default search action
Jinyuan Sun
Person information
- affiliation: University of Tennessee, Knoxville, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i17]Shahinul Hoque, Farhin Farhad Riya, Jinyuan Sun:
HRI Challenges Influencing Low Usage of Robotic Systems in Disaster Response and Rescue Operations. CoRR abs/2401.15760 (2024) - [i16]Farhin Farhad Riya, Shahinul Hoque, Xiaopeng Zhao, Jinyuan Stella Sun:
Smart Driver Monitoring Robotic System to Enhance Road Safety : A Comprehensive Review. CoRR abs/2401.15762 (2024) - [i15]Jiangnan Li, Yingyuan Yang, Jinyuan Sun:
Risks of Practicing Large Language Models in Smart Grid: Threat Modeling and Validation. CoRR abs/2405.06237 (2024) - 2023
- [j24]Yingyuan Yang, Xueli Huang, Jiangnan Li, Jinyuan Stella Sun:
BubbleMap: Privilege Mapping for Behavior-Based Implicit Authentication Systems. IEEE Trans. Mob. Comput. 22(8): 4548-4562 (2023) - [c26]Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi:
Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids. ICCCN 2023: 1-10 - [c25]Shuai He, Anlong Ming, Yaqi Li, Jinyuan Sun, Shuntian Zheng, Huadong Ma:
Thinking Image Color Aesthetics Assessment: Models, Datasets and Benchmarks. ICCV 2023: 21781-21790 - [c24]Chengcheng Li, Wei Wang, Zhihao Jiang, Lin Zhu, Jinyuan Sun, Yilu Liu, Hairong Qi:
Early Alarm: Robust Event Analysis for Power Systems using 1-D Fully Convolutional Network. SmartGridComm 2023: 1-7 - [i14]Shahinul Hoque, Farhin Farhad Riya, Jinyuan Sun:
Deep Learning model integrity checking mechanism using watermarking technique. CoRR abs/2301.12333 (2023) - [i13]Farhin Farhad Riya, Shahinul Hoque, Jinyuan Stella Sun, Jiangnan Li:
Mitigating Adversarial Effects of False Data Injection Attacks in Power Grid. CoRR abs/2301.12487 (2023) - [i12]Mojtaba Dezvarei, Kevin Tomsovic, Jinyuan Stella Sun, Seddik M. Djouadi:
Graph Neural Network Framework for Security Assessment Informed by Topological Measures. CoRR abs/2301.12988 (2023) - 2022
- [j23]Yingyuan Yang, Jiangnan Li, Sunshin Lee, Xueli Huang, Jinyuan Sun:
EchoIA: A Cloud-Based Implicit Authentication Leveraging User Feedback. Network 2(1): 190-202 (2022) - [i11]Mojtaba Dezvarei, Kevin Tomsovic, Jinyuan Stella Sun, Seddik M. Djouadi:
Exploring Physical-Based Constraints in Short-Term Load Forecasting: A Defense Mechanism Against Cyberattack. CoRR abs/2203.03774 (2022) - 2021
- [j22]Xiangyu Niu, Hung Khanh Nguyen, Jinyuan Sun, Zhu Han:
Privacy-Preserving Computation for Large-Scale Security-Constrained Optimal Power Flow Problem in Smart Grid. IEEE Access 9: 148144-148155 (2021) - [j21]Tianxi Ji, Pan Li, Emre Yilmaz, Erman Ayday, Yanfang Ye, Jinyuan Sun:
Differentially Private Binary- and Matrix-Valued Data Query: An XOR Mechanism. Proc. VLDB Endow. 14(5): 849-862 (2021) - [j20]Qiwei Zhang, Fangxing Li, Qingxin Shi, Kevin Tomsovic, Jinyuan Sun, Lingyu Ren:
Profit-Oriented False Data Injection on Electricity Market: Reviews, Analyses, and Insights. IEEE Trans. Ind. Informatics 17(9): 5876-5886 (2021) - [c23]Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi:
ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems. AsiaCCS 2021: 52-66 - [i10]Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi:
Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids. CoRR abs/2102.09057 (2021) - 2020
- [c22]Yingyuan Yang, Xueli Huang, Yanhui Guo, Jinyuan Stella Sun:
Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices. MASS 2020: 229-237 - [c21]Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun:
SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection. SmartGridComm 2020: 1-6 - [i9]Jiangnan Li, Jin Young Lee, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic:
ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems. CoRR abs/2003.05631 (2020) - [i8]Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun:
SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection. CoRR abs/2006.03504 (2020) - [i7]Yingyuan Yang, Xueli Huang, Longfei Wu, Jinyuan Sun:
EchoIA: Implicit Authentication System Based on User Feedback. CoRR abs/2006.07676 (2020) - [i6]Yingyuan Yang, Xueli Huang, Jiangnan Li, Jinyuan Sun:
BubbleMap: Privilege Mapping for Behavior-based Implicit Authentication Systems. CoRR abs/2006.08817 (2020) - [i5]Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun:
Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks. CoRR abs/2010.09212 (2020) - [i4]Xiangyu Niu, Yifan Sun, Jinyuan Sun:
Latent Group Structured Multi-task Learning. CoRR abs/2011.11904 (2020)
2010 – 2019
- 2019
- [j19]Yingyuan Yang, Jinyuan Sun, Linke Guo:
PersonaIA: A Lightweight Implicit Authentication System Based on Customized User Behavior Selection. IEEE Trans. Dependable Secur. Comput. 16(1): 113-126 (2019) - [c20]Jiangnan Li, Xiangyu Niu, Jinyuan Stella Sun:
A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data. ICC 2019: 1-6 - [c19]Xiangyu Niu, Jiangnan Li, Jinyuan Sun, Kevin Tomsovic:
Dynamic Detection of False Data Injection Attack in Smart Grid using Deep Learning. ISGT 2019: 1-6 - 2018
- [j18]Yanmin Gong, Chi Zhang, Yuguang Fang, Jinyuan Sun:
Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing. IEEE Trans. Emerg. Top. Comput. 6(1): 110-121 (2018) - [j17]Ming Li, Weixian Liao, Xuhui Chen, Jinyuan Sun, Xiaoxia Huang, Pan Li:
Economic-Robust Transmission Opportunity Auction for D2D Communications in Cognitive Mesh Assisted Cellular Networks. IEEE Trans. Mob. Comput. 17(8): 1806-1819 (2018) - [c18]Xiangyu Niu, Yifan Sun, Jinyuan Sun:
Latent Group Structured Multi-task Learning. ACSSC 2018: 850-854 - [c17]Xiangyu Niu, Yue Tong, Jinyuan Sun:
Vulnerability Assessment for PMU Communication Networks. SmartCom 2018: 29-38 - [i3]Yingyuan Yang, Jinyuan Stella Sun:
Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices. CoRR abs/1808.00638 (2018) - [i2]Jiangnan Li, Jinyuan Stella Sun:
A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data. CoRR abs/1808.00645 (2018) - [i1]Xiangyu Niu, Jinyuan Sun:
Dynamic Detection of False Data Injection Attack in Smart Grid using Deep Learning. CoRR abs/1808.01094 (2018) - 2017
- [c16]Yingyuan Yang, Jinyuan Sun:
Energy-efficient W-layer for behavior-based implicit authentication on mobile devices. INFOCOM 2017: 1-9 - 2016
- [j16]Arun Thapa, Weixian Liao, Ming Li, Pan Li, Jinyuan Sun:
SPA: A Secure and Private Auction Framework for Decentralized Online Social Networks. IEEE Trans. Parallel Distributed Syst. 27(8): 2394-2407 (2016) - [c15]Tao Zhang, Sherman S. M. Chow, Jinyuan Sun:
Password-Controlled Encryption with Accountable Break-Glass Access. AsiaCCS 2016: 235-246 - 2015
- [j15]Honggang Wang, Roozbeh Jafari, Gang Zhou, Krishna K. Venkatasubramanian, Jinyuan Stella Sun, Paolo Bonato, Dalei Wu:
Guest Editorial Special Issue on Internet of Things for Smart and Connected Health. IEEE Internet Things J. 2(1): 1-4 (2015) - [j14]Ming Li, Sergio Salinas, Pan Li, Jinyuan Sun, Xiaoxia Huang:
MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks: Detection and Defense. IEEE Trans. Mob. Comput. 14(6): 1203-1217 (2015) - [c14]Yue Tong, Jinyuan Sun, Kai Sun, Pan Li:
Outsourcing Power System Simulations. GLOBECOM 2015: 1-6 - [c13]Xiangyu Niu, Jinyuan Sun, Husheng Li:
Network steganography based on traffic behavior in dynamically changing wireless sensor networks. ICC 2015: 7304-7309 - [c12]Yingyuan Yang, Jinyuan Stella Sun, Chi Zhang, Pan Li:
Retraining and Dynamic Privilege for Implicit Authentication Systems. MASS 2015: 163-171 - [c11]Yue Tong, Jinyuan Sun, Kai Sun:
Privacy-preserving spectral estimation in smart grid. SmartGridComm 2015: 43-48 - 2014
- [j13]Yue Tong, Jinyuan Sun, Sherman S. M. Chow, Pan Li:
Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability. IEEE J. Biomed. Health Informatics 18(2): 419-429 (2014) - [j12]Linke Guo, Chi Zhang, Jinyuan Sun, Yuguang Fang:
A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks. IEEE Trans. Mob. Comput. 13(9): 1927-1941 (2014) - [c10]Mengke Yu, Kaichen Yang, Lingbo Wei, Jinyuan Sun:
Practical private information retrieval supporting keyword search in the cloud. WCSP 2014: 1-6 - 2013
- [j11]Rui Zhang, Jinxue Zhang, Yanchao Zhang, Jinyuan Sun, Guanhua Yan:
Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking. IEEE J. Sel. Areas Commun. 31(9-Supplement): 656-668 (2013) - [j10]Yue Tong, Jordan Deyton, Jinyuan Sun, Fangxing Li:
$S^{3}A$ : A Secure Data Sharing Mechanism for Situational Awareness in The Power Grid. IEEE Trans. Smart Grid 4(4): 1751-1759 (2013) - [c9]Yue Tong, Jinyuan Sun, Sherman S. M. Chow, Pan Li:
Towards auditable cloud-assisted access of encrypted health data. CNS 2013: 514-519 - [c8]Ming Li, Pan Li, Miao Pan, Jinyuan Sun:
Economic-robust transmission opportunity auction in multi-hop wireless networks. INFOCOM 2013: 1842-1850 - 2012
- [j9]Rui Zhang, Jing Shi, Yanchao Zhang, Jinyuan Sun:
Secure Cooperative Data Storage and Query Processing in Unattended Tiered Sensor Networks. IEEE J. Sel. Areas Commun. 30(2): 433-441 (2012) - [c7]Linke Guo, Chi Zhang, Jinyuan Sun, Yuguang Fang:
PAAS: A Privacy-Preserving Attribute-Based Authentication System for eHealth Networks. ICDCS 2012: 224-233 - [c6]Rui Zhang, Yanchao Zhang, Jinyuan Sun, Guanhua Yan:
Fine-grained private matching for proximity-based mobile social networking. INFOCOM 2012: 1969-1977 - 2011
- [j8]Jinyuan Sun, Xiaoyan Zhu, Chi Zhang, Yuguang Fang:
RescueMe: Location-Based Secure and Dependable VANETs for Disaster Rescue. IEEE J. Sel. Areas Commun. 29(3): 659-669 (2011) - [j7]Miao Pan, Jinyuan Sun, Yuguang Fang:
Purging the Back-Room Dealing: Secure Spectrum Auction Leveraging Paillier Cryptosystem. IEEE J. Sel. Areas Commun. 29(4): 866-876 (2011) - [j6]Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fang:
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks. IEEE Trans. Dependable Secur. Comput. 8(2): 295-307 (2011) - [c5]Jinyuan Sun, Xiaoyan Zhu, Chi Zhang, Yuguang Fang:
HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare. ICDCS 2011: 373-382 - [c4]Rui Zhang, Yunzhong Liu, Yanchao Zhang, Jinyuan Sun:
Fast identification of the missing tags in a large RFID system. SECON 2011: 278-286 - 2010
- [j5]Chi Zhang, Jinyuan Sun, Xiaoyan Zhu, Yuguang Fang:
Privacy and security for online social networks: challenges and opportunities. IEEE Netw. 24(4): 13-18 (2010) - [j4]Jinyuan Sun, Yuguang Fang:
Cross-Domain Data Sharing in Distributed Electronic Health Record Systems. IEEE Trans. Parallel Distributed Syst. 21(6): 754-764 (2010) - [j3]Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fang:
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks. IEEE Trans. Parallel Distributed Syst. 21(9): 1227-1239 (2010) - [j2]Jinyuan Sun, Yuguang Fang, Xiaoyan Zhu:
Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. IEEE Wirel. Commun. 17(1): 66-73 (2010) - [c3]Jinyuan Sun, Xiaoyan Zhu, Yuguang Fang:
Preserving Privacy in Emergency Response Based on Wireless Body Sensor Networks. GLOBECOM 2010: 1-6 - [c2]Jinyuan Sun, Xiaoyan Zhu, Yuguang Fang:
A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation. INFOCOM 2010: 2516-2524
2000 – 2009
- 2009
- [j1]Jinyuan Sun, Yuguang Fang:
Defense against misbehavior in anonymous vehicular ad hoc networks. Ad Hoc Networks 7(8): 1515-1525 (2009) - 2008
- [c1]Jinyuan Sun, Chi Zhang, Yuguang Fang:
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks. INFOCOM 2008: 1687-1695
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint