Yan Lindsay Sun

Orcid: 0000-0002-9582-1578

Affiliations:
  • University of Rhode Island, Department of Electrical, Computer and Biomedical Engineering, Kingston, RI, USA


According to our database1, Yan Lindsay Sun authored at least 100 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Robust Distributed Finite-time Secondary Frequency Control of Islanded AC Microgrids With Event-Triggered Mechanism.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2023

2022
Resilient Predictor-Based Load Frequency Control for Multi-Region Power Systems Under DoS Attacks.
Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2022

EleGNN: Electrical-Model-Guided Graph Neural Networks for Power Distribution System State Estimation.
Proceedings of the IEEE Global Communications Conference, 2022

DUELMIPs: Optimizing SDN Functionality and Security.
Proceedings of the 28th International Conference on Principles and Practice of Constraint Programming, 2022

2021
Coordinated Topology Attacks in Smart Grid Using Deep Reinforcement Learning.
IEEE Trans. Ind. Informatics, 2021

Distributed Finite-Time Secondary Control for AC Microgrids With Mobile Power Resource and Communication Time-delays.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2021

2020
Joint Trajectory and Power Optimization in Multi-Type UAVs Network with Mean Field Q-Learning.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020

Efficient Resource Allocation for NOMA-MEC System in Ultra-Dense Network: A Mean Field Game Approach.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020

2019
Inhomogeneous Multi-UAV Aerial Base Stations Deployment: A Mean-Field-Type Game Approach.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

2018
Signal Processing and the Internet of Things [From the Guest Editors].
IEEE Signal Process. Mag., 2018

Prima: Probabilistic Ranking with Inter-Item Competition and Multi-Attribute Utility Function.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

2017
Communication Reliability Analysis of Wireless Sensor Networks Using Phased-Mission Model.
Qual. Reliab. Eng. Int., 2017

Fog Computing in Medical Internet-of-Things: Architecture, Implementation, and Applications.
CoRR, 2017

Fog Computing in Medical Internet-of-Things: Architecture, Implementation, and Applications.
Proceedings of the Handbook of Large-Scale Distributed Computing in Smart Healthcare, 2017

2016
Infrastructure Communication Sensitivity Analysis of Wireless Sensor Networks.
Qual. Reliab. Eng. Int., 2016

Hybrid wireless sensor networks: a reliability, cost and energy-aware approach.
IET Wirel. Sens. Syst., 2016

2015
Trust Management for Defending On-Off Attacks.
IEEE Trans. Parallel Distributed Syst., 2015

Joint Substation-Transmission Line Vulnerability Assessment Against the Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2015

A Study of Online Social Network Privacy Via the TAPE Framework.
IEEE J. Sel. Top. Signal Process., 2015

A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions.
J. Comput. Sci. Eng., 2015

Application communication reliability of wireless sensor networks.
IET Wirel. Sens. Syst., 2015

Diversity of cascading failure processes in electrical grids.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

Smart Grid Vulnerability under Cascade-Based Sequential Line-Switching Attacks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Equal rating opportunity analysis for detecting review manipulation.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
Revealing Cascading Failure Vulnerability in Power Grids Using Risk-Graph.
IEEE Trans. Parallel Distributed Syst., 2014

Resilience Analysis of Power Grids Under the Sequential Attack.
IEEE Trans. Inf. Forensics Secur., 2014

Integrated Security Analysis on Cascading Failure in Complex Networks.
IEEE Trans. Inf. Forensics Secur., 2014

Securing Digital Reputation in Online Social Media [Applications Corner].
IEEE Signal Process. Mag., 2014

Reliability and lifetime modeling of wireless sensor nodes.
Microelectron. Reliab., 2014

FiberID: molecular-level secret for identification of things.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Revealing and incorporating implicit communities to improve recommender systems.
Proceedings of the ACM Conference on Economics and Computation, 2014

The sequential attack against power grid networks.
Proceedings of the IEEE International Conference on Communications, 2014

Trust-aware privacy evaluation in online social networks.
Proceedings of the IEEE International Conference on Communications, 2014

Probabilistic ranking of multi-attribute items using indifference curve.
Proceedings of the IEEE International Conference on Acoustics, 2014

Coordinated attacks against substations and transmission lines in power grids.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks.
IEEE Trans. Mob. Comput., 2013

Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map.
IEEE Trans. Inf. Forensics Secur., 2013

Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis.
IEEE Trans. Inf. Forensics Secur., 2013

CyberSAVe: situational awareness visualization for cyber security of smart grid systems.
Proceedings of the 10th Workshop on Visualization for Cyber Security, 2013

Revealing temporal features of attacks against smart grid.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013

Can reputation manipulation boost app sales in Android market?
Proceedings of the IEEE International Conference on Acoustics, 2013

Application Communication Reliability of Wireless Sensor Networks Supporting K-coverage.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

2012
On Design and Implementation of Neural-Machine Interface for Artificial Legs.
IEEE Trans. Ind. Informatics, 2012

Security of Online Reputation Systems: The evolution of attacks and defenses.
IEEE Signal Process. Mag., 2012

A Technical Revolution: Social Learning and Networking [From the Guest Editors].
IEEE Signal Process. Mag., 2012

Load distribution vector based attack strategies against power grid systems.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Predictability trust for Wireless Sensor Networks to provide a defense against On/off attack.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

2011
Defending Multiple-User-Multiple-Target Attacks in Online Reputation Systems.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Risk-Aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid.
Proceedings of the Global Communications Conference, 2011

Trust sensor interface for improving reliability of EMG-based user intent recognition.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

2010
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses.
IEEE Trans. Knowl. Data Eng., 2010

TEA: transmission error approximation for distance estimation between two Zigbee devices.
Int. J. High Perform. Comput. Netw., 2010

Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks.
EURASIP J. Adv. Signal Process., 2010

Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Integrating neuromuscular and cyber systems for neural control of artificial legs.
Proceedings of the ACM/IEEE 1st International Conference on Cyber-Physical Systems, 2010

Cross-Layer Attack and Defense in Cognitive Radio Networks.
Proceedings of the Global Communications Conference, 2010

Enhancing personalized ranking quality through multidimensional modeling of inter-item competition.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
Securing rating aggregation systems using statistical detectors and trust.
IEEE Trans. Inf. Forensics Secur., 2009

Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models, and Attack Generator.
J. Comput. Sci. Technol., 2009

Distributed Cooperative Transmission with Unreliable and Untrustworthy Relay Channels.
EURASIP J. Wirel. Commun. Netw., 2009

Defending online reputation systems against collaborative unfair raters through signal modeling and trust.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

User behavior modeling in peer-to-peer file sharing networks: Dissecting download and removal actions.
Proceedings of the IEEE International Conference on Acoustics, 2009

CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Attack-proof collaborative spectrum sensing in cognitive radio networks.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

2008
Defense of trust management vulnerabilities in distributed networks.
IEEE Commun. Mag., 2008

RepTrap: a novel attack on feedback-based reputation systems.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Modeling Attack Behaviors in Rating Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Cooperative Transmission for Underwater Acoustic Communications.
Proceedings of IEEE International Conference on Communications, 2008

Securing Time-Synchronization Protocols in Sensor Networks: Attack Detection and Self-Healing.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Detection of collusion behaviors in online reputation systems.
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008

2007
Hierarchical group access control for secure multicast communications.
IEEE/ACM Trans. Netw., 2007

Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes.
IEEE Trans. Inf. Forensics Secur., 2007

Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes.
IEEE Trans. Dependable Secur. Comput., 2007

Securing Cooperative Transmission in Wireless Communications.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Building Trust in Online Rating Systems Through Signal Modeling.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

Trust Establishment in Distributed Networks: Analysis and Modeling.
Proceedings of IEEE International Conference on Communications, 2007

Self-Learning Cooperative Transmission - Coping with Unreliability Due to Mobility, Channel Estimation Errors, and Untrustworthy Nodes.
Proceedings of the Global Communications Conference, 2007

2006
Wireless network security.
Wirel. Commun. Mob. Comput., 2006

JET: dynamic join-exit-tree amortization and scheduling for contributory key management.
IEEE/ACM Trans. Netw., 2006

Information theoretic framework of trust modeling and evaluation for ad hoc networks.
IEEE J. Sel. Areas Commun., 2006

A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Energy-efficient Reliable Transmission Protocol with Outsourcing in WSNs.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Attacks on Trust Evaluation in Distributed Networks.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

2005
Channel-aware priority transmission scheme using joint channel estimation and data loading for OFDM systems.
IEEE Trans. Signal Process., 2005

HADOF: defense against routing disruptions in mobile ad hoc networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Minimization of rekeying cost for contributory group communications.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Trust modeling and evaluation in ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
A scalable multicast key management scheme for heterogeneous wireless networks.
IEEE/ACM Trans. Netw., 2004

Transmit diversity techniques for multicasting over wireless networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Securing Dynamic Membership Information in Multicast Communications.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Scalable Hierarchical Access Control in Secure Group Communications.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Dynamic Join-Exit Amortization and Scheduling for Time-Efficient Group Key Agreement.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

2003
Multi-layer key management for secure multimedia multicast communications.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

Channel aware unequal error protection for image transmission over broadband wireless LAN.
Proceedings of the 2003 International Conference on Image Processing, 2003

Topology-aware key management schemes for wireless multicast.
Proceedings of the Global Telecommunications Conference, 2003

Securing dynamic group membership information over multicast: attacks and immunization.
Proceedings of the Global Telecommunications Conference, 2003

2002
A joint channel estimation and unequal error protection scheme for video transmission in OFDM systems.
Proceedings of the 2002 International Conference on Image Processing, 2002

A time-efficient contributory key agreement scheme for secure group communications.
Proceedings of the IEEE International Conference on Communications, 2002

An efficient key management scheme for secure wireless multicast.
Proceedings of the IEEE International Conference on Communications, 2002

A joint channel estimation and unequal error protection scheme for image transmission in wireless OFDM systems.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002


  Loading...