Yixin Sun

Orcid: 0000-0001-6650-4373

According to our database1, Yixin Sun authored at least 37 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Game Model Analysis of the International Digital Service Tax in an Asymmetric Market Duopoly.
Int. J. Fuzzy Syst. Appl., 2024

RKLD: Reverse KL-Divergence-based Knowledge Distillation for Unlearning Personal Information in Large Language Models.
CoRR, 2024

Deciphering the Digital Veil: Exploring the Ecosystem of DNS HTTPS Resource Records.
CoRR, 2024

A Prototype Preceding Vehicle Identification System Development and Field Evaluation.
Proceedings of the 10th International Conference on Vehicle Technology and Intelligent Transport Systems, 2024

Intercepting Bluetooth Traffic from Wearable Health Devices.
Proceedings of the IEEE Security and Privacy, 2024

Applied Research on Energy System Efficiency Improvement Based on Energy Digital Economy Technology.
Proceedings of the 2024 International Conference on Power Electronics and Artificial Intelligence, 2024

Exploring the Ecosystem of DNS HTTPS Resource Records: An End-to-End Perspective.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

Mutual TLS in Practice: A Deep Dive into Certificate Configurations and Privacy Issues.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

2023
A Unifying Approach to Boundaries and Multidimensional Mereotopology.
Proceedings of the Joint Ontology Workshops 2023 Episode IX: The Quebec Summer of Ontology co-located with the 13th International Conference on Formal Ontology in Information Systems (FOIS 2023), 2023

A Novel Cross-organization Privacy Protection Method Based on Federated Learning.
Proceedings of the 2023 6th International Conference on Information Management and Management Science, 2023

Process Predictive Monitoring Based on Federated Learning: Challenges and Architecture Proposal.
Proceedings of the 2023 6th International Conference on Information Management and Management Science, 2023

Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the Wild.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Creating a Secure Underlay for the Internet.
Proceedings of the 31st USENIX Security Symposium, 2022

RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Securing internet applications from routing attacks.
Commun. ACM, 2021

Understanding the Blockchain Ecosystem with Analysis of Decentralized Applications: an Empirical Study.
Proceedings of the ICMSS 2021: The 5the International Conference on Management Engineering, 2021

3D-Adv: Black-Box Adversarial Attacks against Deep Learning Models through 3D Sensors.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

Adaptive replanning and control for magnetic microrobots tracking despite unknown blood velocity.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

2020
Enhancing Anonymity Systems under Network and User Dynamics
PhD thesis, 2020

Influence of Murder Incident of Ride-hailing Drivers on Ride-hailing User's Consuming Willingness in Nanchang.
CoRR, 2020

Development of a four-point adjustable lifting crawler chassis and experiments in a combine harvester.
Comput. Electron. Agric., 2020

Open the Pod Bay Door: Using Ontology to Understand Instructions.
Proceedings of the Joint Ontology Workshops co-located with the Bolzano Summer of Knowledge (BOSK 2020), 2020

Detecting Malware Injection with Program-DNS Behavior.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor.
Proc. Priv. Enhancing Technol., 2019

Countering Malicious Processes with Process-DNS Association.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Output Feedback Synthesis for a Two-Agent Nonlinear Microrobotic System.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

2018
Tempest: Temporal Dynamics in Anonymity Systems.
Proc. Priv. Enhancing Technol., 2018

Bamboozling Certificate Authorities with BGP.
Proceedings of the 27th USENIX Security Symposium, 2018

Interchange of criminal rules between CLRL and LKIF.
Proceedings of 2018 International Conference on Mathematics and Artificial Intelligence, 2018

EEG markers of STEM learning.
Proceedings of the IEEE Frontiers in Education Conference, 2018

2017
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

AGRA: An Analysis-Generation-Ranking Framework for Automatic Abbreviation from Paper Titles.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

2016
Representation of Chinese criminal law in the semantic web.
Proceedings of the 12th International Conference on Natural Computation, 2016

2015
RAPTOR: Routing Attacks on Privacy in Tor.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
A flexible capacitive tactile sensing array for pressure measurement.
Proceedings of the 2014 IEEE International Conference on Robotics and Biomimetics, 2014

2013
Gutter design and selection for roof rainwater catchment systems.
Proceedings of the 2013 IEEE Global Humanitarian Technology Conference, 2013


  Loading...