sun, Mohan Li, Le Wang, Hui Lu:
Greedy Embedding Strategy for Dynamic Graphs Based on Spanning Tree. ICCCS (1) 2018: 525-530 - [c7]Mohan Li, Yu Jiang, Yanbin Sun, Zhihong Tian:
Answering the Min-Cost Quality-Aware Query on Multi-sources in Sensor-Cloud Systems. SpaCCS 2018: 156-165 - 2017
- [j3]Yanbin Sun, Yu Zhang, Binxing Fang, Hongli Zhang:
Succinct and practical greedy embedding for geometric routing. Comput. Commun. 114: 51-61 (2017) - 2016
- [j2]Yanbin Sun, Yu Zhang, Binxing Fang, Hongli Zhang:
SNGR: Scalable Name-Based Geometric Routing for ICN. IEICE Trans. Commun. 99-B(8): 1835-1845 (2016) - 2015
- [c6]Yanbin Sun, Yu Zhang, Hongli Zhang, Binxing Fang, Xiaojiang Du:
Geometric Routing on Flat Names for ICN. GLOBECOM 2015: 1-6 - [c5]Hongli Zhang, Dongliang Xu, Lei Zhang, Yanbin Sun:
Matrix-based parallel pattern matching method. ICC 2015: 7114-7119 - [c4]Yanbin Sun, Yu Zhang, Hongli Zhang, Binxing Fang, Jiantao Shi:
An ICN-Oriented Name-Based Routing Scheme. ICYCSEE 2015: 101-108 - 2013
- [j1]Yanbin Sun, Yan Sun, Mingxing Luo, Lize Gu, Shihui Zheng, Yixian Yang:
Comment on Lee et al.'s group signature and e-auction scheme. Inf. Syst. Frontiers 15(1): 133-139 (2013)
2000 – 2009
- 2009
- [c3]Yu Liu, Jun Liu, Dengfeng Li, Leilei Li, Yanbin Sun, Yingjun Pan:
Study of Grey Model Theory and Neural Network Algorithm for Improving Dynamic Measure Precision in Low Cost IMU. CSIE (5) 2009: 234-238 - 2007
- [c2]Yanbin Sun, Lun Xie, Zhiliang Wang, Yi An:
An Embedded System of Face Recognition Based on ARM and HMM. ICEC 2007: 389-394 - 2004
- [c1]Lixing Yang
, Yanbin Sun:
Expected value model for a fuzzy random warehouse layout problem. FUZZ-IEEE 2004: 751-756
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-12 21:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint