default search action
Limin Sun 0001
Person information
- affiliation: University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- affiliation (former): Chinese Academy of Sciences, Institute of Software, Beijing, China
- affiliation (PhD 1998): National University of Defense Technology, Changsha, China
Other persons with the same name
- Limin Sun — disambiguation page
- Limin Sun 0003 — Shandong University, School of Software, Jinan, China
- Limin Sun 0004 — Hunan Network Engineering Vocational College, School of Hunan Open University, Changsha, Chin
- Limin Sun 0005 — University of Magdeburg, Department of Neurology and Center for Advanced Imaging, Magdeburg, Germany
- Li-Min Sun 0002 — Soochow University, Taipei, Taiwan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j110]Fei Lv, Hangyu Wang, Rongkang Sun, Zhiwen Pan, Shuaizong Si, Meng Zhang, Weidong Zhang, Shichao Lv, Limin Sun:
Detection of cyberattack in Industrial Control Networks using multiple adaptive local kernel learning. Comput. Secur. 148: 104152 (2025) - 2024
- [j109]Kai Yang, Qiang Li, Haining Wang, Limin Sun, Jiqiang Liu:
Fingerprinting Industrial IoT devices based on multi-branch neural network. Expert Syst. Appl. 238(Part F): 122371 (2024) - [j108]Ke Li, Haining Wang, Ming Zhou, Hongsong Zhu, Limin Sun:
Cascading Threat Analysis of IoT Devices in Trigger-Action Platforms. IEEE Internet Things J. 11(7): 12240-12251 (2024) - [j107]Zhihui Zhao, Sen Zhao, Fei Lyu, Shuaizong Si, Hongsong Zhu, Limin Sun:
RIETD: A Reputation Incentive Scheme Facilitates Personalized Edge Tampering Detection. IEEE Internet Things J. 11(8): 14771-14788 (2024) - [j106]Zedong Li, Xin Chen, Yuqi Chen, Shijie Li, Hangyu Wang, Shichao Lv, Limin Sun:
Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach. IEEE Internet Things J. 11(10): 17602-17614 (2024) - [j105]Peipei Liu, Gaosheng Wang, Hong Li, Jie Liu, Yimo Ren, Hongsong Zhu, Limin Sun:
Multi-granularity cross-modal representation learning for named entity recognition on social media. Inf. Process. Manag. 61(1): 103546 (2024) - [j104]Xiaoling Zhang, Zhengzi Xu, Shouguo Yang, Zhi Li, Zhiqiang Shi, Limin Sun:
Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-task Learning. Proc. ACM Softw. Eng. 1(FSE): 1679-1702 (2024) - [j103]Shijie Li, Yuqi Chen, Xin Chen, Zedong Li, Dongliang Fang, Kaixiang Liu, Shichao Lv, Limin Sun:
PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS. IEEE Trans. Inf. Forensics Secur. 19: 8275-8290 (2024) - [j102]Shouguo Yang, Chaopeng Dong, Yang Xiao, Yiran Cheng, Zhiqiang Shi, Zhi Li, Limin Sun:
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge. ACM Trans. Softw. Eng. Methodol. 33(1): 1:1-1:40 (2024) - [j101]Siyuan Li, Yongpan Wang, Chaopeng Dong, Shouguo Yang, Hong Li, Hao Sun, Zhe Lang, Zuxin Chen, Weijie Wang, Hongsong Zhu, Limin Sun:
LibAM: An Area Matching Framework for Detecting Third-Party Libraries in Binaries. ACM Trans. Softw. Eng. Methodol. 33(2): 52:1-52:35 (2024) - [j100]Puzhuo Liu, Yaowen Zheng, Chengnian Sun, Hong Li, Zhi Li, Limin Sun:
Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers. ACM Trans. Softw. Eng. Methodol. 33(4): 108:1-108:26 (2024) - [j99]Jinke Song, Shangfeng Wan, Min Huang, Jiqiang Liu, Limin Sun, Qiang Li:
Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild. ACM Trans. Sens. Networks 20(1): 6:1-6:26 (2024) - [c184]Peipei Liu, Hong Li, Yimo Ren, Jie Liu, Shuaizong Si, Hongsong Zhu, Limin Sun:
Hierarchical Aligned Multimodal Learning for NER on Tweet Posts. AAAI 2024: 18680-18688 - [c183]Ming Zhou, Haining Wang, Ke Li, Hongsong Zhu, Limin Sun:
Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs. EuroSys 2024: 1192-1207 - [c182]Yimo Ren, Jinfa Wang, Jie Liu, Peipei Liu, Hong Li, Hongsong Zhu, Limin Sun:
A Relation-Aware Heterogeneous Graph Transformer on Dynamic Fusion for Multimodal Classification Tasks. ICASSP 2024: 7855-7859 - [c181]Senming Yan, Lei Shi, Jing Ren, Wei Wang, Yaxin Liu, Limin Sun, Xiong Wang, Wei Zhang:
Log-Based Anomaly Detection with Transformers Pre-Trained on Large-Scale Unlabeled Data. ICC 2024: 1-6 - [c180]Chunyang Zheng, Jinfa Wang, Shuaizong Si, Zhi Li, Nan Yu, Limin Sun:
MOMR: A Threat in Web Application Due to the Malicious Orchestration of Microservice Requests. ICC 2024: 3304-3309 - [c179]Chaopeng Dong, Siyuan Li, Shouguo Yang, Yang Xiao, Yongpan Wang, Hong Li, Zhi Li, Limin Sun:
LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries. ICSE 2024: 66:1-66:12 - [c178]Yue Sun, Guowei Yang, Shichao Lv, Zhi Li, Limin Sun:
Concrete Constraint Guided Symbolic Execution. ICSE 2024: 122:1-122:12 - [c177]Laile Xi, Heng Zhang, Shenghao Lin, Weidong Zhang, Yuyan Sun, Hongsong Zhu, Limin Sun:
Enhancing Coverage in Stateful Protocol Fuzzing via Value-Based Selection. ISCC 2024: 1-6 - [c176]Zhe Lang, Zhengzi Xu, Xiaohui Chen, Shichao Lv, Zhanwei Song, Zhiqiang Shi, Limin Sun:
DeLink: Source File Information Recovery in Binaries. ISSTA 2024: 1009-1021 - [c175]Cen Zhang, Yaowen Zheng, Mingqiang Bai, Yeting Li, Wei Ma, Xiaofei Xie, Yuekang Li, Limin Sun, Yang Liu:
How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation. ISSTA 2024: 1223-1235 - [c174]Jintao Huang, Kai Yang, Gaosheng Wang, Zhiqiang Shi, Shichao Lv, Limin Sun:
TaiE: Function Identification for Monolithic Firmware. ICPC 2024: 403-414 - [c173]Jianshuo Liu, Hong Li, Mengjie Sun, Haining Wang, Hui Wen, Zhi Li, Limin Sun:
NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator. SP 2024: 2775-2793 - [i24]Xiaoling Zhang, Zhengzi Xu, Shouguo Yang, Zhi Li, Zhiqiang Shi, Limin Sun:
Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-Task Learning. CoRR abs/2405.09112 (2024) - [i23]Ziyang Wang, Jianzhou You, Haining Wang, Tianwei Yuan, Shichao Lv, Yang Wang, Limin Sun:
HoneyGPT: Breaking the Trilemma in Terminal Honeypots with Large Language Model. CoRR abs/2406.01882 (2024) - [i22]Jianshuo Liu, Hong Li, Haining Wang, Mengjie Sun, Hui Wen, Jinfa Wang, Limin Sun:
TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic Waves. CoRR abs/2407.06853 (2024) - [i21]Yuanwei Wu, Yue Huang, Yixin Liu, Xiang Li, Pan Zhou, Limin Sun:
Can Large Language Models Automatically Jailbreak GPT-4V? CoRR abs/2407.16686 (2024) - [i20]Yiran Cheng, Lwin Khin Shar, Ting Zhang, Shouguo Yang, Chaopeng Dong, David Lo, Shichao Lv, Zhiqiang Shi, Limin Sun:
LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions. CoRR abs/2408.07321 (2024) - 2023
- [j98]Yiran Cheng, Shouguo Yang, Zhe Lang, Zhiqiang Shi, Limin Sun:
VERI: A Large-scale Open-Source Components Vulnerability Detection in IoT Firmware. Comput. Secur. 126: 103068 (2023) - [j97]Chuan Qin, Jiaqian Peng, Puzhuo Liu, Yaowen Zheng, Kai Cheng, Weidong Zhang, Limin Sun:
UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router. Comput. Secur. 128: 103157 (2023) - [j96]Yimo Ren, Hong Li, Peipei Liu, Jie Liu, Hongsong Zhu, Limin Sun:
CL-GAN: A GAN-based continual learning model for generating and detecting AGDs. Comput. Secur. 131: 103317 (2023) - [j95]Liting Deng, Hui Wen, Mingfeng Xin, Hong Li, Zhiwen Pan, Limin Sun:
Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks. Comput. Secur. 132: 103323 (2023) - [j94]Senming Yan, Jing Ren, Wei Wang, Limin Sun, Wei Zhang, Quan Yu:
A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security. IEEE Commun. Surv. Tutorials 25(1): 467-496 (2023) - [j93]Yimo Ren, Hong Li, Peipei Liu, Jie Liu, Hongsong Zhu, Limin Sun:
Owner name entity recognition in websites based on multiscale features and multimodal co-attention. Expert Syst. Appl. 224: 120014 (2023) - [j92]Xifeng Wang, Hongsong Zhu, Han Xiao, Zan Zhou, Shujie Yang, Limin Sun:
Blockchain-enhanced trust management for mobile edge computing-enabled intelligent vehicular collaboration in the 6G era. Trans. Emerg. Telecommun. Technol. 34(7) (2023) - [j91]Yimo Ren, Hong Li, Peipei Liu, Jie Liu, Hongsong Zhu, Limin Sun:
Multiview Embedding with Partial Labels to Recognize Users of Devices Based on Unified Transformer. Int. J. Intell. Syst. 2023: 1-11 (2023) - [j90]Yanru Chen, Fengming Yin, Shunfang Hu, Limin Sun, Yang Li, Bin Xing, Liangyin Chen, Bing Guo:
ECC-Based Authenticated Key Agreement Protocol for Industrial Control System. IEEE Internet Things J. 10(6, March 15): 4688-4697 (2023) - [j89]Shangfeng Wan, Qiang Li, Haining Wang, Hong Li, Limin Sun:
DevTag: A Benchmark for Fingerprinting IoT Devices. IEEE Internet Things J. 10(7): 6388-6399 (2023) - [j88]Yanru Chen, Zhiyuan Luo, Zhiyuan Wang, Limin Sun, Yang Li, Bin Xing, Liangyin Chen, Bing Guo:
Physical-Layer Secret Key Generation Based on Bidirectional Convergence Feature Learning Convolutional Network. IEEE Internet Things J. 10(16): 14846-14855 (2023) - [j87]Yunhua He, Mingshun Luo, Bin Wu, Limin Sun, Yongdong Wu, Zhiquan Liu, Ke Xiao:
A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment. IEEE Internet Things J. 10(24): 21294-21308 (2023) - [j86]Xifeng Wang, Limin Sun, Chao Wang, Hongsong Zhu, Lian Zhao, Shujie Yang, Changqiao Xu:
Intelligent Connected Vehicle Security: Threats, Attacks and Defenses. J. Inf. Sci. Eng. 39(6): 1265-1303 (2023) - [j85]Yimo Ren, Hong Li, Peipei Liu, Jie Liu, Zhi Li, Hongsong Zhu, Limin Sun:
Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer. Knowl. Inf. Syst. 65(10): 4411-4429 (2023) - [j84]Yanru Chen, Li Tao, Bing Liang, Limin Sun, Yang Li, Bin Xing, Liangyin Chen:
Capability and Blockchain-Based Fine-Grained and Flexible Access Control Model. IEEE Netw. 37(6): 197-205 (2023) - [j83]Zhaoteng Yan, Zhi Li, Hong Li, Shouguo Yang, Hongsong Zhu, Limin Sun:
Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace. IEEE Trans. Dependable Secur. Comput. 20(5): 3890-3909 (2023) - [j82]Yue Sun, Zhi Li, Shichao Lv, Limin Sun:
Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution. IEEE Trans. Dependable Secur. Comput. 20(6): 4502-4518 (2023) - [j81]Yunhua He, Yueting Wu, Cui Zhang, Jialong Shen, Ke Xiao, Keshav Sood, Limin Sun:
A Sparse Protocol Parsing Method for IIoT Based on BPSO-vote-HMM Hybrid Model. IEEE/ACM Trans. Netw. 31(2): 485-496 (2023) - [j80]Shouguo Yang, Zhengzi Xu, Yang Xiao, Zhe Lang, Wei Tang, Yang Liu, Zhiqiang Shi, Hong Li, Limin Sun:
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis. ACM Trans. Softw. Eng. Methodol. 32(6): 158:1-158:29 (2023) - [c172]Puzhuo Liu, Yaowen Zheng, Chengnian Sun, Chuan Qin, Dongliang Fang, Mingdong Liu, Limin Sun:
FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware. ASPLOS (4) 2023: 138-152 - [c171]Yimo Ren, Zhi Li, Hong Li, Peipei Liu, Jie Liu, Hongsong Zhu, Limin Sun:
ip2text: A Reasoning-Aware Dataset for Text Generation of Devices on the Internet. DASFAA (Workshops) 2023: 19-33 - [c170]Xiaohui Chen, Lei Cui, Hui Wen, Zhi Li, Hongsong Zhu, Zhiyu Hao, Limin Sun:
MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors. DSN 2023: 165-178 - [c169]Gaosheng Wang, Peipei Liu, Jintao Huang, Shuaizong Si, Hongsong Zhu, Limin Sun:
CSEDesc: CyberSecurity Event Detection with Event Description. ICANN (3) 2023: 26-38 - [c168]Peipei Liu, Xin Zheng, Hong Li, Jie Liu, Yimo Ren, Hongsong Zhu, Limin Sun:
Improving the Modality Representation with multi-view Contrastive Learning for Multimodal Sentiment Analysis. ICASSP 2023: 1-5 - [c167]Peipei Liu, Hong Li, Zhiyu Wang, Yimo Ren, Jie Liu, Fei Lv, Hongsong Zhu, Limin Sun:
CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises. IJCNN 2023: 1-8 - [c166]Yimo Ren, Jinfa Wang, Hong Li, Hongsong Zhu, Limin Sun:
User Recognition of Devices on the Internet based on Heterogeneous Graph Transformer with Partial Labels. IJCNN 2023: 1-8 - [c165]Zhengyang Ai, Junnan Yin, Shuaizong Si, Hongsong Zhu, Limin Sun:
Mining Implicit Behavioral Patterns via Attention Networks for Sequential Recommendation. INNS DLIA@IJCNN 2023: 177-186 - [c164]Kai Cheng, Yaowen Zheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, Kejiang Ye, Limin Sun:
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis. ISSTA 2023: 360-372 - [c163]Siyuan Li, Chaopeng Dong, Yongpan Wang, Wenming Liu, Weijie Wang, Hong Li, Hongsong Zhu, Limin Sun:
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries. MILCOM 2023: 741-746 - [c162]Fei Lv, Rongkang Sun, Hangyu Wang, Meng Zhang, Shuaizong Si, Zhe Bu, Chengsheng Zhou, Limin Sun:
CNN-PSO-KELM: A Deep Learning Intrusion Detection Model for Imbalanced IoT Data. MSN 2023: 382-389 - [c161]Yimo Ren, Jinfa Wang, Hong Li, Hongsong Zhu, Limin Sun:
DeviceGPT: A Generative Pre-Training Transformer on the Heterogenous Graph for Internet of Things. SIGIR 2023: 1929-1933 - [c160]Jie Zhang, Hui Wen, Liting Deng, Mingfeng Xin, Zhi Li, Lun Li, Hongsong Zhu, Limin Sun:
HackMentor: Fine-Tuning Large Language Models for Cybersecurity. TrustCom 2023: 452-461 - [i19]Shouguo Yang, Chaopeng Dong, Yang Xiao, Yiran Cheng, Zhiqiang Shi, Zhi Li, Limin Sun:
Asteria-Pro: Enhancing Deep-Learning Based Binary Code Similarity Detection by Incorporating Domain Knowledge. CoRR abs/2301.00511 (2023) - [i18]Shouguo Yang, Zhiqiang Shi, Guodong Zhang, Mingxuan Li, Yuan Ma, Limin Sun:
Understand Code Style: Efficient CNN-based Compiler Optimization Recognition System. CoRR abs/2302.04666 (2023) - [i17]Siyuan Li, Yongpan Wang, Chaopeng Dong, Shouguo Yang, Hong Li, Hao Sun, Zhe Lang, Zuxin Chen, Weijie Wang, Hongsong Zhu, Limin Sun:
LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries. CoRR abs/2305.04026 (2023) - [i16]Peipei Liu, Hong Li, Yimo Ren, Jie Liu, Shuaizong Si, Hongsong Zhu, Limin Sun:
A Novel Framework for Multimodal Named Entity Recognition with Multi-level Alignments. CoRR abs/2305.08372 (2023) - [i15]Cen Zhang, Mingqiang Bai, Yaowen Zheng, Yeting Li, Xiaofei Xie, Yuekang Li, Wei Ma, Limin Sun, Yang Liu:
Understanding Large Language Model Based Fuzz Driver Generation. CoRR abs/2307.12469 (2023) - [i14]Puzhuo Liu, Chengnian Sun, Yaowen Zheng, Xuan Feng, Chuan Qin, Yuncheng Wang, Zhi Li, Limin Sun:
Harnessing the Power of LLM to Support Binary Taint Analysis. CoRR abs/2310.08275 (2023) - 2022
- [j79]Kai Yang, Haining Wang, Hongsong Zhu, Limin Sun:
An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks. Comput. Ind. 138: 103613 (2022) - [j78]Kai Yang, Yueyang Zhang, Xiaodong Lin, Zhi Li, Limin Sun:
Characterizing Heterogeneous Internet of Things Devices at Internet Scale Using Semantic Extraction. IEEE Internet Things J. 9(7): 5434-5446 (2022) - [j77]Puzhuo Liu, Yaowen Zheng, Zhanwei Song, Dongliang Fang, Shichao Lv, Limin Sun:
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control. J. Syst. Archit. 127: 102483 (2022) - [j76]Junjiao Liu, Xiaodong Lin, Xin Chen, Hui Wen, Hong Li, Yan Hu, Jiawei Sun, Zhiqiang Shi, Limin Sun:
ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks. IEEE Trans. Dependable Secur. Comput. 19(3): 2054-2069 (2022) - [c159]Yue Sun, Shichao Lv, Jianzhou You, Yuyan Sun, Xin Chen, Yaowen Zheng, Limin Sun:
IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol. ACNS 2022: 356-375 - [c158]Yaxin Zhang, Min Huang, Qiang Li, Limin Sun:
IoTminer: Semantic Information Extraction in the Packet Payloads. GLOBECOM 2022: 6079-6084 - [c157]Ke Li, Zhi Li, Zhimin Gu, Jing Guo, Ziying Wang, Limin Sun:
Compromised IoT Devices Detection in Smart Home via Semantic Information. ICC 2022: 4986-4992 - [c156]Puzhuo Liu, Dongliang Fang, Chuan Qin, Kai Cheng, Shichao Lv, Hongsong Zhu, Limin Sun:
Finding Vulnerabilities in Internal-binary of Firmware with Clues. ICC 2022: 5397-5402 - [c155]Sen Zhao, Jinfa Wang, Shouguo Yang, Yicheng Zeng, Zhihui Zhao, Hongsong Zhu, Limin Sun:
ProsegDL: Binary Protocol Format Extraction by Deep Learning-based Field Boundary Identification. ICNP 2022: 1-12 - [c154]Yicheng Zeng, Jiaqian Peng, Zhihui Zhao, Zhanwei Song, Hongsong Zhu, Limin Sun:
SIFOL: Solving Implicit Flows in Loops for Concolic Execution. IPCCC 2022: 290-297 - [c153]Yaowen Zheng, Yuekang Li, Cen Zhang, Hongsong Zhu, Yang Liu, Limin Sun:
Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation. ISSTA 2022: 417-428 - [c152]Jingfei Bian, Nan Yu, Hong Li, Hongsong Zhu, Qiang Wang, Limin Sun:
An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification. SecureComm 2022: 20-38 - [c151]Zhihui Zhao, Yicheng Zeng, Jinfa Wang, Hong Li, Hongsong Zhu, Limin Sun:
Detection and Incentive: A Tampering Detection Mechanism for Object Detection in Edge Computing. SRDS 2022: 166-177 - [c150]Mengjie Sun, Ke Li, Yaowen Zheng, Weidong Zhang, Hong Li, Limin Sun:
Inferring Device Interactions for Attack Path Discovery in Smart Home IoT. WASA (1) 2022: 64-75 - [c149]Jie Liu, Jinfa Wang, Peipei Liu, Hongsong Zhu, Limin Sun:
Discover the ICS Landmarks Based on Multi-stage Clue Mining. WASA (3) 2022: 139-151 - [c148]Jiapeng Zhao, Zhongjin Liu, Xiaoling Zhang, Jintao Huang, Zhiqiang Shi, Shichao Lv, Hong Li, Limin Sun:
Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement. WASA (1) 2022: 603-612 - [c147]Yimo Ren, Hong Li, Min Xu, Gang Xiong, Shuqin Zhang, Hongsong Zhu, Limin Sun:
Joint Classification of IoT Devices and Relations in the Internet with Network Traffic. WCNC 2022: 560-565 - [i13]Zuoguang Wang, Yimo Ren, Hongsong Zhu, Limin Sun:
Threat Detection for General Social Engineering Attack Using Machine Learning Techniques. CoRR abs/2203.07933 (2022) - [i12]Peipei Liu, Hong Li, Zhiyu Wang, Yimo Ren, Jie Liu, Fei Lyu, Hongsong Zhu, Limin Sun:
CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises. CoRR abs/2210.10581 (2022) - [i11]Peipei Liu, Xin Zheng, Hong Li, Jie Liu, Yimo Ren, Hongsong Zhu, Limin Sun:
Improving the Modality Representation with Multi-View Contrastive Learning for Multimodal Sentiment Analysis. CoRR abs/2210.15824 (2022) - 2021
- [j75]Zuoguang Wang, Hongsong Zhu, Limin Sun:
Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods. IEEE Access 9: 11895-11910 (2021) - [j74]Zuoguang Wang, Hongsong Zhu, Peipei Liu, Limin Sun:
Social engineering in cybersecurity: a domain ontology and knowledge graph application examples. Cybersecur. 4(1): 31 (2021) - [j73]Kai Yang, Xiaodong Lin, Limin Sun:
CShield: Enabling code privacy for Cyber-Physical systems. Future Gener. Comput. Syst. 125: 564-574 (2021) - [j72]Wei Zhou, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang, Le Guan, Tao Liu, Yan Jia, Yaowen Zheng, Yuqing Zhang, Limin Sun, Yazhe Wang, Peng Liu:
Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems. IEEE Internet Things J. 8(14): 11621-11639 (2021) - [j71]Qiang Li, Zhihao Wang, Dawei Tan, Jinke Song, Haining Wang, Limin Sun, Jiqiang Liu:
GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks. IEEE/ACM Trans. Netw. 29(4): 1798-1812 (2021) - [c146]Yucheng Wang, Bowen Yu, Hongsong Zhu, Tingwen Liu, Nan Yu, Limin Sun:
Discontinuous Named Entity Recognition as Maximal Clique Discovery. ACL/IJCNLP (1) 2021: 764-774 - [c145]Shuangpeng Bai, Hui Wen, Dongliang Fang, Yue Sun, Puzhuo Liu, Limin Sun:
DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing. ACNS (2) 2021: 27-48 - [c144]Dongliang Fang, Zhanwei Song, Le Guan, Puzhuo Liu, Anni Peng, Kai Cheng, Yaowen Zheng, Peng Liu, Hongsong Zhu, Limin Sun:
ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing. ACSAC 2021: 849-860 - [c143]Bowen Yu, Yucheng Wang, Tingwen Liu, Hongsong Zhu, Limin Sun, Bin Wang:
Maximal Clique Based Non-Autoregressive Open Information Extraction. EMNLP (1) 2021: 9696-9706 - [c142]Jianzhou You, Shichao Lv, Yue Sun, Hui Wen, Limin Sun:
HoneyVP: A Cost-Effective Hybrid Honeypot Architecture for Industrial Control Systems. ICC 2021: 1-6 - [c141]Zhe Lang, Shouguo Yang, Yiran Cheng, Xiaoling Zhang, Zhiqiang Shi, Limin Sun:
PMatch: Semantic-based Patch Detection for Binary Programs. IPCCC 2021: 1-10 - [c140]Zhaoteng Yan, Zhi Li, Wenping Bai, Nan Yu, Hongsong Zhu, Limin Sun:
Detecting Internet-Scale Surveillance Devices Using RTSP Recessive Features. SciSec 2021: 21-35 - [c139]Kai Cheng, Dongliang Fang, Chuan Qin, Huizhao Wang, Yaowen Zheng, Nan Yu, Limin Sun:
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware. SEC 2021: 83-99 - [c138]Xiaoling Zhang, Shouguo Yang, Luqian Duan, Zhe Lang, Zhiqiang Shi, Limin Sun:
Transformer-XL With Graph Neural Network for Source Code Summarization. SMC 2021: 3436-3441 - [c137]Yimo Ren, Hong Li, Hongsong Zhu, Limin Sun:
FIUD: A Framework to Identify Users of Devices. WASA (2) 2021: 45-57 - [c136]Xiao Hu, Hong Li, Zhiqiang Shi, Nan Yu, Hongsong Zhu, Limin Sun:
A Robust IoT Device Identification Method with Unknown Traffic Detection. WASA (1) 2021: 190-202 - [i10]Yucheng Wang, Bowen Yu, Hongsong Zhu, Tingwen Liu, Nan Yu, Limin Sun:
Discontinuous Named Entity Recognition as Maximal Clique Discovery. CoRR abs/2106.00218 (2021) - [i9]Zuoguang Wang, Hongsong Zhu, Peipei Liu, Limin Sun:
Social Engineering in Cybersecurity: A Domain Ontology and Knowledge Graph Application Examples. CoRR abs/2106.01157 (2021) - [i8]Mingfeng Xin, Hui Wen, Liting Deng, Hong Li, Qiang Li, Limin Sun:
Firmware Re-hosting Through Static Binary-level Porting. CoRR abs/2107.09856 (2021) - [i7]Zuoguang Wang, Jiaqian Peng, Hongsong Zhu, Limin Sun:
SEIGuard: An Authentication-simplified and Deceptive Scheme to Protect Server-side Social Engineering Information Against Brute-force Attacks. CoRR abs/2108.06529 (2021) - [i6]Kai Cheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, Limin Sun:
Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis. CoRR abs/2109.12209 (2021) - 2020
- [j70]Zuoguang Wang, Limin Sun, Hongsong Zhu:
Defining Social Engineering in Cybersecurity. IEEE Access 8: 85094-85115 (2020) - [j69]Zan Zhou, Xiaohui Kuang, Limin Sun, Lujie Zhong, Changqiao Xu:
Endogenous Security Defense against Deductive Attack: When Artificial Intelligence Meets Active Defense for Online Service. IEEE Commun. Mag. 58(6): 58-64 (2020) - [j68]Yan Hu, Hong Li, Tom H. Luan, An Yang, Limin Sun, Zhiliang Wang, Rui Wang:
Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. Future Gener. Comput. Syst. 108: 1230-1240 (2020) - [j67]Kai Yang, Qiang Li, Xiaodong Lin, Xin Chen, Limin Sun:
iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting. IEEE J. Sel. Areas Commun. 38(5): 955-967 (2020) - [j66]Jinke Song, Qiang Li, Haining Wang, Limin Sun:
Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild. Proc. ACM Meas. Anal. Comput. Syst. 4(1): 05:1-05:25 (2020) - [c135]Yucheng Wang, Bowen Yu, Yueyang Zhang, Tingwen Liu, Hongsong Zhu, Limin Sun:
TPLinker: Single-stage Joint Extraction of Entities and Relations Through Token Pair Linking. COLING 2020: 1572-1582 - [c134]Yimo Ren, Hong Li, Hongsong Zhu, Limin Sun, Weizhong Wang, Yachao Li:
The Mining of IP Landmarks for Internet Webcams. CWSN 2020: 257-268 - [c133]Yunhua He, Jialong Shen, Ke Xiao, Keshav Sood, Chao Wang, Limin Sun:
A Sparse Protocol Parsing Method for IIoT Protocols Based on HMM hybrid model. ICC 2020: 1-6 - [c132]Xifeng Wang, Changqiao Xu, Zan Zhou, Shujie Yang, Limin Sun:
A Survey of Blockchain-based Cybersecurity for Vehicular Networks. IWCMC 2020: 740-745 - [c131]Liting Deng, Hui Wen, Mingfeng Xin, Yue Sun, Limin Sun, Hongsong Zhu:
Malware Classification Using Attention-Based Transductive Learning Network. SecureComm (2) 2020: 403-418 - [c130]Jinke Song, Qiang Li, Haining Wang, Limin Sun:
Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild. SIGMETRICS (Abstracts) 2020: 77-78 - [c129]Chao Wang, Jitong Li, Xiaoman Cheng, Yunhua He, Limin Sun, Ke Xiao:
LSTM-Based Communication Scheduling Mechanism for Energy Harvesting RSUs in IoVs. VTC Fall 2020: 1-5 - [c128]Jianzhou You, Shichao Lv, Lian Zhao, Mengyao Niu, Zhiqiang Shi, Limin Sun:
A Scalable High-interaction Physical Honeypot Framework for Programmable Logic Controller. VTC Fall 2020: 1-5 - [c127]Xulun Hu, Weidong Zhang, Hong Li, Yan Hu, Zhaoteng Yan, Xiyue Wang, Limin Sun:
VES: A Component Version Extracting System for Large-Scale IoT Firmwares. WASA (2) 2020: 39-48 - [c126]Zhaoteng Yan, Nan Yu, Hui Wen, Zhi Li, Hongsong Zhu, Limin Sun:
Detecting Internet-Scale NATs for IoT Devices Based on Tri-Net. WASA (1) 2020: 602-614 - [c125]Zhihui Zhao, Weizhong Wang, Hongsong Zhu, Hong Li, Limin Sun, Sen Zhao, Yan Hu:
EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients. WASA (1) 2020: 755-767 - [c124]Zhihao Wang, Qiang Li, Jinke Song, Haining Wang, Limin Sun:
Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks. WWW 2020: 1422-1432 - [i5]Yucheng Wang, Hongsong Zhu, Jinfa Wang, Jie Liu, Yong Wang, Limin Sun:
XLBoost-Geo: An IP Geolocation System Based on Extreme Landmark Boosting. CoRR abs/2010.13396 (2020) - [i4]Yucheng Wang, Bowen Yu, Yueyang Zhang, Tingwen Liu, Hongsong Zhu, Limin Sun:
TPLinker: Single-stage Joint Extraction of Entities and Relations Through Token Pair Linking. CoRR abs/2010.13415 (2020)
2010 – 2019
- 2019
- [j65]Kai Yang, Qiang Li, Limin Sun:
Towards automatic fingerprinting of IoT devices in the cyberspace. Comput. Networks 148: 318-327 (2019) - [j64]Zhihao Wang, Hong Li, Qiang Li, Wei Li, Hongsong Zhu, Limin Sun:
Towards IP geolocation with intermediate routers based on topology discovery. Cybersecur. 2(1): 13 (2019) - [j63]Yan Hu, Hong Li, Hong Yang, Yuyan Sun, Limin Sun, Zhiliang Wang:
Detecting stealthy attacks against industrial control systems based on residual skewness analysis. EURASIP J. Wirel. Commun. Netw. 2019: 74 (2019) - [j62]Ruinian Li, Tianyi Song, Bo Mei, Hong Li, Xiuzhen Cheng, Limin Sun:
Blockchain for Large-Scale Internet of Things Data Storage and Protection. IEEE Trans. Serv. Comput. 12(5): 762-771 (2019) - [c123]Ji-Yao Liu, Yunhua He, Chao Wang, Yan Hu, Hong Li, Limin Sun:
An Anonymous Blockchain-Based Logging System for Cloud Computing. BlockSys 2019: 288-301 - [c122]Chao Wang, Yunhua He, Limin Sun, Chengjie Pang, Jitong Li:
Deep Memory Network with Auxiliary Sequences for Chinese Implied Sentiment Analysis. CWSN 2019: 198-211 - [c121]Zhaoteng Yan, Shichao Lv, Yueyang Zhang, Hongsong Zhu, Limin Sun:
Remote Fingerprinting on Internet-Wide Printers Based on Neural Network. GLOBECOM 2019: 1-6 - [c120]Shouguo Yang, Zhiqiang Shi, Guodong Zhang, Mingxuan Li, Yuan Ma, Limin Sun:
Understand Code Style: Efficient CNN-Based Compiler Optimization Recognition System. ICC 2019: 1-6 - [c119]Ming Zhou, Shichao Lv, Libo Yin, Xin Chen, Hong Li, Limin Sun:
SCTM: A Multi-View Detecting Approach Against Industrial Control Systems Attacks. ICC 2019: 1-6 - [c118]Zan Zhou, Changqiao Xu, Xiaohui Kuang, Tao Zhang, Limin Sun:
An Efficient and Agile Spatio-Temporal Route Mutation Moving Target Defense Mechanism. ICC 2019: 1-6 - [c117]Jianzhou You, Shichao Lv, Yichen Hao, Xuan Feng, Ming Zhou, Limin Sun:
Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data. ICICS 2019: 71-88 - [c116]Ke Li, Hong Li, Hongsong Zhu, Limin Sun, Hui Wen:
Side-Channel Information Leakage of Traffic Data in Instant Messaging. IPCCC 2019: 1-8 - [c115]Yaowen Zheng, Zhanwei Song, Yuyan Sun, Kai Cheng, Hongsong Zhu, Limin Sun:
An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis. IPCCC 2019: 1-8 - [c114]Xianghang Mi, Xuan Feng, Xiaojing Liao, Baojun Liu, XiaoFeng Wang, Feng Qian, Zhou Li, Sumayah A. Alrwais, Limin Sun, Ying Liu:
Resident Evil: Understanding Residential IP Proxy as a Dark Service. IEEE Symposium on Security and Privacy 2019: 1185-1201 - [c113]Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, Limin Sun:
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. USENIX Security Symposium 2019: 887-903 - [c112]Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, Limin Sun:
FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. USENIX Security Symposium 2019: 1099-1114 - [c111]Yucheng Wang, Xu Wang, Hongsong Zhu, Hai Zhao, Hong Li, Limin Sun:
ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction. WASA 2019: 346-357 - [c110]Hui Wen, Weidong Zhang, Yan Hu, Qing Hu, Hongsong Zhu, Limin Sun:
Lightweight IoT Malware Visualization Analysis via Two-Bits Networks. WASA 2019: 613-621 - [c109]Xu Wang, Yucheng Wang, Xuan Feng, Hongsong Zhu, Limin Sun, Yuchi Zou:
IoTTracker: An Enhanced Engine for Discovering Internet-of-Thing Devices. WOWMOM 2019: 1-9 - [i3]Wei Zhou, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang, Le Guan, Tao Liu, Yaowen Zheng, Yuqing Zhang, Limin Sun, Yazhe Wang, Peng Liu:
Logic Bugs in IoT Platforms and Systems: A Review. CoRR abs/1912.13410 (2019) - 2018
- [j61]Suguo Du, Xiaolong Li, Jinli Zhong, Lu Zhou, Minhui Xue, Haojin Zhu, Limin Sun:
Modeling Privacy Leakage Risks in Large-Scale Social Networks. IEEE Access 6: 17653-17665 (2018) - [j60]Yunhua He, Hong Li, Xiuzhen Cheng, Yan Liu, Chao Yang, Limin Sun:
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications. IEEE Access 6: 27324-27335 (2018) - [j59]Hongtao Wang, Hongmei Wang, Feng Yi, Hui Wen, Gang Li, Limin Sun:
Context-aware personalized path inference from large-scale GPS snippets. Expert Syst. Appl. 91: 78-88 (2018) - [j58]Yan Hu, An Yang, Hong Li, Yuyan Sun, Limin Sun:
A survey of intrusion detection on industrial control systems. Int. J. Distributed Sens. Networks 14(8) (2018) - [j57]Yuxuan Jia, Bing Han, Qiang Li, Hong Li, Limin Sun:
Who owns Internet of Thing devices? Int. J. Distributed Sens. Networks 14(11) (2018) - [j56]Qiang Li, Xuan Feng, Haining Wang, Limin Sun:
Understanding the Usage of Industrial Control System Devices on the Internet. IEEE Internet Things J. 5(3): 2178-2189 (2018) - [j55]Feng Yi, Guan Feng, Hongtao Wang, Zhi Li, Limin Sun:
MIAC: A mobility intention auto-completion model for location prediction. Intell. Syst. Account. Finance Manag. 25(4): 161-173 (2018) - [j54]Jiali Li, Yongle Chen, Zhi Li, Limin Sun:
基于协议状态图遍历的RTSP协议漏洞挖掘 (Mining RTSP Protocol Vulnerabilities Based on Traversal of Protocol State Graph). 计算机科学 45(9): 171-176 (2018) - [j53]Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, Zhi Tian, Kemal Akkaya, Limin Sun:
CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids. Math. Found. Comput. 1(1): 77-100 (2018) - [c108]Kai Cheng, Qiang Li, Lei Wang, Qian Chen, Yaowen Zheng, Limin Sun, Zhenkai Liang:
DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware. DSN 2018: 430-441 - [c107]An Yang, Xiaoshan Wang, Yuyan Sun, Yan Hu, Zhiqiang Shi, Limin Sun:
Multi-Dimensional Data Fusion Intrusion Detection for Stealthy Attacks on Industrial Control Systems. GLOBECOM 2018: 1-7 - [c106]An Yang, Limin Sun, Zhiqiang Shi, Weimin Zheng, Yuyan Sun, Yan Hu:
Sbsd: Detecting the Sequence Attack through Sensor Data in ICSs. ICC 2018: 1-7 - [c105]Weidong Zhang, Yu Chen, Hong Li, Zhi Li, Limin Sun:
PANDORA: A Scalable and Efficient Scheme to Extract Version of Binaries in IoT Firmwares. ICC 2018: 1-6 - [c104]Qiang Li, Xuan Feng, Haining Wang, Limin Sun:
Discovery of Internet of Thing devices based on rules. INFOCOM Workshops 2018: 1-2 - [c103]Qiang Li, Xuan Feng, Haining Wang, Zhi Li, Limin Sun:
Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices. INFOCOM 2018: 2537-2545 - [c102]Junjiao Liu, Libo Yin, Yan Hu, Shichao Lv, Limin Sun:
A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition. IPCCC 2018: 1-8 - [c101]Weidong Zhang, Hong Li, Hui Wen, Hongsong Zhu, Limin Sun:
A graph neural network based efficient firmware information extraction method for IoT devices. IPCCC 2018: 1-8 - [c100]Qizhen Li, Jie Gao, Jinming Wen, Xiaohu Tang, Lian Zhao, Limin Sun:
SMDP-Based Downlink Packet Scheduling Scheme for Solar Energy Assisted Heterogeneous Networks. iThings/GreenCom/CPSCom/SmartData 2018: 268-273 - [c99]Qi Liu, Hong Li, Yan Hu, Limin Sun:
A Check-In System Leveraging Face Recognition. iThings/GreenCom/CPSCom/SmartData 2018: 412-418 - [c98]Feng Yi, Libo Yin, Hui Wen, Hongsong Zhu, Limin Sun, Gang Li:
Mining Human Periodic Behaviors Using Mobility Intention and Relative Entropy. PAKDD (1) 2018: 488-499 - [c97]Ke Li, Hui Wen, Hong Li, Hongsong Zhu, Limin Sun:
Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 741-747 - [c96]Xuan Feng, Qiang Li, Haining Wang, Limin Sun:
Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices. USENIX Security Symposium 2018: 327-341 - [c95]Yu Chen, Hong Li, Yuan Ma, Zhiqiang Shi, Limin Sun:
Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File Retrieval. WASA 2018: 53-65 - [i2]Qizhen Li, Jie Gao, Jinming Wen, Xiaohu Tang, Lian Zhao, Limin Sun:
SMDP-based Downlink Packet Scheduling Scheme for Solar Energy Assisted Heterogeneous Networks. CoRR abs/1803.09145 (2018) - 2017
- [j52]Hao Wang, Liangyin Chen, Shijia Liu, Song-Tao Fu, Qian Luo, Feng Yin, Limin Sun, Zhanghua Li:
Trajectory-Based Hierarchical Adaptive Forwarding in Vehicular Ad Hoc Networks. J. Sensors 2017: 4236789:1-4236789:8 (2017) - [j51]Qiang Li, Xuan Feng, Lian Zhao, Limin Sun:
A Framework for Searching Internet-Wide Devices. IEEE Netw. 31(6): 101-107 (2017) - [j50]Hongtao Wang, Hui Wen, Feng Yi, Hongsong Zhu, Limin Sun:
Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets. Sensors 17(3): 550 (2017) - [j49]Yuhong Nan, Zhemin Yang, Min Yang, Shunfan Zhou, Yuan Zhang, Guofei Gu, Xiaofeng Wang, Limin Sun:
Identifying User-Input Privacy in Mobile Applications at a Large Scale. IEEE Trans. Inf. Forensics Secur. 12(3): 647-661 (2017) - [j48]Xiang Lu, Linlin Tu, Xinyun Zhou, Naixue Xiong, Limin Sun:
ViMediaNet: an emulation system for interactive multimedia based telepresence services. J. Supercomput. 73(8): 3562-3578 (2017) - [j47]Liang Xiao, Tianhua Chen, Guoan Han, Weihua Zhuang, Limin Sun:
Game Theoretic Study on Channel-Based Authentication in MIMO Systems. IEEE Trans. Veh. Technol. 66(8): 7474-7484 (2017) - [j46]Feng Yi, Hong Li, Hongtao Wang, Limin Sun:
Why You Go Reveals Who You Know: Disclosing Social Relationship by Cooccurrence. Wirel. Commun. Mob. Comput. 2017 (2017) - [c94]Shichao Lv, Liang Xiao, Qing Hu, Xiaoshan Wang, Changzhen Hu, Limin Sun:
Anti-Jamming Power Control Game in Unmanned Aerial Vehicle Networks. GLOBECOM 2017: 1-6 - [c93]Feng Yi, Yu Gu, Hongtao Wang, Yuyan Sun, Limin Sun:
Mobility Pattern Based Relationship Inference from Spatiotemporal Data. GLOBECOM 2017: 1-6 - [c92]Xiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun:
CovertMIMO: A covert uplink transmission scheme for MIMO systems. ICC 2017: 1-6 - [c91]Canhuang Dai, Dongjin Xu, Liang Xiao, Mugen Peng, Limin Sun:
Collaborative UFH-based anti-jamming broadcast with learning. ICCC 2017: 1-5 - [c90]Dongjin Xu, Liang Xiao, Limin Sun, Min Lei:
Game theoretic study on blockchain based secure edge networks. ICCC 2017: 1-5 - [c89]Feng Yi, Zhi Li, Hongtao Wang, Weimin Zheng, Limin Sun:
MIAC: A Mobility Intention Auto-Completion Model for Location Prediction. KSEM 2017: 432-444 - [c88]Xiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun:
On eavesdropping attacks and countermeasures for MU-MIMO systems. MILCOM 2017: 40-45 - [c87]Qiang Li, Xuan Feng, Haining Wang, Limin Sun:
Automatically Discovering Surveillance Devices in the Cyberspace. MMSys 2017: 331-342 - [c86]Ziye Geng, Yunhua He, Tong Niu, Hong Li, Limin Sun, Wei Cheng, Xu Li:
Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs. PAC 2017: 200-201 - [c85]Lin Zhang, Hong Li, Limin Sun, Zhiqiang Shi, Yunhua He:
Poster: Towards Fully Distributed User Authentication with Blockchain. PAC 2017: 202-203 - [c84]Ning Gao, Xiaojun Jing, Shichao Lv, Junsheng Mu, Limin Sun:
Wireless Physical Layer Characteristics Based Random Number Generator: Hijack Attackers. VTC Fall 2017: 1-5 - [c83]Chenggui Lou, Bin Cao, Lin Gao, Limin Sun, Qinyu Zhang:
MOSTPC: Performance of a Massive Oblique Space-Time-Polarization Precoding System over Ricean-K Fading Channel. VTC Fall 2017: 1-5 - [c82]Zhihao Wang, Yongle Chen, Hui Wen, Lian Zhao, Limin Sun:
Discovering Routers as Secondary Landmarks for Accurate IP Geolocation. VTC Fall 2017: 1-5 - [c81]Qing Hu, Shichao Lv, Zhiqiang Shi, Limin Sun, Liang Xiao:
Defense Against Advanced Persistent Threats with Expert System for Internet of Things. WASA 2017: 326-337 - [c80]Yunhua He, Hong Li, Xiuzhen Cheng, Yan Liu, Limin Sun:
A Bitcoin Based Incentive Mechanism for Distributed P2P Applications. WASA 2017: 457-468 - [c79]Feng Yi, Hong Li, Hongtao Wang, Hui Wen, Limin Sun:
Mobility Intention-Based Relationship Inference from Spatiotemporal Data. WASA 2017: 871-876 - 2016
- [j45]Qinglin Zhao, Taka Sakurai, Jiguo Yu, Limin Sun:
Maximizing the stable throughput of high-priority traffic for wireless cyber-physical systems. EURASIP J. Wirel. Commun. Netw. 2016: 53 (2016) - [j44]Hongtao Wang, Qiang Li, Feng Yi, Zhi Li, Limin Sun:
Influential spatial facility prediction over large scale cyber-physical vehicles in smart city. EURASIP J. Wirel. Commun. Netw. 2016: 103 (2016) - [j43]Shujun Li, Hong Li, Limin Sun:
Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization. EURASIP J. Wirel. Commun. Netw. 2016: 123 (2016) - [j42]Yi Li, Lu Zhou, Haojin Zhu, Limin Sun:
Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks. IEEE Internet Things J. 3(4): 563-571 (2016) - [j41]Lei Zhang, Donglai Zhu, Zhemin Yang, Limin Sun, Min Yang:
A survey of privacy protection techniques for mobile devices. J. Commun. Inf. Networks 1(4): 86-92 (2016) - [j40]Weidong Yang, Yunhua He, Limin Sun, Xiang Lu, Xinghua Li:
An optimal query strategy for protecting location privacy in location-based services. Peer-to-Peer Netw. Appl. 9(4): 752-761 (2016) - [j39]Qiang Li, Qi Han, Limin Sun:
Collaborative Recognition of Queuing Behavior on Mobile Phones. IEEE Trans. Mob. Comput. 15(1): 60-73 (2016) - [c78]Liang Xiao, Tianhua Chen, Guoan Han, Weihua Zhuang, Limin Sun:
Channel-Based Authentication Game in MIMO Systems. GLOBECOM 2016: 1-6 - [c77]Xuan Feng, Qiang Li, Qi Han, Hongsong Zhu, Yan Liu, Limin Sun:
Identification of visible industrial control devices at Internet scale. ICC 2016: 1-6 - [c76]Shichao Lv, Xiang Lu, Zhuo Lu, Xiaoshan Wang, Ning Wang, Limin Sun:
Zero reconciliation secret key extraction in MIMO backscatter wireless systems. ICC 2016: 1-6 - [c75]Xuan Feng, Qiang Li, Qi Han, Hongsong Zhu, Yan Liu, Jie Cui, Limin Sun:
Active Profiling of Physical Devices at Internet Scale. ICCCN 2016: 1-9 - [c74]Yaowen Zheng, Kai Cheng, Zhi Li, Shiran Pan, Hongsong Zhu, Limin Sun:
A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems. ICICS 2016: 27-36 - [c73]Xuan Feng, Qiang Li, Haining Wang, Limin Sun:
Characterizing industrial control system devices on the Internet. ICNP 2016: 1-10 - [c72]Xuan Feng, Qiang Li, Haining Wang, Limin Sun:
ASCEND: A search engine for online industrial control devices. ICNP 2016: 1-2 - [c71]Qiang Li, Xuan Feng, Zhi Li, Haining Wang, Limin Sun:
GUIDE: Graphical user interface fingerprints physical devices. ICNP 2016: 1-2 - [c70]Hong Li, Yunhua He, Xiuzhen Cheng, Limin Sun:
A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization. IIKI 2016: 525-529 - [c69]Hong Li, Yunhua He, Limin Sun, Xiuzhen Cheng, Jiguo Yu:
Side-channel information leakage of encrypted video stream in video surveillance systems. INFOCOM 2016: 1-9 - [c68]Hongtao Wang, Hui Wen, Feng Yi, Zhi Li, Limin Sun:
Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles. WASA 2016: 103-115 - [c67]Hong Li, Cheng Zhang, Yunhua He, Xiuzhen Cheng, Yan Liu, Limin Sun:
An Enhanced Structure-Based De-anonymization of Online Social Networks. WASA 2016: 331-342 - 2015
- [j38]Hong Li, Yunhua He, Xiuzhen Cheng, Hongsong Zhu, Limin Sun:
Security and privacy in localization for underwater sensor networks. IEEE Commun. Mag. 53(11): 56-62 (2015) - [j37]Weidong Yang, Limin Sun, Zhenqiang Xu:
Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks. Int. J. Inf. Secur. Priv. 9(2): 31-59 (2015) - [j36]Hong Yang, Hongsong Zhu, Limin Sun:
B-RPL: 低存储开销的RPL路由协议 (B-RPL: Low Memory Cost RPL Routing Protocol). 计算机科学 42(1): 96-100 (2015) - [j35]Hong Wen, Jie Tang, Jinsong Wu, Huanhuan Song, Tingyong Wu, Bin Wu, Pin-Han Ho, Shichao Lv, Li-Min Sun:
A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT). IEEE Trans. Emerg. Top. Comput. 3(1): 119-126 (2015) - [j34]Liqun Li, Limin Sun, Guoliang Xing, Wei Huangfu, Ruogu Zhou, Hongsong Zhu:
ROCS: Exploiting FM Radio Data System for Clock Calibration in Sensor Networks. IEEE Trans. Mob. Comput. 14(10): 2130-2144 (2015) - [j33]Tom H. Luan, Xuemin Shen, Fan Bai, Limin Sun:
Feel Bored? Join Verse! Engineering Vehicular Proximity Social Networks. IEEE Trans. Veh. Technol. 64(3): 1120-1131 (2015) - [j32]Zhi Li, Yan Liu, Hongsong Zhu, Limin Sun:
Coff: Contact-Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks. IEEE Trans. Veh. Technol. 64(11): 5257-5268 (2015) - [c66]Kaixuan Xie, Shiming Ge, Rui Yang, Xiang Lu, Limin Sun:
Negative-Supervised Cascaded Deep Learning for Traffic Sign Classification. CCCV (1) 2015: 249-257 - [c65]Shuixian Chen, Xiang Lu, Limin Sun, Shiming Ge:
Target Domain Adaptation for Face Detection in a Smart Camera Network with Peer-to-Peer Communications. GLOBECOM 2015: 1-6 - [c64]Yuyan Sun, Hongsong Zhu, Yong Liao, Limin Sun:
Vehicle Anomaly Detection Based on Trajectory Data of ANPR System. GLOBECOM 2015: 1-6 - [c63]Xiaoshan Wang, Yao Liu, Zhiqiang Shi, Xiang Lu, Limin Sun:
A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint. GLOBECOM 2015: 1-6 - [c62]Qingsong Cai, Limin Sun, Jianwei Niu, Yan Liu, Junshan Zhang:
Disseminating real-time messages in opportunistic mobile social networks: A ranking perspective. ICC 2015: 3228-3233 - [c61]Yongming Jin, Hongsong Zhu, Zhiqiang Shi, Xiang Lu, Limin Sun:
Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues. ICC 2015: 7234-7239 - [c60]Hui Wen, Shiming Ge, Shuixian Chen, Hongtao Wang, Limin Sun:
Abnormal event detection via adaptive cascade dictionary learning. ICIP 2015: 847-851 - [c59]Chunqiang Hu, Xiuzhen Cheng, Zhi Tian, Jiguo Yu, Kemal Akkaya, Limin Sun:
An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications. SecureComm 2015: 418-437 - [c58]Weidong Yang, Le Xiao, Limin Sun, Qing Li:
Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks. TrustCom/BigDataSE/ISPA (1) 2015: 104-110 - [c57]Yi Li, Lu Zhou, Haojin Zhu, Limin Sun:
Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks. WASA 2015: 345-355 - [c56]Hongtao Wang, Qiang Li, Feng Yi, Qi Han, Limin Sun:
Influential Spatial Facility Prediction over Dynamic Objects. WASA 2015: 528-538 - [c55]Qinglin Zhao, Taka Sakurai, Jiguo Yu, Limin Sun:
On the Stable Throughput in Wireless LANs. WASA 2015: 745-755 - [i1]Tom H. Luan, Longxiang Gao, Zhi Li, Yang Xiang, Limin Sun:
Fog Computing: Focusing on Mobile Users at the Edge. CoRR abs/1502.01815 (2015) - 2014
- [j31]Wei Liu, Hong Li, Yongle Chen, Hongsong Zhu, Limin Sun:
LARES: latency-reduced neighbour discovery for contagious diseases prevention. Int. J. Ad Hoc Ubiquitous Comput. 16(1): 3-13 (2014) - [j30]Yunhua He, Limin Sun, Weidong Yang, Hong Li:
A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j29]Wei Liu, Yongle Chen, Yongping Xiong, Limin Sun, Hongsong Zhu:
Optimization of Sampling Cell Size for Fingerprint Positioning. Int. J. Distributed Sens. Networks 10 (2014) - [j28]Wei Liu, Qiang Li, Yongle Chen, Yongping Xiong, Yubo Deng, Limin Sun:
Adaptive Heterogeneous Network Handoff of Smartphone Based on the Closed Control Loop. Int. J. Distributed Sens. Networks 10 (2014) - [j27]Weidong Yang, Wei Liu, Pan Li, Limin Sun:
TDMA-Based Control Channel Access for IEEE 802.11p in VANETs. Int. J. Distributed Sens. Networks 10 (2014) - [j26]Yuan Zhang, Limin Sun, Houbing Song, Xiaojun Cao:
Ubiquitous WSN for Healthcare: Recent Advances and Future Prospects. IEEE Internet Things J. 1(4): 311-318 (2014) - [j25]Di Wu, Xiaojing Wang, Limin Sun, Yan Ling, Dongxia Zhang:
Identity privacy-based reliable routing method in VANETs. Peer-to-Peer Netw. Appl. 7(3): 285-294 (2014) - [j24]Yu Wei, Hongli Yan, Rongfang Bie, Shenling Wang, Limin Sun:
Performance monitoring and evaluation in dance teaching with mobile sensing technology. Pers. Ubiquitous Comput. 18(8): 1929-1939 (2014) - [j23]Junqi Guo, Xiaobo Xie, Rongfang Bie, Limin Sun:
Structural health monitoring by using a sparse coding-based deep learning algorithm with wireless sensor networks. Pers. Ubiquitous Comput. 18(8): 1977-1987 (2014) - [j22]Yibo Han, Jine Tang, ZhangBing Zhou, Mingzhong Xiao, Limin Sun, Qun Wang:
Novel itinerary-based KNN query algorithm leveraging grid division routing in wireless sensor networks of skewness distribution. Pers. Ubiquitous Comput. 18(8): 1989-2001 (2014) - [j21]Yongping Xiong, Ruogu Zhou, Minming Li, Guoliang Xing, Limin Sun, Jian Ma:
ZiFi: Exploiting Cross-Technology Interference Signatures for Wireless LAN Discovery. IEEE Trans. Mob. Comput. 13(11): 2675-2688 (2014) - [j20]Liqun Li, Guoliang Xing, Limin Sun, Yan Liu:
A Quality-Aware Voice Streaming System for Wireless Sensor Networks. ACM Trans. Sens. Networks 10(4): 61:1-61:25 (2014) - [c54]Qingsong Cai, Yuqing Bai, Limin Sun, Jianwei Niu:
Quantifying individual communication capability in opportunistic mobile social networks. ComComAP 2014: 1-6 - [c53]Yaowen Zheng, Hong Li, Zhiqiang Shi, Limin Sun:
Security of Cyber Physical System. CWSN 2014: 558-567 - [c52]Shanyan Gao, Hongsong Zhu, Xinyun Zhou, Yan Liu, Limin Sun:
Design and Implementation of Smart Home Linkage System Based on OSGI and REST Architecture. CWSN 2014: 568-582 - [c51]Yunhua He, Limin Sun, Zhi Li, Hong Li, Xiuzhen Cheng:
An optimal privacy-preserving mechanism for crowdsourced traffic monitoring. FOMC 2014: 11-18 - [c50]Yuyan Sun, Xinyun Zhou, Limin Sun, Shuixian Chen:
Vehicle Activity Analysis Based on ANPR System. EUC 2014: 89-96 - [c49]Zhicheng Chen, Bin Cao, Yalin Zhang, Qinyu Zhang, Limin Sun:
CREEP: Cognitive relaying enabled efficiency and physical-layer security preserving framework. ICCS 2014: 258-262 - [c48]Shiming Ge, Rui Yang, Hui Wen, Shuixian Chen, Limin Sun:
Eye localization based on correlation filter bank. ICME 2014: 1-5 - [c47]Hong Li, Limin Sun, Haojin Zhu, Xiang Lu, Xiuzhen Cheng:
Achieving privacy preservation in WiFi fingerprint-based localization. INFOCOM 2014: 2337-2345 - [c46]Yuyan Sun, Hongsong Zhu, Xinyun Zhou, Limin Sun:
VAPA: Vehicle Activity Patterns Analysis based on Automatic Number Plate Recognition System Data. ITQM 2014: 48-57 - [c45]Hui Wen, Qiang Li, Qi Han, Shiming Ge, Limin Sun:
Poster: Crowdsourcing for video traffic surveillance. MobiSys 2014: 384 - [c44]Qiang Li, Qi Han, Limin Sun:
UserIntent: Detection of user intent for triggering smartphone sensing applications. SECON 2014: 185-187 - [c43]Qiang Li, Qi Han, Xiuzhen Cheng, Limin Sun:
QueueSense: Collaborative recognition of queuing on mobile phones. SECON 2014: 230-238 - 2013
- [j19]Yongle Chen, Ci Chen, Hongsong Zhu, Limin Sun:
Efficient Deterministic Anchor Deployment for Sensor Network Positioning. Int. J. Distributed Sens. Networks 9 (2013) - [j18]W. U. Di, Dongxia Zhang, Guozhen Tan, Limin Sun, Juanjuan Li, Jiangchuan Liu:
Improvement and Performance Evaluation for Multimedia Files Transmission in Vehicle-Based DTNs. Int. J. Distributed Sens. Networks 9 (2013) - [j17]Zhi Li, Limin Sun, Xinyun Zhou:
Amortized Fairness for Drive-Thru Internet. Int. J. Distributed Sens. Networks 9 (2013) - [j16]Weijun Qin, Jiadi Zhang, Bo Li, Limin Sun:
Discovering Human Presence Activities with Smartphones Using Nonintrusive Wi-Fi Sniffer Sensors: The Big Data Prospective. Int. J. Distributed Sens. Networks 9 (2013) - [j15]Gao Yuan Zhang, Li-Min Sun, Hong Wen, Bin Wu, Xiping Zhu, Liang Zhou:
A Cross-Layer Design Combining of AMC with HARQ for DSRC Systems. Int. J. Distributed Sens. Networks 9 (2013) - [j14]Qinyu Zhang, Bin Cao, Ye Wang, Naitong Zhang, Xiaodong Lin, Limin Sun:
On exploiting polarization for energy-harvesting enabled cooperative cognitive radio networking. IEEE Wirel. Commun. 20(4) (2013) - [c42]Wei Gan, Zhiqiang Shi, Chen Zhang, Limin Sun, Dan Ionescu:
MERPL: A more memory-efficient storing mode in RPL. ICON 2013: 1-5 - [c41]Di Wu, Yanrong Gao, Guozhen Tan, Limin Sun, Jie Liang, Jiangchuan Liu:
A cooperation incentive scheme based on coalitional game theory for sparse and dense VANETs. IWCMC 2013: 361-368 - [c40]Qiang Li, Qi Han, Limin Sun:
Context-Aware Handoff on Smartphones. MASS 2013: 470-478 - [c39]Bowu Zhang, Wei Cheng, Limin Sun, Xiuzhen Cheng, Taieb Znati, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Queuing modeling for delay analysis in mission oriented sensor networks under the protocol interference model. MiSeNet@MobiCom 2013: 11-20 - [c38]Xiang Lu, Wenye Wang, Jianfeng Ma, Limin Sun:
Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture. SmartGridComm 2013: 612-617 - 2012
- [j13]Xi Chen, Bingo Wing-Kuen Ling, Limin Sun:
Nonlinear Behaviors of Gear Shifting Digital Phase Locked Loops. Int. J. Bifurc. Chaos 22(8) (2012) - [j12]Zhonghua Zhao, Wei Huangfu, Limin Sun, Zhiqiang Shi, Wei Gan:
An Open Conformance Test System towards the Standardization of Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j11]Di Wu, Jing Cao, Yan Ling, Jiangchuan Liu, Limin Sun:
Routing Algorithm Based on Multi-Community Evolutionary Game for VANET. J. Networks 7(7): 1106-1115 (2012) - [j10]Di Wu, Chenxi Hou, Limin Sun, Yan Ling, Jiangchuan Liu:
The XM Satellite Radio Software Module of an Embedded Car Audio System. J. Softw. 7(9): 1981-1992 (2012) - [j9]Liqun Li, Guoliang Xing, Qi Han, Limin Sun:
ASM: Adaptive Voice Stream Multicast over Low-Power Wireless Networks. IEEE Trans. Parallel Distributed Syst. 23(4): 626-633 (2012) - [c37]Sining Ma, Xi Chen, Guicai Song, Juan Wang, Limin Sun, Jia Yan:
The Converged Service Oriented Architecture in Smart Home Service. CyberC 2012: 237-240 - [c36]Xi Chen, Limin Sun, Hongsong Zhu, Yan Zhen, Hongbin Chen:
Application of Internet of Things in Power-Line Monitoring. CyberC 2012: 423-426 - [c35]Qiang Li, Weijun Qin, Liqun Li, Limin Sun:
Poster Abstract: Smartphone Heterogeneous Network Handoff Based on the Closed Control Loop. ICCPS 2012: 231 - [c34]Zhonghua Zhao, Wei Huangfu, Limin Sun:
NSSN: A network monitoring and packet sniffing tool for wireless sensor networks. IWCMC 2012: 537-542 - [c33]Wei Liu, Limin Sun, Yunhuai Liu, Hongsong Zhu, Ziguo Zhong, Tian He:
Exploiting ephemeral link correlation for mobile wireless networks. SenSys 2012: 239-252 - [c32]Yang Liu, Qiang Li, Weijun Qin, Limin Sun, Yan Liu:
GreenTech: A Case Study for Using the Web of Things in Household Energy Conservation. UIC/ATC 2012: 906-911 - 2011
- [j8]Qiang Li, Weijun Qin, Bing Han, Ruicong Wang, Limin Sun:
A case study on REST-style architecture for cyber-physical systems: Restful smart gateway. Comput. Sci. Inf. Syst. 8(4): 1317-1329 (2011) - [c31]Weijun Qin, Qiang Li, Limin Sun, Hongsong Zhu, Yan Liu:
RestThing: A Restful Web Service Infrastructure for Mash-Up Physical and Web Resources. EUC 2011: 197-204 - [c30]Yongle Chen, Limin Sun, Feng Wang, Xinyun Zhou:
Congestion-Aware Indoor Emergency Navigation Algorithm for Wireless Sensor Networks. GLOBECOM 2011: 1-5 - [c29]Li Ma, Jiangchuan Liu, Limin Sun, Ouldooz Baghban Karimi:
The Trajectory Exposure Problem in Location-Aware Mobile Networking. MASS 2011: 7-12 - [c28]Yongping Xiong, Wenbo He, Canfeng Chen, Jian Ma, Limin Sun:
Phoenix: Peer-to-Peer Location Based Notification in Mobile Networks. MASS 2011: 691-696 - [c27]Liqun Li, Guoliang Xing, Limin Sun, Wei Huangfu, Ruogu Zhou, Hongsong Zhu:
Exploiting FM radio data system for adaptive clock calibration in sensor networks. MobiSys 2011: 169-182 - [c26]Liqun Li, Guoliang Xing, Limin Sun, Wei Huangfu, Ruogu Zhou, Hongsong Zhu:
Demo: a sensor network time synchronization protocol based on fm radio data system. MobiSys 2011: 367-368 - [c25]Zhonghua Zhao, Wei Huangfu, Yan Liu, Limin Sun:
Design and Implementation of Network Management System for Large-Scale Wireless Sensor Networks. MSN 2011: 130-137 - [c24]Di Wu, Dongxia Zhang, Limin Sun, Jiangchuan Liu, Juanjuan Li:
A game based routing algorithm for congestion control of multimedia transmission in VANETs. WCSP 2011: 1-6 - 2010
- [j7]Wei Huangfu, Limin Sun, Jiangchuan Liu:
A High-Accuracy Nonintrusive Networking Testbed for Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j6]Feng Wang, Jiangchuan Liu, Limin Sun:
Ambient Data Collection with Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j5]Guoliang Xing, Jianping Wang, Zhaohui Yuan, Rui Tan, Limin Sun, Qingfeng Huang, Xiaohua Jia, Hing-Cheung So:
Mobile Scheduling for Spatiotemporal Detection in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 21(12): 1851-1866 (2010) - [c23]Wentao Jiang, Limin Sun, Junwei Lv, Feng Wang:
A Prediction Based Long-Cycle Time Synchronization Algorithm for Sensor Networks. GLOBECOM 2010: 1-5 - [c22]Zhi Li, Limin Sun, Xinyun Zhou, Liqun Li:
Priority Linear Coding Based Opportunistic Routing for Video Streaming in Ad Hoc Networks. GLOBECOM 2010: 1-5 - [c21]Liqun Li, Limin Sun:
Seer: Trend-Prediction-Based Geographic Message Forwarding in Sparse Vehicular Networks. ICC 2010: 1-5 - [c20]Yongping Xiong, Rui Tian, Jian Ma, Yan Liu, Limin Sun:
Optimal infostation deployment for spatio-temporal information dissemination. ISCC 2010: 120-122 - [c19]Yongping Xiong, Limin Sun, Wenbo He, Jian Ma:
Anycast routing in mobile opportunistic networks. ISCC 2010: 599-604 - [c18]Fucheng Yang, Lie-Liang Yang, Huangfu Wei, Limin Sun:
Frequency-hopping/M-ary frequency-shift keying for wireless sensor networks: Noncoherent detection and performance. ISWCS 2010: 135-139 - [c17]Ruogu Zhou, Yongping Xiong, Guoliang Xing, Limin Sun, Jian Ma:
ZiFi: wireless LAN discovery via ZigBee interference signatures. MobiCom 2010: 49-60 - [c16]Liqun Li, Guoliang Xing, Qi Han, Limin Sun:
Adaptive Voice Stream Multicast Over Low-Power Wireless Networks. RTSS 2010: 292-301
2000 – 2009
- 2009
- [j4]Yanzhong Bi, Limin Sun, Na Li:
BoSS: a moving strategy for mobile sinks in wireless sensor networks. Int. J. Sens. Networks 5(3): 173-184 (2009) - [c15]Liqun Li, Guoliang Xing, Limin Sun, Yan Liu:
QVS: Quality-Aware Voice Streaming for Wireless Sensor Networks. ICDCS 2009: 450-457 - [c14]Wei Huangfu, Limin Sun, Xinyun Zhou:
NISAT: a zero-side-effect testbed for wireless sensor networks. SenSys 2009: 313-314 - 2008
- [j3]Limin Sun, Hongsong Zhu, Bin Duan, Xiaowei Li, Yi Sun:
Analysis of Forwarding Mechanisms on Fine-Grain Gradient Sinking Model in WSN. J. Signal Process. Syst. 51(2): 145-159 (2008) - [c13]Lian Li, Limin Sun, Jian Ma, Canfeng Chen:
A Receiver-Based Opportunistic Forwarding Protocol for Mobile Sensor Networks. ICDCS Workshops 2008: 198-203 - [c12]Wei Huangfu, Yan Liu, Bin Duan, Limin Sun, Jian Ma, Canfeng Chen:
EATA: Effectiveness based Aggregation Time Allocation algorithm for Wireless Sensor Networks. ISCC 2008: 981-987 - [c11]Wei Huangfu, Bin Duan, Limin Sun, Canfeng Chen, Jian Ma:
THTA: Triangle-Shaped Hierarchy Aggregation Time Allocation Algorithm for Wireless Sensor Network. WCNC 2008: 2397-2402 - 2007
- [j2]Yanzhong Bi, Na Li, Limin Sun:
DAR: An energy-balanced data-gathering scheme for wireless sensor networks. Comput. Commun. 30(14-15): 2812-2825 (2007) - [j1]Yanzhong Bi, Limin Sun, Jian Ma, Na Li, Imran Ali Khan, Canfeng Chen:
HUMS: An Autonomous Moving Strategy for Mobile Sinks in Data-Gathering Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2007 (2007) - [c10]Jinfeng Zhang, Jianwei Niu, Rui He, Jianping Hu, Limin Sun:
P2P-Leveraged Mobile Live Streaming. AINA Workshops (2) 2007: 195-200 - [c9]Yanzhong Bi, Jianwei Niu, Limin Sun, Wei Huangfu, Yi Sun:
Moving Schemes for Mobile Sinks in Wireless Sensor Networks. IPCCC 2007: 101-108 - 2006
- [c8]Lingzhi Sheng, Wen Lei, Wei Huangfu, Xinyun Zhou, Weiming Cheng, Zhimei Wu, Limin Sun:
Performance Analysis and Enhancement for Priority Based IEEE 802.11 Network. ICC 2006: 4768-4773 - [c7]Limin Sun, Haidong Wang, Ting-Xin Yan, Jingjing Liu:
ESTS: An Error Statistic Based Time Synchronization Protocol for Wireless Sensor Networks. ICIC (2) 2006: 1317-1323 - [c6]Lingzhi Sheng, Limin Sun, Xinyun Zhou, Jian Ma:
Performance Analysis and Resource Allocation for IEEE 802.11 based Wireless Networks. PIMRC 2006: 1-5 - [c5]Xinyun Zhou, Jianwei Niu, Limin Sun, Lingzhi Sheng:
A Channel-State Aware Scheduling Mechanism for Wireless Local Area Networks. PIMRC 2006: 1-5 - 2005
- [c4]Ting-Xin Yan, Yanzhong Bi, Limin Sun, Hongsong Zhu:
Probability Based Dynamic Load-Balancing Tree Algorithm for Wireless Sensor Networks. ICCNMC 2005: 682-691 - [c3]Li-Min Sun, Ting-Xin Yan, Yanzhong Bi, Hongsong Zhu:
A Self-adaptive Energy-Aware Data Gathering Mechanism for Wireless Sensor Networks. ICIC (2) 2005: 588-597 - 2004
- [c2]Yichuan Wu, Limin Sun, Jian Ma:
Adaptive robust TCP/IP header compression algorithm for 3G wireless networks. WCNC 2004: 1046-1050 - 2003
- [c1]Limin Sun, Yong Liao, Zhimei Wu:
A Reliable Region based Hierarchical Mobile Multicast Protocol for IPv6 Network. MWCN 2003
Coauthor Index
aka: Huangfu Wei
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint