default search action
Jiyan Sun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Yuehua Huo, Wei Liang, Junhan Chen, Shangyuan Zhuang, Jiyan Sun:
LightGuard: A Lightweight Malicious Traffic Detection Method for Internet of Things. IEEE Internet Things J. 11(17): 28566-28577 (2024) - [c25]Jiang Fang, Zhicheng Zhang, Jiyan Sun, Jiadong Fu, Haonan He, Yinlong Liu, Wei Ma:
Improve Model Robustness in Less Time Than It Takes to Drink A Cup of Coffee with Plug-and-Play Robustness Plugins. ACCV (1) 2024: 385-396 - [c24]Lu Yuan, Jiyan Sun, Shangyuan Zhuang, Yinlong Liu, Liru Geng, Jing Zou, Peizhe Xin, Weiqing Huang, Wei Ma:
Manticore: An Unsupervised Intrusion Detection System Based on Contrastive Learning in 5G Networks. ICASSP 2024: 4705-4709 - [c23]Zhaorui Guo, Jiyan Sun, Jiadong Fu, Lu Yuan, Shangyuan Zhuang, Liru Geng, Yinlong Liu, Wei Ma:
Fast and Accurate Root Cause Analysis Based on Signalling Messages for 5G Networks. ICASSP 2024: 9276-9280 - [c22]Jiang Fang, Jiadong Fu, Jiyan Sun, Liru Geng, Yinlong Liu, Wei Ma:
STRCA: A Lightweight and Accurate Root Cause Analysis System Based on 5G Signalling Trace. ICIC (LNAI 4) 2024: 42-53 - [c21]Lu Yuan, Jiyan Sun, Shangyuan Zhuang, Yinlong Liu, Liru Geng, Wei Ma:
CoSen-IDS: A Novel Cost-Sensitive Intrusion Detection System on Imbalanced Data in 5G Networks. ICIC (8) 2024: 470-481 - [c20]Jiadong Fu, Jiang Fang, Jiyan Sun, Shangyuan Zhuang, Liru Geng, Yinlong Liu:
LoFT: LoRA-Based Efficient and Robust Fine-Tuning Framework for Adversarial Training. IJCNN 2024: 1-8 - [i2]Hangsheng Zhang, Dongqi Han, Yinlong Liu, Zhiliang Wang, Jiyan Sun, Shangyuan Zhuang, Jiqiang Liu, Jinsong Dong:
Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors. CoRR abs/2401.10691 (2024) - 2023
- [j5]Ting Li, Jiyan Sun, Yinlong Liu, Xu Zhang, Dali Zhu, Zhaorui Guo, Liru Geng:
ESMO: Joint Frame Scheduling and Model Caching for Edge Video Analytics. IEEE Trans. Parallel Distributed Syst. 34(8): 2295-2310 (2023) - [c19]Tian Hu, Shangyuan Zhuang, Jiyan Sun, Yinlong Liu, Wei Ma, Yu Chen, Weiyu Liu:
Implementation of a Cost-Effective Privacy Leakage Detection System for Hosted Programs. CSCWD 2023: 1783-1788 - [c18]Lu Yuan, Yuan Meng, Jiyan Sun, Shangyuan Zhuang, Yinlong Liu, Liru Geng, Weiqing Huang:
ATS: A Fully Automatic Troubleshooting System with Efficient Anomaly Detection and Localization. ICCS (5) 2023: 476-491 - [c17]Huiran Yang, Yan Zhang, Yueyue Dai, Jiyan Sun, Huajun Cui, Can Ma, Weiping Wang:
CACluster: A Clustering Approach for IoT Attack Activities Based on Contextual Analysis. ICPADS 2023: 1809-1816 - [c16]Huiran Yang, Jiaqi Kang, Yueyue Dai, Jiyan Sun, Yan Zhang, Huajun Cui, Can Ma:
LActDet: An Automatic Network Attack Activity Detection Framework for Multi-step Attacks. TrustCom 2023: 676-685 - [c15]Tian Hu, Shangyuan Zhuang, Jiyan Sun, Yinlong Liu, Wei Ma, Hongchao Wang:
A Cost-effective Automation Method of Massive Vulnerabilities Analysis and Remediation Based on Cloud Native. TrustCom 2023: 772-779 - 2022
- [j4]Shenglin Zhang, Zhenyu Zhong, Dongwen Li, Qiliang Fan, Yongqian Sun, Man Zhu, Yuzhi Zhang, Dan Pei, Jiyan Sun, Yinlong Liu, Hui Yang, Yongqiang Zou:
Efficient KPI Anomaly Detection Through Transfer Learning for Large-Scale Web Services. IEEE J. Sel. Areas Commun. 40(8): 2440-2455 (2022) - [c14]Hangsheng Zhang, Yu Chen, Weiyu Liu, Shangyuan Zhuang, Jiyan Sun, Yinlong Liu, Liru Geng:
A Shapley-based Lightweight Global Explainer for Network Intrusion Detection System. HPCC/DSS/SmartCity/DependSys 2022: 554-561 - [c13]Huajun Cui, Guozhu Meng, Yueqi Li, Yuejun Li, Yan Zhang, Jiyan Sun, Dali Zhu, Weiping Wang:
LibHunter: An Unsupervised Approach for Third-party Library Detection without Prior Knowledge. ISCC 2022: 1-7 - [c12]Yuejun Li, Huajun Cui, Jiyan Sun, Yan Zhang, Yueqi Li, Guozhu Meng, Weiping Wang:
Automated Privacy Network Traffic Detection via Self-labeling and Learning. ISCC 2022: 1-8 - [c11]Shangyuan Zhuang, Jiyan Sun, Hangsheng Zhang, Xiaohui Kuang, Ling Pang, Haitao Liu, Yinlong Liu:
StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated Network. ISCC 2022: 1-8 - [c10]Jiyan Sun, Tao Lin, Yinlong Liu, Xin Wang, Bo Jiang, Liru Geng, Pengkun Jing, Liang Dai:
iSwift: Fast and Accurate Impact Identification for Large-scale CDNs. IWQoS 2022: 1-10 - [c9]Shenglin Zhang, Dongwen Li, Zhenyu Zhong, Jun Zhu, Minghan Liang, Jiexi Luo, Yongqian Sun, Ya Su, Sibo Xia, Zhongyou Hu, Yuzhi Zhang, Dan Pei, Jiyan Sun, Yinlong Liu:
Robust System Instance Clustering for Large-Scale Web Services. WWW 2022: 1785-1796 - 2021
- [j3]Dali Zhu, Ting Li, Hongfeng Tian, Yong Yang, Yinlong Liu, Haitao Liu, Liru Geng, Jiyan Sun:
Speed-Aware and Customized Task Offloading and Resource Allocation in Mobile Edge Computing. IEEE Commun. Lett. 25(8): 2683-2687 (2021) - [j2]Dali Zhu, Ting Li, Haitao Liu, Jiyan Sun, Liru Geng, Yinlong Liu:
Privacy-Aware Online Task Offloading for Mobile-Edge Computing. Wirel. Commun. Mob. Comput. 2021: 6622947:1-6622947:16 (2021) - [c8]Jiang Fang, Haitao Liu, Jiyan Sun, Ting Li, Yinlong Liu, Zhaorui Guo, Shangyuan Zhuang, Liru Geng:
Learning-based Task Offloading in Dynamic Orbital Edge Computing Network. HPCC/DSS/SmartCity/DependSys 2021: 495-502 - [c7]Pengkun Jing, Yanni Han, Jiyan Sun, Tao Lin, Yanjie Hu:
AutoRoot: A Novel Fault Localization Schema of Multi-dimensional Root Causes. WCNC 2021: 1-7 - [c6]Dali Zhu, Haitao Liu, Ting Li, Jiyan Sun, Jie Liang, Hangsheng Zhang, Liru Geng, Yinlong Liu:
Deep Reinforcement Learning-based Task Offloading in Satellite-Terrestrial Edge Computing Networks. WCNC 2021: 1-7 - [i1]Dali Zhu, Haitao Liu, Ting Li, Jiyan Sun, Jie Liang, Hangsheng Zhang, Liru Geng, Yinlong Liu:
Deep Reinforcement Learning-based Task Offloading in Satellite-Terrestrial Edge Computing Networks. CoRR abs/2102.01876 (2021) - 2020
- [c5]Zhilei Liu, Tao Lin, Liang Dai, Jiyan Sun, Yanjie Hu, Yan Zhang, Zhen Xu:
A Feedback Mechanism for Prediction-based Anomaly Detection In Content Delivery Networks. ISCC 2020: 1-7
2010 – 2019
- 2017
- [j1]Jiuyue Cao, Yan Zhang, Wei An, Xin Chen, Jiyan Sun, Yanni Han:
VNF-FG design and VNF placement for 5G mobile networks. Sci. China Inf. Sci. 60(4): 40302 (2017) - [c4]Jiyan Sun, Yan Zhang, Xin Wang, Shihan Xiao, Zhen Xu, Hongjing Wu, Xin Chen, Yanni Han:
DC2-MTCP: Light-Weight Coding for Efficient Multi-Path Transmission in Data Center Network. IPDPS 2017: 419-428 - 2016
- [c3]Jiuyue Cao, Yan Zhang, Wei An, Xin Chen, Yanni Han, Jiyan Sun:
VNF Placement in Hybrid NFV Environment: Modeling and Genetic Algorithms. ICPADS 2016: 769-777 - 2015
- [c2]Jiyan Sun, Yan Zhang, Ding Tang, Shuli Zhang, Zhijun Zhao, Song Ci:
TCP-FNC: A novel TCP with network coding for wireless networks. ICC 2015: 2078-2084 - [c1]Jiyan Sun, Yan Zhang, Ding Tang, Shuli Zhang, Zhen Xu, Jingguo Ge:
Improving TCP performance in data center networks with Adaptive Complementary Coding. LCN 2015: 295-302
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint