Follow
Jinyuan Sun
Jinyuan Sun
Professor of Electrical Engineering and Computer Science, University of Tennessee
Verified email at utk.edu
Title
Cited by
Cited by
Year
An identity-based security system for user privacy in vehicular ad hoc networks
J Sun, C Zhang, Y Zhang, Y Fang
IEEE Transactions on Parallel and Distributed Systems 21 (9), 1227-1239, 2010
4802010
Privacy and security for online social networks: challenges and opportunities
C Zhang, J Sun, X Zhu, Y Fang
IEEE network 24 (4), 13-18, 2010
4272010
HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare
J Sun, X Zhu, C Zhang, Y Fang
2011 31st International Conference on Distributed Computing Systems, 373-382, 2011
1732011
Fine-grained private matching for proximity-based mobile social networking
R Zhang, Y Zhang, J Sun, G Yan
2012 Proceedings IEEE INFOCOM, 1969-1977, 2012
1662012
Cross-domain data sharing in distributed electronic health record systems
J Sun, Y Fang
IEEE Transactions on Parallel and Distributed Systems 21 (6), 754-764, 2009
1542009
Paas: A privacy-preserving attribute-based authentication system for ehealth networks
L Guo, C Zhang, J Sun, Y Fang
2012 IEEE 32nd International Conference on Distributed Computing Systems …, 2012
1482012
A privacy-preserving attribute-based authentication system for mobile health networks
L Guo, C Zhang, J Sun, Y Fang
IEEE Transactions on Mobile Computing 13 (9), 1927-1941, 2013
1432013
Privacy and emergency response in e-healthcare leveraging wireless body sensor networks
J Sun, Y Fang, X Zhu
IEEE Wireless Communications 17 (1), 66-73, 2010
1432010
Cloud-assisted mobile-access of health data with privacy and auditability
Y Tong, J Sun, SSM Chow, P Li
IEEE Journal of biomedical and health Informatics 18 (2), 419-429, 2013
1272013
An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks
J Sun, C Zhang, Y Fang
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
1212007
Privacy-preserving profile matching for proximity-based mobile social networking
R Zhang, J Zhang, Y Zhang, J Sun, G Yan
IEEE Journal on Selected Areas in Communications 31 (9), 656-668, 2013
1182013
Fast identification of the missing tags in a large RFID system
R Zhang, Y Liu, Y Zhang, J Sun
2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2011
1162011
Dynamic detection of false data injection attack in smart grid using deep learning
X Niu, J Li, J Sun, K Tomsovic
2019 IEEE Power & Energy Society Innovative Smart Grid Technologies …, 2019
1152019
A privacy-preserving scheme for online social networks with efficient revocation
J Sun, X Zhu, Y Fang
2010 Proceedings IEEE INFOCOM, 1-9, 2010
1092010
SAT: A security architecture achieving anonymity and traceability in wireless mesh networks
J Sun, C Zhang, Y Zhang, Y Fang
IEEE Transactions on Dependable and Secure Computing 8 (2), 295-307, 2010
1082010
Protecting location privacy for task allocation in ad hoc mobile cloud computing
Y Gong, C Zhang, Y Fang, J Sun
IEEE Transactions on Emerging Topics in Computing 6 (1), 110-121, 2015
962015
Purging the back-room dealing: Secure spectrum auction leveraging paillier cryptosystem
M Pan, J Sun, Y Fang
IEEE Journal on Selected Areas in Communications 29 (4), 866-876, 2011
832011
RescueMe: Location-based secure and dependable VANETs for disaster rescue
J Sun, X Zhu, C Zhang, Y Fang
IEEE Journal on Selected Areas in Communications 29 (3), 659-669, 2011
612011
Conaml: Constrained adversarial machine learning for cyber-physical systems
J Li, Y Yang, JS Sun, K Tomsovic, H Qi
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
572021
Mac-layer selfish misbehavior in ieee 802.11 ad hoc networks: Detection and defense
M Li, S Salinas, P Li, J Sun, X Huang
IEEE Transactions on Mobile Computing 14 (6), 1203-1217, 2014
512014
The system can't perform the operation now. Try again later.
Articles 1–20