URI
Think Big, We Do.
Rhode Island Seal

Publications

Book

Network-Aware Security for Group Communications
Yan Sun, Wade Trappe, K. J. Ray Liu, “Network-Aware Security for Group Communications”, ISBN 978-0-387-68846-6, Springer, Oct. 2007
Book Chapter

Yan Sun and Zhu Han, “Trusted Cooperative Transmission: Turn a Security Weakness into Security Enhancement”, in Securing Wireless Communications at the Physical Layer, Eds, Wade Trappe and Ruoheng Liu, ISBN 978-1-4419-1384-5, Springer, 2010.

Journal Papers

  1. Yihai Zhu, Jun Yan, Yufei Tang, Yan (Lindsay) Sun, Haibo He, “Joint Substation-Transmission line Vulnerability Assessment against the Smart Grid”, accepted, IEEE Trans. on Information Forensics and Security (TIFS), acceptance notified in Oct 2014
  2. Yihai Zhu, Jun Yan, Yufei Tang, Yan (Lindsay) Sun, Haibo He, “Resilience Analysis of Power Grids under the Sequential Attack”, accepted, IEEE Trans. on Information Forensics and Security (TIFS), acceptance notified in Oct 2014
  3. Amari Zonouz, Liudong Xing, Vinod Vokkarane, Yan (Lindsay) Sun, “Reliability-Oriented Single-Path Routing Protocols in Wireless Sensor Networks”, IEEE Sensors Journal, Vol 14, No. 11, pp 4059-4068, June 2014. (One of the 25 most downloaded Sensors Journal papers in the month of July 2014, certified by IEEE Sensors Council)
  4. Amari Zonouz, Liudong Xing, Vinod Vokkarane, Yan (Lindsay) Sun, “Application Communication Reliability of Wireless Sensor Networks,” IET Wireless Sensor Systems, in press, doi: 10.1049/iet-wss.2013.0107
  5. Younghun Chae, Lisa DiPippo, Yan (Lindsay) Sun, “Trust Management for Defending On-off Attacks”, IEEE Transactions on Parallel and Distributed Systems, in press, dol: doi:10.1109/TPDS.2014.2317719
  6. Jun Yan, Yufei Tang, Haibo He, and Yan (Lindsay) Sun, “Cascading Failure Analysis with DC Power Flow Model and Transient Stability Analysis”, IEEE Transactions on Power Systems, Vol. pp, No. 90, pp 1-13, May 2014.
  7. Yihai Zhu, Jun Yan, Yan (Lindsay) Sun, Haibo He, “Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph”, IEEE Trans. on Parallel and Distributed Systems, Vol pp, No. 99, pp 1-12, January 2014
  8. Jun Yan, Haibo He, Yan (Lindsay) Sun, “Integrated Security Analysis on Cascading Failure in Complex Networks”, IEEE Transactions on Information Forensics and Security, Vol 9, No. 3, pp 451-463, March 2014.
  9. Chaonan Wang, Liudong Xing, Vinod M. Vokkarane, and Yan (Lindsay) Sun, “Reliability and Lifetime Modeling of Wireless Sensor Nodes”, Microelectronics Reliability, Vol 54, No. 1, pp 160-166, January 2014.
  10. Yuhong Liu and Yan (Lindsay) Sun, “Securing Digital Reputation in Online Social Media”, IEEE Signal Processing Magazine, Vol 31, No. 1, pp 149 – 155, January, 2014.
  11. Jun Yan, Yihai Zhu, Haibo He, and Yan (Lindsay) Sun “Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map”, IEEE Transactions on Information Forensics & Security, Vol 8, No. 4, pp 646-656, April 2013.
  12. Yuhong Liu, Yan (Lindsay) Sun, Siyuan Liu, and Alex C. Kot, “Securing Online Reputation Systems through Trust Modeling and Temporal Analysis”, IEEE Transactions on Information Forensics and Security, special issue on Privacy and Trust Management in Cloud and Distributed Systems, Vol 8, No. 6, pp.936-948, June 2013.
  13. Zhou Yuan, Zhu Han, Yan (Lindsay) Sun, Husheng Li and Jubin Song, “Routing-Toward-Primary-User Attack and Belief Propagation Based Defense in Cognitive Radio Networks”, IEEE Transactions on Mobile Computing, Vol. 12, No. 9, pp1750-1760, September 2013.
  14. Yan (Lindsay) Sun and Yuhong Liu, “Security of Online Reputation Systems: Evolution of Attacks and Defenses”, IEEE Signal Processing Magazine, Vol. 29. No. 2, pp.87-97, March 2012.
  15. Akhilesh Shrestha, L. Xing, Yan Sun, and Vinod M. Vokkarane, “Infrastructure Communication Reliability of Wireless Sensor Networks Considering Common-Cause Failures,” International Journal of Performability Engineering, special issue on Dependability of Wireless Systems and Networks, Vol. 8, No. 2, pp. 141-150, March 2012.
  16. Chaonan Wang*, L. Xing, Vinod Vokkarane, and Yan Sun, “Reliability of Wireless Sensor Networks with Tree Topology,” International Journal of Performability Engineering, Vol. 8, No. 2, pp. 213-216, March 2012.
  17. Makeyev O., Liu X., Luna-Munguía H., Rogel-Salazar G., Mucio-Ramirez S., Liu Y., Sun Y., Kay S., Besio W., “Toward a noninvasive automatic seizure control system in rats with transcranial focal stimulations via tripolar concentric ring electrodes”, IEEE Transactions on Neural Systems and Rehabilitation Engineering, Vol 20, No. 4, pp. 422-431, July 2012.
  18. Makeyev O., Liu X., Luna-Munguía H., Rogel-Salazar G., Mucio-Ramirez S., Liu Y., Sun Y., Hadidi R., Kay S., Besio W.,”Toward an automatic seizure control system in rats through transcranial focal stimulation via tripolar concentric ring electrodes”, Epilepsy Currents, Vol. 12, Issue s1, January/February 2012, pp. 29-30
  19. Xiaorong Zhang, Yuhong Liu, Fan Zhang, Jin Ren, Yan Sun, Qing Yang, and Huang He, “On Design and Implementation of Neural-Machine Interface for Artificial Legs“, accepted, IEEE Transactions on Industrial Informatics, 2012.
  20. He Huang, Fan Zhang, Yan Sun and Haibo He, “Design of a Robust EMG Sensing Interface for Pattern Classification“, Journal of Neural Engineering, Vol. 7, No. 5, 2010.
  21. Qinyuan Feng, Yan Sun, Ling Liu, Yafei Yang, and Yafei Dai, “Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses“, IEEE Transactions on Knowledge & Data Engineering, Vol. 22, No. 12, pp. 1766-1780, December 2010.
  22. Wenkai Wang, Husheng Li, Yan Sun, and Zhu Han, “Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks“, EURASIP Journal on Advances in Signal Processing, vol. 2010, Article ID 695750, 2010 (in press)
  23. L. Xing, P. Boddu, Yan Sun, and W. Wang, “Reliability Analysis of Static and Dynamic Fault-Tolerant Systems subject to Probabilistic Common-Cause Failures“, Proc IMechE, Part O: Journal of Risk and Reliability, Vol. 224, No. 1, pp.43-53, 2010.
  24. Yafei Yang, Yan Sun, Steven Kay, and Qing Yang, “Securing Rating Aggregation Systems using Statistical Detectors and Trust“, IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, pp.883-898, Dec. 2009.
  25. Zhu Han and Yan Sun, “Distributed Cooperative Transmission with Unreliable and Distrustful Relay Channels”, EURASIP Journal on Wireless Communications and Networking, EURASIP Vol. 2009, Article ID 740912, 2009.
  26. Yafei Yang, Qinyuan Feng, Yan Sun and Yafei Dai, “Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models and Attack Generator”, Journal of Computer Science Technology, Special Issues on Trust and Reputation Management in Future Computing Systems and Applications, vol. 24, no. 5, pp. 855-865, September 2009.
  27. Yan Sun, Zhu Han, and K. J. Ray Liu, “Defense of Trust Management Vulnerabilities in Distributed Networks”, IEEE Communications Magazine, Feature Topic on Security in Mobile Ad Hoc and Sensor Networks, Vol 46, no 2, pp112-119, Feb 2008.
  28. Yan Sun, and K. J. Ray Liu, “Hierarchical Group Access Control for Secure Multicast Communications”, IEEE/ACM Transactions on Networking, vol. 15, Issue 6, pp1514-1526, Dec. 2007.
  29. Yan Sun and K. J. Ray Liu, “Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes”, IEEE Transactions on Information Forensics and Security, vol.2, Issue 2, pp 213-226, June, 2007.
  30. Wei Yu, Yan Sun, and K. J. Ray Liu, “Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes”, IEEE Trans. on Dependable and Secure Computing, vol 4. No. 3, pp228-242, July-Sept 2007.
  31. Yan Sun, Wei Yu, Zhu Han, and K. J. Ray Liu, “Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks”, IEEE JSAC special issue on security in wireless ad hoc networks, Vol 24, no.2, February, 2006.
  32. Y. Mao, Yan Sun, Min Wu, and K. J. Ray Liu, “JET: Dynamic Joint-Exist-Tree Amortization and Scheduling for Contributory Key Agreement”, IEEE/ACM Transactions on Networking, vol 14, issue 5, pp 1128-1140, Oct 2006.
  33. Charles Pandana, Yan Sun and K. J. Ray Liu, “Channel-Aware Priority Transmission scheme using Joint Channel Estimation and Data Loading over OFDM systems”, IEEE Transactions on Signal Processing, Vol. 53, pp 3297-3310, August, 2005.
  34. Yan Sun, Wade Trappe, and K. J. Ray Liu, “A Scalable Multicast Key Management Scheme for Heterogeneous Wireless Networks”, Vol. 12, No.4, pp 653-666, IEEE/ACM Transactions on Networking, August 2004.

Under Review:

  • Yuhong Liu, Yan Sun, Jungwoo Ryoo, Syed Rizvi, Athanasios Vasilakos, ”A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions”, IEEE Transactions on Cloud Computing, submitted in Oct 2014
  • Chaonan Wang, Amir Zonouz, Liudong Xing, Vinod Vokkarane, Yan (Lindsay) Sun, “Communication Reliability Analysis of Wireless Sensor Networks Using Phased-Mission Model”, IEEE Transactions on Industrial Informatics, submitted in Aug 2014

[Refereed Conference Papers]
Recent Publications (not considered in the previous promotion)

  1. Amir Zonouz, Liudong Xing, Vinod Vokkarane, and Yan Sun, “Reliability Based Optimization in Hybrid Wireless Sensor Networks “, in proc. 2015 Annual Reliability and Maintainability Symposium (RAMS), Palm Harbor, FL, Jan 26-29, 2015
  2. Yihai Zhu, Jun Yan, Yufei Tang, Yan (Lindsay) Sun, and Haibo He, “Coordinated Attacks against Substations and Transmission Lines in Power Grids”, in proc, IEEE Global Communications Conference (GlobalCom’14), Austin TX, December 8-12, 2014
  3. Zhen Chen, Yongbo Zeng, Gerald Hefferman,Yan (Lindsay) Sun, Tao Wei, “FiberID: Molecular-level Secret for Identification of Things”, in proc. IEEE Workshop on Information Forensics and Security (WIFS’14), Altalanta GA, Dec 3-5 2014
  4. Euijin Cho , Ting Yu, Min Chi, Yan (Lindsay) Sun, “Revealing Implicit Communities to Incorporate into Recommender Systems”, 15 th ACM Conference on Economics and Computation (EC’14), Palo Alto, June 8-12, 2014
  5. Yihai Zhu, Jun Yan, Yufei Yang, Yan (Lindsay) Sun, and Haibo He, “The Sequential Attack against Power Grid Networks”, to appear, in Proc. 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, June 2014 (Best Paper Award)
  6. Yongbo Zeng, Yan (Lindsay) Sun, Liudong Xing, and Vinod M. Vokkarane, “Trust-Aware Privacy Evaluation in Online Social Networks”,in Proc. 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, June 2014
  7. Xiaohui Gong, H. Vicky Zhao, Yan Lindsay Sun, “Probabilistic ranking of multi-attribute items using indifference curve”, to appear, in Proc. the 39th International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, May 2014
  8. Amir Ehsani Zonouz, Liudong Xing, Vinod. M. Vokkarane, and Yan Lindsay Sun, “A Time-Dependent Link Failure Model for Wireless Sensor Networks,” Annual Reliability & Maintainability Symposium, Colorado Springs, CO, January 27-30, 2014
  9. Chaonan Wang, Liudong Xing, Vinod. M. Vokkarane, and Yan Lindsay Sun, “A Phased-Mission Framework for Communication Reliability in WSN,” Annual Reliability & Maintainability Symposium, Colorado Springs, CO, January 27-30, 2014
  10. William J. Matuszak, Lisa DiPippo, Yan Lindsay Sun, CyberSAVe – Situational Awareness Visualization for Cyber Security of Smart Grid Systems, in proc. 10th International Symposium on Visualization for Cyber Security (VizSec), Atlanta, Georgia, October 14, 2013
  11. Yuhong Liu, Yan Lindsay Sun, “Can Reputation Manipulation Boost App sales in Android Market? ” , in Proc. the 38th International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Vancouver, Canada, May 2013
  12. Amir Ehsani Zonouz, Liudong Xing, Vinod M. Vokkarane, and Yan Lindsay Sun, “Application Communication Reliability of Wireless Sensor Networks Supporting K-coverage,” Proc. of 2013 IEEE International Conference on Distributed Computing in Sensor Systems, Cambridge, Massachusetts, USA, pp. 430-435, May 2013.
  13. Jun Yan, Yihai Zhu, Haibo He, and Yan (Lindsay) Sun, “Revealing Temporal Features of Attacks against Smart Grid,” in Proc. IEEE Innovative Smart Grid Technologies Conference (ISGT’13), Washington DC, February, 2013.
  14. Yihai Zhu, Jun Yan, Yan (Lindsay) Sun, Haibo He, “Risk-Aware Vulnerability Analysis of Electric Grids from Attacker’s Perspective”, in Proc. IEEE Innovative Smart Grid Technologies Conference (ISGT’13), Washington DC, February, 2013.
  15. Chaonan Wang, Liudong Xing, Vinod M. Vokkarane, and Yan Lindsay Sun, “Reliability Modeling of Wireless Sensors,” Proc. of the Annual Reliability & Maintainability Symposium, Orlando, FL , January 2013
  16. Yihai Zhu, Yan (Lindsay) Sun, and Haibo He, “Load Distribution Vector Based Attack Strategies against Power Grid Systems”, IEEE GLOBECOM 2012, Dec. 2012
  17. Yuhong Liu, Yan (Lindsay) Sun, Siyuan Liu, and Alex C. Kot,”Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model”, poster presentation, 2012 Annual Computer Security Applications Conference (ACSAC), Orlando, Florida, Dec 3-7, 2012.
  18. Younghun Chae, Lisa Cingiser DiPippo1, Yan Lindsay Sun “Predictability Trust for Wireless Sensor Networks to provide a defense against On/off attack”, in Proc. CollaborateCom(2012), Pittsburgh, Oct. 2012.
  19. Wenkai Wang, Yan (Lindsay) Sun, and Haibo He, “Topological Analysis of Cascading Failures in Bay Area Power Grid”, in proc. 2012 IEEE PES General Meeting, 22 – 26 July 2012, San Diego, CA, USA.
  20. Amir Ehsani Zonouz, Liudong Xing, Vinod M.Vokkarane, and Yan (Lindsay) Sun, “K-coverage Reliability Evaluation for Wireless Sensor Networks,” The 18th ISSAT International Conference on Reliability and Quality, Boston, MA, July 2012.
  21. Chaonan Wang, L. Xing, Vinod M. Vokkarane, and Yan Sun, “Reliability Analysis of Wireless Sensor Networks using Different Network Topology Characteristics,” International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE2012), Chengdu, China, June 2012.
  22. Haibo He, Jun Yan, Yida Yang, and Yan Sun, “Evaluating complex network vulnerability using self-organizing map”, 16th International Conference on Cognitive and Neural Systems (ICCNS), May-June, 2012.
  23. Jun Yan, Yida Yang, Wenkai Wang, Haibo He, Yan Sun, “An Integrated Visualization Approach for Smart Grid Attacks”, International Conference on Intelligent Control and Information Processing (ICICIP 2012), Dalian, China, July 2012.
  24. Wenkai Wang, Qian Cai, Yan Sun, and Haibo He, “Risk-aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid”, to appear, in Proc. IEEE Global Communication Conference (Globecom’11), Houston TX, December 2011.
  25. Yuhong Liu and Yan Sun, “Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network”, Poster Track, IEEE Intl. Workshop on Information Forensics and Security (WIFS’11), Brazil, Nov. 29th-Dec. 2nd, 2011.
  26. Yuhong Liu, Yan Sun, Ting Yu, “Defending Multiple-user-multiple-target Attacks in Online Reputation Systems”, in proc. the Third IEEE International Conference on Social Computing (Socialcom’11, acceptance rate 10%), Oct. 9-11, 2011, Boston, U.S.A
  27. Yuhong Liu, Fan Zhang, Yan (Lindsay) Sun, He Huang, “Trust Sensor Interface for Improving Reliability of EMG-based User Intent Recognition”, in proc. the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC’11), Boston, MA, Aug-Sept, 2011.
  28. W.G. Besio, X. Liu, Y. Liu, Y.L. Sun, A.V. Medvedev, and K. Koka, “Algorithm for Automatic Detection of Pentylenetetrazole-Induced Seizures in Rat”, in proc. the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC’11), Boston, MA, Aug-Sept, 2011.
  29. Wenkai Wang, Yan Sun, Husheng Li, and Zhu Han, “Cross-Layer Attack and Defense in Cognitive Radio Networks”, in Proc. IEEE Global Communication Conference (Globecom’10), Miami, FL, December 2010.
  30. H. Huang, Y. Sun, Q, Yang, F. Zhang, X Zhang, Y. Liu, J. Ren, F. Sierra, “Integrating neuromuscular and cyber systems for neural control of artificial legs”, in Proceeding of First ACM/IEEE International Conference on Cyber-Physical Systems, Stockholm, Sweden, pp. 129-138, 2010.
  31. Qinyuan Feng, Ling Liu, Yan Lindsay Sun, Ting Yu, Yafei Dai, “Enhancing Personalized Ranking Quality through Multidimensional Modeling of Inter-item Competition”, in Proc. 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom2010), October 2010.
  32. Yuhong Liu and Yan Lindsay Sun, “Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis”, in Proc. IEEE International Conference on Social Computing (SocialCom2010, acceptance rate 11%), August 2010. (Best Paper Award)

More Publications:
Topic: Trust and Reputation Systems; Security and Privacy

  1. Qinyuan Feng, Yu Wu, Yan Lindsay Sun, Jing Jiang, Yafei Dai, “User Behavior Modeling in Peer-to-Peer File Sharing Networks: Dissecting Download and Removal Actions”, in Proc. 34th International Conference on Acoustics, Speech, and Signal Processing (ICASSP’09), 2009.
  2. Weijun Xiao, He Huang, Yan Sun, and Qing Yang, “Promise of Embedded System with GPU in Artificial Leg Control: Enabling Time-frequency Feature Extraction from Electromyography”, the 31st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS), September 2009.
  3. Yuhong Liu, Yafei Yang, and Yan Lindsay Sun,” Detection of Collusion Behaviors in Online Reputation Systems”, in Proc. Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, October 2008
  4. Yafei Yang, Yan Sun, Steven Kay, and Qing Yang, “Defending Online Reputation Systems against Collaborative Unfair Raters through Signal Modeling and Trust”, in Proc. 24th ACM Symposium on Applied Computing (ACM SAC’09), Honolulu, HI, March 8 – 12 2009.
  5. Yafei Yang, Qinyuan Feng, Yan Sun and Yafei Dai, “Reputation Trap: An Powerful Attack on Reputation System of File Sharing P2P Environment”, in Proc. 4th International Conference on Security and Privacy in Communication Networks (SecureComm’08, acceptance ratio 20%), Istanbul, Turkey, September 2008.
  6. Qinyuan Feng, Yafei Yang, Yan Sun, and Yafei Dai, “Modeling Attack Behaviors in Rating Systems (invited paper)”, in Proc. ICDCS Workshop, 2nd International Workshop on Trust and Reputation Management in Massively Distributed Computing Systems (IEEE TRAM’08), Beijing, China, July 2008.
  7.  Yafei Yang, Yan Sun, Jin Ren and Qing Yang, “Building Trust in Online Rating Systems through Signal Modeling”, in Proc. ICDCS Workshop, 1st International Workshop on Trust and Reputation Management in Massively Distributed Computing Systems (IEEE TRAM’07), Toronto, Canada, June 2007.
  8. Yan Sun and Yafei Yang, “Trust Establishment in Distributed Networks: Analysis and Modeling”, in Proc. IEEE International Conference on Communications (ICC’07), Glasgow, Scotland, June 2007.
  9. Yan Sun, Zhu Han, Wei Yu, and K. J. Ray Liu, “A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense against Attacks”, in Proc. IEEE INFOCOM’06, (18% acceptance ratio), Barcelona, April 2006.
  10. Yan Sun, Zhu Han, Wei Yu and K.J. Ray Liu, “Attacks on Trust Evaluation in Distributed Networks”, in Proc. IEEE 40th Annual Conference on Information Science and Systems (CISS’06), Princeton, NJ, March 2006.
  11. Yan Sun, Wei Yu, Zhu Han, and K. J. Ray Liu, “Trust Modeling and Evaluation in Ad hoc Networks”, in Proc. IEEE Global Communication Conference (Globecom’05), St. Louis, MO, November-December 2005.

Topic: Wireless Communications and Networking; Security

  1. Wenkai Wang, Husheng Li, Yan Sun, Zhu Han, “CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing”, in Proc. IEEE Global Communication Conference (Globecom’09), Honolulu, HI, November-December 2009.
  2. Wenkai Wang, Husheng Li, Yan Sun, and Zhu Han, “Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks”, in Proc. 43rd Annual Conference on Information Science and Systems (CISS’09), Baltimore MD, March 2009.
  3. Liudong Xing, Prashanthi Boddu, and Yan Sun, “System Reliability Analysis Considering Fatal and Non-Fatal Shocks”, in Proc. 55th Annual Reliability & Maintainability Symposium, Fort Worth, TX, January 2009.
  4. Yafei Yang and Yan Sun, “Securing Time-synchronization Protocols in Sensor Networks: Attack Detection and Self-healing”, in Proc. IEEE Global Communication Conference (Globecom’08), New Orleans, LA, November-December 2008.
  5. Zhu Han and Yan Sun, “Wave Cooperative Transmission Protocol for Underwater Acoustic Communications”, in Proc. IEEE International Conference on Communications (ICC’08), Beijing China, May 2008.
  6. Zhu Han and Yan Sun, “Self-Learning Cooperative Transmission-Coping with Unreliability due to Mobility, Channel Estimation Errors, and Untrustworthy Nodes”, in Proc. IEEE Global Communication Conference (Globecom’07), Washington DC, December 2007.
  7. Zhu Han and Yan Sun, “Securing Cooperative Transmission in Wireless Communications”, in Proc. 1st ACM Workshop on Security for Emerging Ubiquitous Wireless Networks, Philadelphia, PA, August 2007.
  8. Yafei Yang and Yan Sun, “PETO: Power-Efficient Transmission with Outsourcing in Wireless Sensor Networks”, in Proc. IEEE Global Communication Conference (Globecom’06), San Francisco, CA, December 2006.
  9. Weijun Xiao, Yan Sun, Yinan Liu, and Qing Yang, “TEA: Transmission Error Approximation for Distance Estimation between Two Zigbee Devices”, in Proc. International Workshop on Networking, Architecture and Storage (IWNAS’06), Shengyang, China, August 2006.
  10. Wei Yu, Yan Sun, and K.J. Ray Liu, “HADOF: Defense against Routing Disruptions in Mobile Ad Hoc Networks”, in Proc. IEEE INFOCOM’05, (17% acceptance ratio), Miami, FL, March 2005.
  11. Yan Sun, and K. J. Ray Liu, “Transmit Diversity Techniques for Multicasting over Wireless Networks”, in Proc. IEEE Wireless Communications and Networking Conference (WCNC’04), Atlanta, GA, March 2004.
  12. C. Pandana, Yan Sun, and K.J. Ray Liu, “Channel Aware Unequal Error Protection for Image Transmission over Broadband Wireless LAN”, in Proc. IEEE Int. Conf. on Image Processing (ICIP’03), Barcelona, Spain, September 2003.
  13. Yan Sun, and K. J. Ray Liu, “Multi-layer Management for Secure Multimedia Multicast Communications”, in Proc. IEEE International Conferences on Multimedia and Expo (ICME’03), Vol II, pp 205-208, Baltimore, MD, July 2003.
  14. Yan Sun, C. Pandana, Xiaowen Wang, and K.J. Ray Liu, “A Joint Channel Estimation and Unequal Error Protection Scheme for Image Transmission in Wireless OFDM Systems”, in Proc. IEEE International Workshop on Multimedia Signal Processing (MMSP’02), St. Thomas, US Virgin Islands, Dec. 2002.
  15. Yan Sun, Xiaowen Wang, K.J. Ray Liu, “A Joint Channel Estimation and Unequal Error Protection Scheme for Video Transmission in OFDM Systems”, in Proc. IEEE Int. Conf. on Image Processing (ICIP’02), Vol1, pp 549-552, Rochester, NY, Sep. 2002.

Topic: Key Management and Secure Group Communications

  1. Wei Yu, Yan Sun, and K. J. Ray Liu, “Minimization of Rekeying Cost for Contributory Group Communications”, in Proc. IEEE Global Communication Conference (Globecom’05), St. Louis, MO, November-December 2005.
  2. Yan Sun, and K. J. Ray Liu, “Securing Dynamic Membership Information in Multicast Communications”, in Proc. IEEE INFOCOM’04 (18% acceptance ratio), Hong Kong , March 2004.
  3. Yan Sun, and K. J. Ray Liu, “Scalable Hierarchical Access Control in Secure Group Communications”, in Proc. IEEE INFOCOM’04 (18% acceptance ratio), Hong Kong, March 2004.
  4. Yinian Mao, Yan Sun, Min Wu and K. J. Ray Liu, “Dynamic Join and Exit Amortization and Scheduling for Time-Efficient Group Key Agreement”, in Proc. IEEE INFOCOM’04 (18% acceptance ratio), Hong Kong, March 2004.
  5. Yan Sun, and K.J. Ray Liu, “Securing Dynamic Group Membership Information over Multicast: Attacks and Immunization”, in Proc. IEEE Global Communication Conference (Globecom’03), San Francisco, CA, December 2003.
  6. Yan Sun, Wade Trappe, and K.J. Ray Liu, “Topology-aware Key Management Schemes for Wireless Multicast”, in Proc. IEEE Global Communication Conference (Globecom’03), San Francisco, CA, December 2003.
  7. Yan Sun, Wade Trappe, and K.J. Ray Liu, “An Efficient Key management Scheme for Secure Wireless Multicast”, in Proc. IEEE Int. Conf. on Communication (ICC’02), pp 1236 -1240 vol 2, New York City, NY, May 2002.
  8. Bin Sun, Wade Trappe, Yan Sun, and K.J. Ray Liu, “A Time-efficient Contributory Key Agreement Scheme for Secure Group Communications”, in Proc. IEEE Int. Conf. on Communication (ICC’02), pp 1159 -1163 vol 2, New York City, NY, May 2002.

Copyright © 2019 University of Rhode Island.

The University of Rhode Island
Think Big, We Do.
A-ZDirectoryContact UsJump to top
Close