Limin Sun

Orcid: 0000-0003-2745-7521

Affiliations:
  • University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
  • Chinese Academy of Sciences, Institute of Software, Beijing, China (former)
  • National University of Defense Technology, Changsha, China (PhD 1998)


According to our database1, Limin Sun authored at least 310 papers between 2003 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Detection of cyberattack in Industrial Control Networks using multiple adaptive local kernel learning.
Comput. Secur., 2025

SFACIF: A safety function attack and anomaly industrial condition identified framework.
Comput. Networks, 2025

2024
FeaShare: Feature Sharing for Computation Correctness in Edge Preprocessing.
IEEE Trans. Mob. Comput., December, 2024

Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers.
ACM Trans. Softw. Eng. Methodol., May, 2024

Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach.
IEEE Internet Things J., May, 2024

RIETD: A Reputation Incentive Scheme Facilitates Personalized Edge Tampering Detection.
IEEE Internet Things J., April, 2024

Cascading Threat Analysis of IoT Devices in Trigger-Action Platforms.
IEEE Internet Things J., April, 2024

Fingerprinting Industrial IoT devices based on multi-branch neural network.
Expert Syst. Appl., March, 2024

LibAM: An Area Matching Framework for Detecting Third-Party Libraries in Binaries.
ACM Trans. Softw. Eng. Methodol., February, 2024

Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild.
ACM Trans. Sens. Networks, January, 2024

Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge.
ACM Trans. Softw. Eng. Methodol., January, 2024

Multi-granularity cross-modal representation learning for named entity recognition on social media.
Inf. Process. Manag., January, 2024

PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS.
IEEE Trans. Inf. Forensics Secur., 2024

Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-task Learning.
Proc. ACM Softw. Eng., 2024

LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions.
CoRR, 2024

Can Large Language Models Automatically Jailbreak GPT-4V?
CoRR, 2024

TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic Waves.
CoRR, 2024

HoneyGPT: Breaking the Trilemma in Terminal Honeypots with Large Language Model.
CoRR, 2024

Active Defense Simulation Evaluation of Industrial Control Systems Based on Attack-Defense Graph.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

TaiE: Function Identification for Monolithic Firmware.
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024

How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

DeLink: Source File Information Recovery in Binaries.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Enhancing Coverage in Stateful Protocol Fuzzing via Value-Based Selection.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

Concrete Constraint Guided Symbolic Execution.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

MOMR: A Threat in Web Application Due to the Malicious Orchestration of Microservice Requests.
Proceedings of the IEEE International Conference on Communications, 2024

Log-Based Anomaly Detection with Transformers Pre-Trained on Large-Scale Unlabeled Data.
Proceedings of the IEEE International Conference on Communications, 2024

A Relation-Aware Heterogeneous Graph Transformer on Dynamic Fusion for Multimodal Classification Tasks.
Proceedings of the IEEE International Conference on Acoustics, 2024

Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

Hierarchical Aligned Multimodal Learning for NER on Tweet Posts.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis.
ACM Trans. Softw. Eng. Methodol., November, 2023

Capability and Blockchain-Based Fine-Grained and Flexible Access Control Model.
IEEE Netw., November, 2023

Intelligent Connected Vehicle Security: Threats, Attacks and Defenses.
J. Inf. Sci. Eng., November, 2023

Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer.
Knowl. Inf. Syst., October, 2023

Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks.
Comput. Secur., September, 2023

Physical-Layer Secret Key Generation Based on Bidirectional Convergence Feature Learning Convolutional Network.
IEEE Internet Things J., August, 2023

Owner name entity recognition in websites based on multiscale features and multimodal co-attention.
Expert Syst. Appl., August, 2023

Blockchain-enhanced trust management for mobile edge computing-enabled intelligent vehicular collaboration in the 6G era.
Trans. Emerg. Telecommun. Technol., July, 2023

UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router.
Comput. Secur., May, 2023

A Sparse Protocol Parsing Method for IIoT Based on BPSO-vote-HMM Hybrid Model.
IEEE/ACM Trans. Netw., April, 2023

DevTag: A Benchmark for Fingerprinting IoT Devices.
IEEE Internet Things J., April, 2023

VERI: A Large-scale Open-Source Components Vulnerability Detection in IoT Firmware.
Comput. Secur., March, 2023

Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace.
IEEE Trans. Dependable Secur. Comput., 2023

Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution.
IEEE Trans. Dependable Secur. Comput., 2023

A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment.
IEEE Internet Things J., 2023

ECC-Based Authenticated Key Agreement Protocol for Industrial Control System.
IEEE Internet Things J., 2023

Multiview Embedding with Partial Labels to Recognize Users of Devices Based on Unified Transformer.
Int. J. Intell. Syst., 2023

Harnessing the Power of LLM to Support Binary Taint Analysis.
CoRR, 2023

Understanding Large Language Model Based Fuzz Driver Generation.
CoRR, 2023

A Novel Framework for Multimodal Named Entity Recognition with Multi-level Alignments.
CoRR, 2023

A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security.
IEEE Commun. Surv. Tutorials, 2023

CL-GAN: A GAN-based continual learning model for generating and detecting AGDs.
Comput. Secur., 2023

HackMentor: Fine-Tuning Large Language Models for Cybersecurity.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

DeviceGPT: A Generative Pre-Training Transformer on the Heterogenous Graph for Internet of Things.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

CNN-PSO-KELM: A Deep Learning Intrusion Detection Model for Imbalanced IoT Data.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries.
Proceedings of the IEEE Military Communications Conference, 2023

Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Mining Implicit Behavioral Patterns via Attention Networks for Sequential Recommendation.
Proceedings of the International Neural Network Society Workshop on Deep Learning Innovations and Applications, 2023

User Recognition of Devices on the Internet based on Heterogeneous Graph Transformer with Partial Labels.
Proceedings of the International Joint Conference on Neural Networks, 2023

CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises.
Proceedings of the International Joint Conference on Neural Networks, 2023

Improving the Modality Representation with multi-view Contrastive Learning for Multimodal Sentiment Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2023

CSEDesc: CyberSecurity Event Detection with Event Description.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023

MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

ip2text: A Reasoning-Aware Dataset for Text Generation of Devices on the Internet.
Proceedings of the Database Systems for Advanced Applications. DASFAA 2023 International Workshops, 2023

FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks.
IEEE Trans. Dependable Secur. Comput., 2022

Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control.
J. Syst. Archit., 2022

Characterizing Heterogeneous Internet of Things Devices at Internet Scale Using Semantic Extraction.
IEEE Internet Things J., 2022

Threat Detection for General Social Engineering Attack Using Machine Learning Techniques.
CoRR, 2022

An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks.
Comput. Ind., 2022

Joint Classification of IoT Devices and Relations in the Internet with Network Traffic.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Inferring Device Interactions for Attack Path Discovery in Smart Home IoT.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Discover the ICS Landmarks Based on Multi-stage Clue Mining.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Detection and Incentive: A Tampering Detection Mechanism for Object Detection in Edge Computing.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022

An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification.
Proceedings of the Security and Privacy in Communication Networks, 2022

Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

SIFOL: Solving Implicit Flows in Loops for Concolic Execution.
Proceedings of the IEEE International Performance, 2022

ProsegDL: Binary Protocol Format Extraction by Deep Learning-based Field Boundary Identification.
Proceedings of the 30th IEEE International Conference on Network Protocols, 2022

Finding Vulnerabilities in Internal-binary of Firmware with Clues.
Proceedings of the IEEE International Conference on Communications, 2022

Compromised IoT Devices Detection in Smart Home via Semantic Information.
Proceedings of the IEEE International Conference on Communications, 2022

IoTminer: Semantic Information Extraction in the Packet Payloads.
Proceedings of the IEEE Global Communications Conference, 2022

IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks.
IEEE/ACM Trans. Netw., 2021

Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems.
IEEE Internet Things J., 2021

<i>CShield</i>: Enabling code privacy for Cyber-Physical systems.
Future Gener. Comput. Syst., 2021

Social engineering in cybersecurity: a domain ontology and knowledge graph application examples.
Cybersecur., 2021

Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis.
CoRR, 2021

SEIGuard: An Authentication-simplified and Deceptive Scheme to Protect Server-side Social Engineering Information Against Brute-force Attacks.
CoRR, 2021

Firmware Re-hosting Through Static Binary-level Porting.
CoRR, 2021

Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods.
IEEE Access, 2021

FIUD: A Framework to Identify Users of Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

A Robust IoT Device Identification Method with Unknown Traffic Detection.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Transformer-XL With Graph Neural Network for Source Code Summarization.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Detecting Internet-Scale Surveillance Devices Using RTSP Recessive Features.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

PMatch: Semantic-based Patch Detection for Binary Programs.
Proceedings of the IEEE International Performance, 2021

HoneyVP: A Cost-Effective Hybrid Honeypot Architecture for Industrial Control Systems.
Proceedings of the ICC 2021, 2021

Maximal Clique Based Non-Autoregressive Open Information Extraction.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing.
Proceedings of the Applied Cryptography and Network Security, 2021

Discontinuous Named Entity Recognition as Maximal Clique Discovery.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

2020
Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild.
Proc. ACM Meas. Anal. Comput. Syst., 2020

iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting.
IEEE J. Sel. Areas Commun., 2020

Detecting stealthy attacks on industrial control systems using a permutation entropy-based method.
Future Gener. Comput. Syst., 2020

XLBoost-Geo: An IP Geolocation System Based on Extreme Landmark Boosting.
CoRR, 2020

Endogenous Security Defense against Deductive Attack: When Artificial Intelligence Meets Active Defense for Online Service.
IEEE Commun. Mag., 2020

Defining Social Engineering in Cybersecurity.
IEEE Access, 2020

Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Detecting Internet-Scale NATs for IoT Devices Based on Tri-Net.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

VES: A Component Version Extracting System for Large-Scale IoT Firmwares.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

A Scalable High-interaction Physical Honeypot Framework for Programmable Logic Controller.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

LSTM-Based Communication Scheduling Mechanism for Energy Harvesting RSUs in IoVs.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Malware Classification Using Attention-Based Transductive Learning Network.
Proceedings of the Security and Privacy in Communication Networks, 2020

A Survey of Blockchain-based Cybersecurity for Vehicular Networks.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

A Sparse Protocol Parsing Method for IIoT Protocols Based on HMM hybrid model.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

The Mining of IP Landmarks for Internet Webcams.
Proceedings of the Wireless Sensor Networks - 14th China Conference, 2020

TPLinker: Single-stage Joint Extraction of Entities and Relations Through Token Pair Linking.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

2019
Blockchain for Large-Scale Internet of Things Data Storage and Protection.
IEEE Trans. Serv. Comput., 2019

Detecting stealthy attacks against industrial control systems based on residual skewness analysis.
EURASIP J. Wirel. Commun. Netw., 2019

Towards IP geolocation with intermediate routers based on topology discovery.
Cybersecur., 2019

Logic Bugs in IoT Platforms and Systems: A Review.
CoRR, 2019

Towards automatic fingerprinting of IoT devices in the cyberspace.
Comput. Networks, 2019

IoTTracker: An Enhanced Engine for Discovering Internet-of-Thing Devices.
Proceedings of the 20th IEEE International Symposium on "A World of Wireless, 2019

Lightweight IoT Malware Visualization Analysis via Two-Bits Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation.
Proceedings of the 28th USENIX Security Symposium, 2019

Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

Resident Evil: Understanding Residential IP Proxy as a Dark Service.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Side-Channel Information Leakage of Traffic Data in Instant Messaging.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

An Efficient and Agile Spatio-Temporal Route Mutation Moving Target Defense Mechanism.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

SCTM: A Multi-View Detecting Approach Against Industrial Control Systems Attacks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Understand Code Style: Efficient CNN-Based Compiler Optimization Recognition System.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Remote Fingerprinting on Internet-Wide Printers Based on Neural Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Deep Memory Network with Auxiliary Sequences for Chinese Implied Sentiment Analysis.
Proceedings of the Wireless Sensor Networks - 13th China Conference, 2019

An Anonymous Blockchain-Based Logging System for Cloud Computing.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids.
Math. Found. Comput., 2018

基于协议状态图遍历的RTSP协议漏洞挖掘 (Mining RTSP Protocol Vulnerabilities Based on Traversal of Protocol State Graph).
计算机科学, 2018

MIAC: A mobility intention auto-completion model for location prediction.
Intell. Syst. Account. Finance Manag., 2018

Understanding the Usage of Industrial Control System Devices on the Internet.
IEEE Internet Things J., 2018

Who owns Internet of Thing devices?
Int. J. Distributed Sens. Networks, 2018

A survey of intrusion detection on industrial control systems.
Int. J. Distributed Sens. Networks, 2018

Context-aware personalized path inference from large-scale GPS snippets.
Expert Syst. Appl., 2018

A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications.
IEEE Access, 2018

Modeling Privacy Leakage Risks in Large-Scale Social Networks.
IEEE Access, 2018

Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File Retrieval.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices.
Proceedings of the 27th USENIX Security Symposium, 2018

Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence.
Proceedings of the 2018 IEEE SmartWorld, 2018

Mining Human Periodic Behaviors Using Mobility Intention and Relative Entropy.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

A Check-In System Leveraging Face Recognition.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

SMDP-Based Downlink Packet Scheduling Scheme for Solar Energy Assisted Heterogeneous Networks.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

A graph neural network based efficient firmware information extraction method for IoT devices.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Discovery of Internet of Thing devices based on rules.
Proceedings of the IEEE INFOCOM 2018, 2018

Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

PANDORA: A Scalable and Efficient Scheme to Extract Version of Binaries in IoT Firmwares.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Sbsd: Detecting the Sequence Attack through Sensor Data in ICSs.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Multi-Dimensional Data Fusion Intrusion Detection for Stealthy Attacks on Industrial Control Systems.
Proceedings of the IEEE Global Communications Conference, 2018

DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Why You Go Reveals Who You Know: Disclosing Social Relationship by Cooccurrence.
Wirel. Commun. Mob. Comput., 2017

Game Theoretic Study on Channel-Based Authentication in MIMO Systems.
IEEE Trans. Veh. Technol., 2017

ViMediaNet: an emulation system for interactive multimedia based telepresence services.
J. Supercomput., 2017

Identifying User-Input Privacy in Mobile Applications at a Large Scale.
IEEE Trans. Inf. Forensics Secur., 2017

Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets.
Sensors, 2017

A Framework for Searching Internet-Wide Devices.
IEEE Netw., 2017

Trajectory-Based Hierarchical Adaptive Forwarding in Vehicular Ad Hoc Networks.
J. Sensors, 2017

Mobility Intention-Based Relationship Inference from Spatiotemporal Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Defense Against Advanced Persistent Threats with Expert System for Internet of Things.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Bitcoin Based Incentive Mechanism for Distributed P2P Applications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Discovering Routers as Secondary Landmarks for Accurate IP Geolocation.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

MOSTPC: Performance of a Massive Oblique Space-Time-Polarization Precoding System over Ricean-K Fading Channel.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Wireless Physical Layer Characteristics Based Random Number Generator: Hijack Attackers.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Poster: Towards Fully Distributed User Authentication with Blockchain.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Automatically Discovering Surveillance Devices in the Cyberspace.
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017

On eavesdropping attacks and countermeasures for MU-MIMO systems.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

MIAC: A Mobility Intention Auto-Completion Model for Location Prediction.
Proceedings of the Knowledge Science, Engineering and Management, 2017

Game theoretic study on blockchain based secure edge networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

Collaborative UFH-based anti-jamming broadcast with learning.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

CovertMIMO: A covert uplink transmission scheme for MIMO systems.
Proceedings of the IEEE International Conference on Communications, 2017

Mobility Pattern Based Relationship Inference from Spatiotemporal Data.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Anti-Jamming Power Control Game in Unmanned Aerial Vehicle Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Collaborative Recognition of Queuing Behavior on Mobile Phones.
IEEE Trans. Mob. Comput., 2016

An optimal query strategy for protecting location privacy in location-based services.
Peer-to-Peer Netw. Appl., 2016

A survey of privacy protection techniques for mobile devices.
J. Commun. Inf. Networks, 2016

Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks.
IEEE Internet Things J., 2016

Maximizing the stable throughput of high-priority traffic for wireless cyber-physical systems.
EURASIP J. Wirel. Commun. Netw., 2016

Influential spatial facility prediction over large scale cyber-physical vehicles in smart city.
EURASIP J. Wirel. Commun. Netw., 2016

Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization.
EURASIP J. Wirel. Commun. Netw., 2016

Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

An Enhanced Structure-Based De-anonymization of Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Side-channel information leakage of encrypted video stream in video surveillance systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization.
Proceedings of the International Conference on Identification, 2016

GUIDE: Graphical user interface fingerprints physical devices.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

ASCEND: A search engine for online industrial control devices.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Characterizing industrial control system devices on the Internet.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Active Profiling of Physical Devices at Internet Scale.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Zero reconciliation secret key extraction in MIMO backscatter wireless systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Identification of visible industrial control devices at Internet scale.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Channel-Based Authentication Game in MIMO Systems.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Feel Bored? Join Verse! Engineering Vehicular Proximity Social Networks.
IEEE Trans. Veh. Technol., 2015

Coff: Contact-Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks.
IEEE Trans. Veh. Technol., 2015

ROCS: Exploiting FM Radio Data System for Clock Calibration in Sensor Networks.
IEEE Trans. Mob. Comput., 2015

A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT).
IEEE Trans. Emerg. Top. Comput., 2015

B-RPL: 低存储开销的RPL路由协议 (B-RPL: Low Memory Cost RPL Routing Protocol).
计算机科学, 2015

Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks.
Int. J. Inf. Secur. Priv., 2015

Fog Computing: Focusing on Mobile Users at the Edge.
CoRR, 2015

Security and privacy in localization for underwater sensor networks.
IEEE Commun. Mag., 2015

On the Stable Throughput in Wireless LANs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Influential Spatial Facility Prediction over Dynamic Objects.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications.
Proceedings of the Security and Privacy in Communication Networks, 2015

Abnormal event detection via adaptive cascade dictionary learning.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Disseminating real-time messages in opportunistic mobile social networks: A ranking perspective.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Vehicle Anomaly Detection Based on Trajectory Data of ANPR System.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Target Domain Adaptation for Face Detection in a Smart Camera Network with Peer-to-Peer Communications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Negative-Supervised Cascaded Deep Learning for Traffic Sign Classification.
Proceedings of the Computer Vision - CCF Chinese Conference, 2015

2014
A Quality-Aware Voice Streaming System for Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2014

ZiFi: Exploiting Cross-Technology Interference Signatures for Wireless LAN Discovery.
IEEE Trans. Mob. Comput., 2014

Performance monitoring and evaluation in dance teaching with mobile sensing technology.
Pers. Ubiquitous Comput., 2014

Novel itinerary-based KNN query algorithm leveraging grid division routing in wireless sensor networks of skewness distribution.
Pers. Ubiquitous Comput., 2014

Structural health monitoring by using a sparse coding-based deep learning algorithm with wireless sensor networks.
Pers. Ubiquitous Comput., 2014

Identity privacy-based reliable routing method in VANETs.
Peer-to-Peer Netw. Appl., 2014

Ubiquitous WSN for Healthcare: Recent Advances and Future Prospects.
IEEE Internet Things J., 2014

TDMA-Based Control Channel Access for IEEE 802.11p in VANETs.
Int. J. Distributed Sens. Networks, 2014

Adaptive Heterogeneous Network Handoff of Smartphone Based on the Closed Control Loop.
Int. J. Distributed Sens. Networks, 2014

Optimization of Sampling Cell Size for Fingerprint Positioning.
Int. J. Distributed Sens. Networks, 2014

A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

LARES: latency-reduced neighbour discovery for contagious diseases prevention.
Int. J. Ad Hoc Ubiquitous Comput., 2014

UserIntent: Detection of user intent for triggering smartphone sensing applications.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

QueueSense: Collaborative recognition of queuing on mobile phones.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Poster: Crowdsourcing for video traffic surveillance.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

VAPA: Vehicle Activity Patterns Analysis based on Automatic Number Plate Recognition System Data.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

Achieving privacy preservation in WiFi fingerprint-based localization.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Eye localization based on correlation filter bank.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

CREEP: Cognitive relaying enabled efficiency and physical-layer security preserving framework.
Proceedings of the IEEE International Conference on Communication Systems, 2014

Vehicle Activity Analysis Based on ANPR System.
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014

An optimal privacy-preserving mechanism for crowdsourced traffic monitoring.
Proceedings of the 10th ACM International Workshop on Foundations of Mobile Computing, 2014

Security of Cyber Physical System.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

Design and Implementation of Smart Home Linkage System Based on OSGI and REST Architecture.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

Quantifying individual communication capability in opportunistic mobile social networks.
Proceedings of the IEEE Computers, 2014

2013
On exploiting polarization for energy-harvesting enabled cooperative cognitive radio networking.
IEEE Wirel. Commun., 2013

A Cross-Layer Design Combining of AMC with HARQ for DSRC Systems.
Int. J. Distributed Sens. Networks, 2013

Discovering Human Presence Activities with Smartphones Using Nonintrusive Wi-Fi Sniffer Sensors: The Big Data Prospective.
Int. J. Distributed Sens. Networks, 2013

Amortized Fairness for Drive-Thru Internet.
Int. J. Distributed Sens. Networks, 2013

Improvement and Performance Evaluation for Multimedia Files Transmission in Vehicle-Based DTNs.
Int. J. Distributed Sens. Networks, 2013

Efficient Deterministic Anchor Deployment for Sensor Network Positioning.
Int. J. Distributed Sens. Networks, 2013

Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Queuing modeling for delay analysis in mission oriented sensor networks under the protocol interference model.
Proceedings of the 2nd ACM annual international workshop on Mission-oriented wireless sensor networking, 2013

Context-Aware Handoff on Smartphones.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

A cooperation incentive scheme based on coalitional game theory for sparse and dense VANETs.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

MERPL: A more memory-efficient storing mode in RPL.
Proceedings of the 19th IEEE International Conference on Networks, 2013

2012
ASM: Adaptive Voice Stream Multicast over Low-Power Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2012

The XM Satellite Radio Software Module of an Embedded Car Audio System.
J. Softw., 2012

Routing Algorithm Based on Multi-Community Evolutionary Game for VANET.
J. Networks, 2012

An Open Conformance Test System towards the Standardization of Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Nonlinear Behaviors of Gear Shifting Digital Phase Locked Loops.
Int. J. Bifurc. Chaos, 2012

GreenTech: A Case Study for Using the Web of Things in Household Energy Conservation.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Exploiting ephemeral link correlation for mobile wireless networks.
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012

NSSN: A network monitoring and packet sniffing tool for wireless sensor networks.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Poster Abstract: Smartphone Heterogeneous Network Handoff Based on the Closed Control Loop.
Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 2012

The Converged Service Oriented Architecture in Smart Home Service.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Application of Internet of Things in Power-Line Monitoring.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

2011
A case study on REST-style architecture for cyber-physical systems: Restful smart gateway.
Comput. Sci. Inf. Syst., 2011

A game based routing algorithm for congestion control of multimedia transmission in VANETs.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011

Design and Implementation of Network Management System for Large-Scale Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Demo: a sensor network time synchronization protocol based on fm radio data system.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Exploiting FM radio data system for adaptive clock calibration in sensor networks.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Phoenix: Peer-to-Peer Location Based Notification in Mobile Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

The Trajectory Exposure Problem in Location-Aware Mobile Networking.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Congestion-Aware Indoor Emergency Navigation Algorithm for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

RestThing: A Restful Web Service Infrastructure for Mash-Up Physical and Web Resources.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

2010
Mobile Scheduling for Spatiotemporal Detection in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2010

Ambient Data Collection with Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2010

A High-Accuracy Nonintrusive Networking Testbed for Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2010

Adaptive Voice Stream Multicast Over Low-Power Wireless Networks.
Proceedings of the 31st IEEE Real-Time Systems Symposium, 2010

ZiFi: wireless LAN discovery via ZigBee interference signatures.
Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, 2010

Frequency-hopping/M-ary frequency-shift keying for wireless sensor networks: Noncoherent detection and performance.
Proceedings of the 2010 7th International Symposium on Wireless Communication Systems, 2010

Optimal infostation deployment for spatio-temporal information dissemination.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Anycast routing in mobile opportunistic networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Seer: Trend-Prediction-Based Geographic Message Forwarding in Sparse Vehicular Networks.
Proceedings of IEEE International Conference on Communications, 2010

Priority Linear Coding Based Opportunistic Routing for Video Streaming in Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2010

A Prediction Based Long-Cycle Time Synchronization Algorithm for Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2009
BoSS: a moving strategy for mobile sinks in wireless sensor networks.
Int. J. Sens. Networks, 2009

NISAT: a zero-side-effect testbed for wireless sensor networks.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

QVS: Quality-Aware Voice Streaming for Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

2008
Analysis of Forwarding Mechanisms on Fine-Grain Gradient Sinking Model in WSN.
J. Signal Process. Syst., 2008

THTA: Triangle-Shaped Hierarchy Aggregation Time Allocation Algorithm for Wireless Sensor Network.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

EATA: Effectiveness based Aggregation Time Allocation algorithm for Wireless Sensor Networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

A Receiver-Based Opportunistic Forwarding Protocol for Mobile Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

2007
HUMS: An Autonomous Moving Strategy for Mobile Sinks in Data-Gathering Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2007

DAR: An energy-balanced data-gathering scheme for wireless sensor networks.
Comput. Commun., 2007

Moving Schemes for Mobile Sinks in Wireless Sensor Networks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

P2P-Leveraged Mobile Live Streaming.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
A Channel-State Aware Scheduling Mechanism for Wireless Local Area Networks.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

Performance Analysis and Resource Allocation for IEEE 802.11 based Wireless Networks.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

ESTS: An Error Statistic Based Time Synchronization Protocol for Wireless Sensor Networks.
Proceedings of the Computational Intelligence, 2006

Performance Analysis and Enhancement for Priority Based IEEE 802.11 Network.
Proceedings of IEEE International Conference on Communications, 2006

2005
A Self-adaptive Energy-Aware Data Gathering Mechanism for Wireless Sensor Networks.
Proceedings of the Advances in Intelligent Computing, 2005

Probability Based Dynamic Load-Balancing Tree Algorithm for Wireless Sensor Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
Adaptive robust TCP/IP header compression algorithm for 3G wireless networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

2003
A Reliable Region based Hierarchical Mobile Multicast Protocol for IPv6 Network.
Proceedings of the Mobile and Wireless Communications Networks, 2003


  Loading...