基本信息
孙利民 男 博导 中国科学院信息工程研究所
电子邮件: sunlimin@iie.ac.cn
通信地址: 北京海淀区树村路19
邮政编码: 100085
研究领域
智能系统安全&物联网安全&工业控制系统安全
招生信息
招生专业
083900-网络空间安全
招生方向
物联网安全;工控系统安全;国家基础设施安全
教育背景
1995-06--1998-06 国防科技大学计算机学院 博士
1992-09--1995-05 国防科技大学计算机学院 硕士
1984-09--1988-05 国防科技大学计算机系 学士
1992-09--1995-05 国防科技大学计算机学院 硕士
1984-09--1988-05 国防科技大学计算机系 学士
工作经历
社会兼职
2012-01-10-今,物联网安全技术北京市重点实验室, 主任
2010-05-10-今,北京物联网学会, 副理事长
2006-09-26-今,计算机学会物联网专委会, 副主任
2010-05-10-今,北京物联网学会, 副理事长
2006-09-26-今,计算机学会物联网专委会, 副主任
教授课程
物联网安全
物联网及其安全
国家关键信息基础设施安全
科学前沿进展名家系列讲座IV
物联网及安全
传感器网络与模式识别系列讲座
传感器网络系列讲座
无线传感器网络
物联网系列讲座
物联网及其安全
国家关键信息基础设施安全
科学前沿进展名家系列讲座IV
物联网及安全
传感器网络与模式识别系列讲座
传感器网络系列讲座
无线传感器网络
物联网系列讲座
专利与奖励
奖励信息
(1) 端管云一体化系统认知的工业物联网态势安全关键技术及应用, 二等奖, 部委级, 2021
(2) 电力工控系统本体安全防护与攻击检测关键技术及应用, 一等奖, 部委级, 2021
(3) 高等学校科学研究优秀成果奖, 二等奖, 省级, 2020
(4) 基于机器学习的网络安全技术研究, 三等奖, 部委级, 2018
(5) 北京市科学技术奖, 三等奖, 省级, 2014
(6) 国家电网公司科技进步奖, 一等奖, 省级, 2012
(2) 电力工控系统本体安全防护与攻击检测关键技术及应用, 一等奖, 部委级, 2021
(3) 高等学校科学研究优秀成果奖, 二等奖, 省级, 2020
(4) 基于机器学习的网络安全技术研究, 三等奖, 部委级, 2018
(5) 北京市科学技术奖, 三等奖, 省级, 2014
(6) 国家电网公司科技进步奖, 一等奖, 省级, 2012
专利成果
[1] 孙利民, 李泽东, 陈新, 吕世超, 李志, 李仕杰. 网络制造系统入侵检测方法、装置及电子设备. CN: CN117336052A, 2024-01-02.
[2] 石志强, 肖群, 孙利民, 吕世超, 丁云杰. 基于蒙特卡罗的工控系统主动防御效果评估方法及装置. CN: CN117353987A, 2024-01-05.
[3] 朱红松, 曾怡诚, 宋站威, 李志, 于楠, 孙利民. 代码测试方法及系统. CN: CN117493164A, 2024-02-02.
[4] 文辉, 李思源, 邓立廷, 张文源, 李志, 孙利民. 恶意软件分类方法、装置、设备和存储介质. CN: CN117407764A, 2024-01-16.
[5] 于楠, 赵智慧, 朱红松, 李红, 孙利民. 边缘节点可信评估方法及相关设备. CN: CN117375885A, 2024-01-09.
[6] 孙利民, 陈晓惠, 文辉, 李志, 吕世超, 朱红松. 一种基于API序列特征的恶意软件对抗样本生成方法. CN: CN117273066A, 2023-12-22.
[7] 石志强, 杨泊宁, 王凯龙, 孙利民, 吕世超, 宋站威, 刘明东, 薛丁钊. 基于二进制重写的模糊测试方法、装置、设备和存储介质. CN: CN117389858A, 2024-01-12.
[8] 石志强, 赵嘉鹏, 吕世超, 孙利民, 文辉, 李志. 恶意代码的评估样本生成方法及装置. CN: CN117195211A, 2023-12-08.
[9] 孙利民, 文辉, 邓立廷, 辛明峰, 李红, 吕世超, 李志. 跨架构的物联网恶意软件分析方法及装置. CN: CN116956286A, 2023-10-27.
[10] 孙利民, 陈新, 付家乐, 路晓, 吕世超, 李志. 工业控制系统的PLC运行时攻击检测方法及系统. CN: CN116880343A, 2023-10-13.
[11] 孙利民, 李仕杰, 吕世超, 陈新, 司帅宗, 吕飞. 数控机床加工状态监测方法及装置. CN: CN116880356A, 2023-10-13.
[12] 孙利民, 刘圃卓, 李志, 刘明东, 宋站威. 污点源识别方法、污点源识别装置、电子设备及介质. CN: CN116956285A, 2023-10-27.
[13] 孙利民, 孙越, 李志, 吕世超, 张卫东, 司帅宗. 基于字段符号表达式的工控协议逆向分析方法. CN: CN116954707A, 2023-10-27.
[14] 孙利民, 孙越, 吕世超, 孙玉砚, 陈新, 李志. 面向工业上位机的工控协议逆向分析方法. CN: CN116800649A, 2023-09-22.
[15] 孙利民, 秦川, 彭佳谦, 张卫东, 吕世超, 李志. 嵌入式设备中网络服务器的模糊测试方法及装置. CN: CN117130906A, 2023-11-28.
[16] 李红, 王勇攀, 刘明东, 吕飞, 孙利民. 相似代码搜索方法及系统. CN: CN117033546A, 2023-11-10.
[17] 石志强, 杨寿国, 李志, 吕世超, 孙利民. 基于符号执行的嵌入式设备固件补丁检测方法及装置. CN: CN117034277A, 2023-11-10.
[18] 孙利民, 李仕杰, 吕世超, 陈新, 李泽东, 吕飞. 数控系统隐蔽攻击检测方法及相关设备. CN: CN117008531A, 2023-11-07.
[19] 王进法, 郑春阳, 张晓峰, 李红, 孙利民. 面向BGP网络的威胁构建方法、装置、电子设备及存储介质. CN: CN116846616A, 2023-10-03.
[20] 吕世超, 丁云杰, 孙利民, 马叶桐, 刘圃卓. 面向工业控制系统的一体化风险评估方法及系统. CN: CN116880375A, 2023-10-13.
[21] 孙利民, 丁云杰, 马叶桐, 吕世超, 刘圃卓. 基于STAMP的工业控制系统的风险识别方法及系统. CN: CN116880374A, 2023-10-13.
[22] 孙利民, 丁云杰, 马叶桐, 吕世超, 袁天伟. 面向工业控制系统的攻击图生成方法及系统. CN: CN116909217A, 2023-10-20.
[23] 孙玉砚, 印君男, 孙嘉伟, 朱红松, 孙利民. 基于联邦学习的模型更新方法及系统. CN: CN116719607A, 2023-09-08.
[24] 薛娜, 秦泳祎, 于楠, 赵小超, 徐顺超, 李志, 孙利民. 信息检索提示方法、装置、电子设备及存储介质. CN: CN116402044A, 2023-07-07.
[25] 吕飞, 孙利民, 李泽东, 吕世超, 潘志文, 薛娜, 孙玉砚. NC代码异常检测方法、装置、设备及存储介质. CN: CN115481396A, 2022-12-16.
[26] 吕飞, 孙利民, 吕世超, 潘志文, 薛娜. 工控流量异常行为防护方法及系统. CN: CN115529162A, 2022-12-27.
[27] 朱红松, 赵森, 王进法, 于楠, 李志, 孙利民. 协议格式分割方法、设备及存储介质. CN: CN115550460A, 2022-12-30.
[28] 孙利民, 丁云杰, 马叶桐, 吕世超, 刘圃卓. 一体化风险攻击树生成方法、装置、电子设备及存储介质. CN: CN114666115B, 2023-02-24.
[29] 孙利民, 丁云杰, 马叶桐, 吕世超, 刘圃卓. 一体化风险攻击树生成方法、装置、电子设备及存储介质. CN: CN114666115A, 2022-06-24.
[30] 于楠, 赵智慧, 朱红松, 王进法, 孙利民. 数据传输与处理可信认证的方法、装置及电子设备. CN: CN114520733A, 2022-05-20.
[31] 孙利民, 孙怡亭, 刘俊矫, 陈新. PLC控制逻辑攻击检测方法及装置. CN: CN114371682A, 2022-04-19.
[32] 孙利民, 方栋梁, 宋站威, 吕世超, 孙玉砚, 朱红松. 模糊测试方法、系统、电子设备及介质. CN: CN113934621A, 2022-01-14.
[33] 孙利民, 刘圃卓, 吕世超, 孙玉砚, 朱红松, 宋站威. 固件内部二进制程序脆弱性发现方法及装置. CN: CN113901459A, 2022-01-07.
[34] 李志, 丁子恒, 徐顺超, 朱红松, 孙利民. 一种二进制软件协议探测载荷的挖掘方法及装置. CN: CN113746819A, 2021-12-03.
[35] 孙利民, 白双朋, 宋站威, 孙玉砚, 李志, 朱红松. 一种安全漏洞测试方法、装置、设备及可读存储介质. CN: CN113722717A, 2021-11-30.
[36] 朱红松, 吴健, 文辉, 陈新, 石志强, 孙利民. 僵尸网络流量分类检测方法、装置、电子设备及存储介质. CN: CN113705604A, 2021-11-26.
[37] 宋站威, 曾怡诚, 王进法, 于楠, 李志, 朱红松, 孙利民. 基于符号执行的漏洞利用点查找方法及装置. CN: CN113656280A, 2021-11-16.
[38] 孙利民, 刘圃卓, 宋站威, 孙玉砚, 顾智敏, 黄伟, 刘伟, 郭雅娟, 姜海涛, 朱道华, 周超, 郭静, 王梓莹. 针对控制设备私有协议的脆弱性发现方法和装置. CN: CN113472739A, 2021-10-01.
[39] 朱红松, 王作广, 边靖飞, 文辉, 李志, 孙利民. 一种社工邮件防御方法、系统、电子设备及存储介质. CN: CN113452599A, 2021-09-28.
[40] 朱红松, 王作广, 边靖飞, 彭佳谦, 文辉, 闫兆腾, 孙利民. 社工攻击应激变换防护方法、系统、电子设备及存储介质. CN: CN113381981A, 2021-09-10.
[41] 朱红松, 王作广, 彭佳谦, 李红, 孙利民. 社工信息保护方法、装置、电子设备和存储介质. CN: CN113141347A, 2021-07-20.
[42] 孙利民, 陈新, 刘凯祥, 谢永芳, 吕世超. ICS入侵检测方法、装置、电子设备和存储介质. CN: CN113067798A, 2021-07-02.
[43] 孙利民, 陈新, 刘凯祥, 谢永芳, 吕世超. 工业防火墙状态检测方法、装置、电子设备及存储介质. CN: CN113098837A, 2021-07-09.
[44] 于楠, 王作广, 黄文军, 朱红松, 孙利民. 社工攻击威胁、事件、场景分析方法、装置及系统. CN: CN112910872A, 2021-06-04.
[45] 石志强, 杨寿国, 曾怡诚, 宋站威, 朱红松, 孙利民. 一种基于二进制程序的漏洞检测方法及相关设备. CN: CN112613040A, 2021-04-06.
[46] 孙利民, 董浩阳, 游建舟, 吕世超, 文辉, 袁天伟. 基于工控业务仿真的PLC蜜罐系统、实现方法及仿真设备. CN: CN112650077A, 2021-04-13.
[47] 李红, 刘培培, 于楠, 文辉, 闫兆腾, 朱红松, 孙利民. 物联网设备数据集构建方法、装置、电子设备和存储介质. CN: CN112445862A, 2021-03-05.
[48] 孙利民, 白双朋, 宋站威, 孙玉砚, 朱红松. 工控漏洞挖掘方法及装置. CN: CN112398839A, 2021-02-23.
[49] 宋站威, 曾怡诚, 刘明东, 朱红松, 李志, 孙利民, 石志强. 一种面向文本配置文件的模糊测试方法及装置. CN: CN111913877B, 2021-09-28.
[50] 石志强, 李明轩, 孙利民, 孙玉砚, 文辉, 吕世超. 一种工业互联网恶意代码识别方法及装置. CN: CN111881446A, 2020-11-03.
[51] 石志强, 李明轩, 孙利民, 孙玉砚, 文辉, 吕世超. 一种工业互联网恶意代码识别方法及装置. CN: CN111881446B, 2023-10-27.
[52] 李红, 胡旭伦, 李志, 于楠, 朱红松, 孙利民. 针对MIPS架构的物联网设备组件版本信息提取方法. CN: CN111580856A, 2020-08-25.
[53] 李红, 胡旭伦, 李志, 于楠, 朱红松, 孙利民. 基于VEX中间语言的物联网设备组件版本信息提取方法. CN: CN111580822A, 2020-08-25.
[54] 朱红松, 王雨城, 王进法, 于楠, 李志, 孙利民. 网络设备地理定位方法及装置. CN: CN111526222B, 2021-07-27.
[55] 周亮, 韩嘉佳, 孙玉砚, 王海翔, 石志强, 应欢, 缪思薇, 孙歆, 韩丽芳, 孙利民, 朱亚运, 吕磅. 一种用于电网嵌入式终端的网络安全审计方法及装置. CN: CN111614611A, 2020-09-01.
[56] 石志强, 张国栋, 杨寿国, 黄晋涛, 李志, 李红, 孙利民. 基于开源组件版本识别的固件脆弱性判别方法及系统. CN: CN111400719A, 2020-07-10.
[57] 朱红松, 赵智慧, 李志, 李红, 于楠, 孙利民. 一种边缘服务迁移方法及装置. CN: CN111381962A, 2020-07-07.
[58] 孙利民, 郑尧文, 宋站威, 刘明东, 朱红松, 石志强. 一种模糊测试中高质量种子生成方法及系统. CN: CN111382067A, 2020-07-07.
[59] 朱红松, 王旭, 李红, 李志, 于楠, 徐顺超, 孙利民. 物联网设备指纹库的精细化方法. CN: CN111680286A, 2020-09-18.
[60] 朱朝阳, 杨寿国, 周亮, 张国栋, 应欢, 王海翔, 缪思薇, 石志强, 孙利民, 韩丽芳. 一种电网嵌入式终端的固件编译优化选项识别方法及装置. CN: CN111444513A, 2020-07-24.
[61] 朱朝阳, 马原, 周亮, 石志强, 缪思薇, 孙利民, 应欢, 韩丽芳, 王海翔. 一种电力固件同源二进制文件关联方法及系统. CN: CN111104674A, 2020-05-05.
[62] 孙利民, 刘俊矫, 陈新, 文辉, 辛明峰, 孙越. 一种工业控制系统的过程控制攻击检测方法及装置. CN: CN110825040B, 2021-02-19.
[63] 文辉, 邓立廷, 朱红松, 孙利民. 物联网恶意软件的可视化分类方法、装置与电子设备. CN: CN110826060A, 2020-02-21.
[64] 李志, 邹宇驰, 朱红松, 于楠, 徐顺超, 闫兆腾, 李红, 孙利民. 一种网络设备探测中端口选择方法及系统. CN: CN110380925A, 2019-10-25.
[65] 石志强, 马原, 张国栋, 杨寿国, 朱红松, 孙利民. 同源二进制代码的检索方法及装置. CN: CN110414238A, 2019-11-05.
[66] 石志强, 张国栋, 杨寿国, 刘明东, 马原, 孙利民. 基于机器学习的大规模嵌入式设备在线固件智能识别方法. CN: CN110413909A, 2019-11-05.
[67] 孙利民, 栾世杰, 吕世超, 游建舟, 石志强, 李红. 用于数控机床的蜜罐方法及装置. CN: CN110351237A, 2019-10-18.
[68] 孙利民, 牛梦瑶, 吕世超, 游建舟, 李红, 石志强. 工控蜜罐攻击数据来源的判别方法及装置. CN: CN110365636A, 2019-10-22.
[69] 吕世超, 张悦阳, 游建舟, 闫兆腾, 孙利民, 朱红松. Conpot工控蜜罐的识别方法. CN: CN110266650A, 2019-09-20.
[70] 吕世超, 牛梦瑶, 游建舟, 孙利民, 朱红松, 石志强. 工控蜜罐系统. CN: CN110351238A, 2019-10-18.
[71] 孙利民, 吕世超, 石志强. 工业控制系统的威胁检测方法及装置. CN: CN110059726A, 2019-07-26.
[72] 于楠, 王旭, 闫兆腾, 朱红松, 孙利民, 丰轩, 李红. 一种物联网设备识别方法、系统、电子设备及存储介质. CN: CN110022308B, 2020-05-29.
[73] 于楠, 王旭, 闫兆腾, 朱红松, 孙利民, 丰轩, 李红. 一种物联网设备识别方法及系统. CN: CN110022308A, 2019-07-16.
[74] 石志强, 张国栋, 杨寿国, 孙利民. 一种针对智能设备固件的脆弱哈希函数的识别与破解方法. CN: CN109740347A, 2019-05-10.
[75] 孙利民, 杨安, 王小山, 孙玉砚, 石志强, 李红. 工控系统的隐蔽攻击的检测方法及装置. CN: CN109361648A, 2019-02-19.
[76] 孙利民, 杨安, 石志强, 李红. 序列攻击的检测方法及装置. CN: CN109344610A, 2019-02-15.
[77] 石志强, 马原, 陈昱, 李红, 孙利民. 同源二进制文件检索方法和装置. CN: CN109063055B, 2021-02-02.
[78] 朱红松, 杨月, 文辉, 石志强, 孙利民. 内网设备类型识别方法及装置. CN: CN108900351A, 2018-11-27.
[79] 常丽娟, 王志豪, 于楠, 朱红松, 孙利民. 一种网络中IP设备的位置确定方法及装置. CN: CN108900566A, 2018-11-27.
[80] 孙利民, 牛月晗, 李志, 黄文军, 朱红松. 一种面向视频监控网络的入侵检测方法、装置及系统. CN: CN108600003A, 2018-09-28.
[81] 孙利民, 陈子琦, 游建舟. 一种基于DCS分布式控制的蜜罐系统. CN: CN108833333A, 2018-11-16.
[82] 孙利民, 陈子琦, 游建舟. 一种蜜罐系统. CN: CN108712370A, 2018-10-26.
[83] 孙利民, 牛月晗, 李志, 黄文军, 朱红松. 一种视频监控网络的异常检测方法及系统. CN: CN108737367A, 2018-11-02.
[84] 石志强, 王思琪, 陈昱, 严彪, 张林, 孙利民. 一种基于多维度的固件Web漏洞检测方法及系统. CN: CN108520180A, 2018-09-11.
[85] 朱红松, 陈千, 程凯, 李红, 孙利民. 针对不安全函数的数据依赖图构建方法及装置. CN: CN108319858A, 2018-07-24.
[86] 石志强, 陈昱, 孙利民, 朱红松, 赵威威. 一种识别同源二进制文件的方法及系统. CN: CN108280197A, 2018-07-13.
[87] 文辉, 李科, 李红, 朱红松, 孙利民. 一种网络威胁情报生成方法及系统. CN: CN108399194A, 2018-08-14.
[88] 朱红松, 刘松, 李志, 于楠, 孙利民. 一种探测网络设备的方法及系统. CN: CN108418727A, 2018-08-17.
[89] 李志, 张晨, 朱红松, 孙利民. 一种签到数据的映射方法及设备. CN: CN107766422A, 2018-03-06.
[90] 石志强, 陈昱, 赵威威, 李红, 孙利民. 一种识别同源二进制文件的方法及系统. CN: CN107704501A, 2018-02-16.
[91] 孙利民, 杨安, 王小山, 石志强, 孙玉砚. 一种工业控制系统序列攻击检测方法及设备. CN: CN107491058A, 2017-12-19.
[92] 孙利民, 易锋, 李红, 王洪涛, 文辉. 一种社交关系推断方法及系统. CN: CN107563402A, 2018-01-09.
[93] 孙利民, 王志豪, 朱红松, 文辉. 一种网络设备定位方法及装置. CN: CN107277121A, 2017-10-20.
[94] 闫兆腾, 丰轩, 白稳平, 朱红松, 孙利民. 一种基于聚类分析的自动化指纹特征提取方法. CN: CN108628876A, 2018-10-09.
[95] 孙利民, 余文豪, 朱红松, 陈千. 一种基于协议状态图深度遍历的工控漏洞挖掘方法. CN: CN106888209A, 2017-06-23.
[96] 宋烨青, 芦翔, 王夏丽, 刘刚, 孙利民. 一种内核源码级的系统调用跟踪方法. CN: CN108228434A, 2018-06-29.
[97] 朱红松, 任春林, 丰轩, 白稳平, 闫兆腾, 李志, 孙利民. 一种基于反馈聚类的网络设备识别方法及系统. CN: CN106850333A, 2017-06-13.
[98] 孙利民, 田莹莹, 芦翔, 文辉, 张园. 一种基于梯度式级联SVM分类器的行人识别方法. CN: CN106778603A, 2017-05-31.
[99] 张园, 孙利民, 芦翔, 文辉, 田莹莹. 一种基于混合特征的带缓存机制的实时行人检测与跟踪方法. CN: CN106778478A, 2017-05-31.
[100] 孙利民, 杨安, 石志强, 其他发明人请求不公开姓名. 一种基于网络报文的序列号识别方法. CN: CN106533955A, 2017-03-22.
[101] 孙利民, 李强, 丰轩, 刘燕. 一种基于智能手机时钟机制的批处理唤醒低功耗方法. CN: CN106445077A, 2017-02-22.
[102] 吕世超, 芦翔, 王小山, 石志强, 孙利民. 一种适用于MIMO RFID系统的身份认证方法. CN: CN106452780A, 2017-02-22.
[103] 葛仕明, 解凯旋, 罗朝, 叶奇挺, 孙利民. 基于级联深度学习的交通标志识别方法和系统. CN: CN106022300A, 2016-10-12.
[104] 孙利民, 李强, 丰轩, 刘燕. 一种网络空间工业控制设备快速检测识别方法. CN: CN105871620A, 2016-08-17.
[105] 石志强, 王中杰, 杨安, 孙利民, 朱红松. 一种自学习协议规则的入侵检测方法. CN: CN105871861A, 2016-08-17.
[106] 石志强, 刘中金, 常青, 陈昱, 孙利民, 朱红松, 王猛涛. 基于神经网络的指令集无关的二进制代码相似性检测方法. CN: CN105868108A, 2016-08-17.
[107] 石志强, 常青, 陈昱, 王猛涛, 孙利民, 朱红松. 一种跨架构的二进制程序漏洞函数关联方法. CN: CN107229563A, 2017-10-03.
[108] 石志强, 陈昱, 王猛涛, 常青, 孙利民, 朱红松. 针对大规模嵌入式设备固件的函数搜索方法和搜索引擎. CN: CN105740477A, 2016-07-06.
[109] 孙利民, 田莹莹, 文辉, 芦翔, 朱红松. 一种基于整数规划的人群密度估计方法. CN: CN105740819A, 2016-07-06.
[110] 黄伟武, 闫兆腾, 郑尧文, 白稳平, 朱红松, 孙利民. 一种网络扫描发包速率探测系统及方法. CN: CN105634868A, 2016-06-01.
[111] 宋烨青, 芦翔, 汪明伟, 魏振宇, 刘刚, 孙利民. 一种基于H.264视频流的密钥同步信息传输方法. CN: CN105704545A, 2016-06-22.
[112] 刘刚, 汪明伟, 宋烨青, 芦翔, 郑为民, 孙利民. 一种视频监控系统日志安全审计方法. CN: CN105721198A, 2016-06-29.
[113] 朱红松, 陶冶, 孙利民, 黄文军, 于楠. 一种室内区域定位优化方法及系统. CN: CN105554879A, 2016-05-04.
[114] 石志强, 刘中金, 王猛涛, 陈昱, 常青, 孙利民. 一种嵌入式设备固件解压成功的判断方法. CN: CN105488531A, 2016-04-13.
[115] 周新运, 张园, 孙利民, 文辉, 芦翔. 一种基于DM8148开发板的运动目标检测与跟踪方法. CN: CN105427343A, 2016-03-23.
[116] 闫兆腾, 黄伟武, 芦翔, 朱红松, 孙利民. 一种事件触发式的MTD防护系统及方法. CN: CN105227540B, 2018-05-08.
[117] 朱红松, 孙利民, 刘玉红, 肖松, 陶冶. 一种基于物理环境感知的计算机访问控制方法及系统. CN: CN105138922A, 2015-12-09.
[118] 石志强, 金永明, 胡晴, 孙利民, 王中杰. 一种适用于工业控制系统的风险评估方法. CN: CN106709613A, 2017-05-24.
[119] 李伟达, 吕世超, 芦翔, 熊乃学, 汪明伟, 周新运, 孙利民. 密钥生成方法. CN: CN105120453A, 2015-12-02.
[120] 陈玉成, 汪明伟, 芦翔, 龚慧芸, 魏振宇, 周新运, 孙利民. 基于Hadoop的密文视频流处理方法、装置、服务器及系统. CN: CN105072456A, 2015-11-18.
[121] 陈玉成, 芦翔, 汪明伟, 熊乃学, 郭春云, 马超, 周新运, 孙利民. 基于Hadoop和Red5的视频点播系统及方法. CN: CN105187855A, 2015-12-23.
[122] 陈玉成, 张园, 汪明伟, 芦翔, 刘刚, 宋烨青, 周新运, 孙利民. 密文视频播放器及播放方法. CN: CN105187912A, 2015-12-23.
[123] 石志强, 陈昱, 孙利民, 朱红松. 一种面向嵌入式设备的固件漏洞检测方法及系统. CN: CN106295335A, 2017-01-04.
[124] 孙利民, 刘玉红, 朱红松, 周新运, 黄文军, 陶冶. 一种具有网络选择功能的多网络覆盖设备及方法. CN: CN105007587A, 2015-10-28.
[125] 闫兆腾, 黄伟武, 芦翔, 朱红松, 孙利民. 一种事件触发式的MTD防护系统及方法. CN: CN104917757A, 2015-09-16.
[126] 朱红松, 孙利民, 刘玉红, 肖松, 陶冶. 一种基于物理环境感知的计算机访问控制方法及系统. CN: CN104866772A, 2015-08-26.
[127] 朱红松, 陶冶, 孙利民, 黄文军, 于楠. 一种室内区域定位优化方法及系统. CN: CN105163382A, 2015-12-16.
[128] 葛仕明, 杜丰宇, 解凯旋, 杨睿, 孙利民. 一种基于分级迭代的大规模图像样本标注方法及系统. CN: CN104850832A, 2015-08-19.
[129] 朱红松, 陈磊, 孙利民, 于楠, 闫兆腾, 黄伟武. 一种海量数据下可靠索引更新系统及方法. CN: CN104899249A, 2015-09-09.
[130] 于楠, 雷迅, 朱红松, 孙利民, 郝轶, 陶冶. 一种物联网资源访问权限控制方法及系统. CN: CN104717206A, 2015-06-17.
[131] 刘庆超, 芦翔, 潘磊, 汪明伟, 吕世超, 周新运, 孙利民. 一种基于H.264编码标准的通用视频加密方法及系统. CN: CN104639943A, 2015-05-20.
[132] 孙利民, 李强, 李志, 朱红松. 一种基于多种异构传感器的排队行为检测方法及系统. CN: CN104581939A, 2015-04-29.
[133] 孙利民, 文辉, 葛仕明, 陈水仙. 一种基于级联字典的人群异常检测方法及系统. CN: CN104504367A, 2015-04-08.
[134] 宋子龙, 倪顺, 朱红松, 于楠, 孙利民. 一种基于长连接的双向调用方法及系统. CN: CN105282128A, 2016-01-27.
[135] 芦翔, 吕世超, 孙利民, 石志强, 朱红松, 潘磊. 一种SIP安全防范视频监控入网控制系统. CN: CN104113547A, 2014-10-22.
[136] 孙利民, 吕世超, 芦翔, 朱红松, 潘磊, 周新运. 一种SIP视频监控联网系统的密钥管理方法及系统. CN: CN104113409A, 2014-10-22.
[137] 葛仕明, 文辉, 杨睿, 陈水仙, 孙利民. 一种基于多摄像头的在线目标跟踪方法及系统. CN: CN104123732A, 2014-10-29.
[138] 葛仕明, 杨睿, 孙利民, 陈水仙, 谢凯旋, 朱红松. 滤波器组训练方法及系统和图像关键点定位方法及系统. CN: CN103955719A, 2014-07-30.
[139] 葛仕明, 杨睿, 陈水仙, 文辉, 孙利民. 一种图像生物特征保护方法和装置及信息恢复方法. CN: CN103955881A, 2014-07-30.
[140] 孙利民, 刘伟, 朱红松, 石玲玲. 网络快速邻居发现机制的组管理方法及系统. CN: CN103889031A, 2014-06-25.
[141] 孙利民, 刘伟, 朱红松, 石玲玲. 一种基于捷径的移动容迟网络快速消息通知方法及装置. CN: CN103716880A, 2014-04-09.
[142] 石志强, 孙利民, 朱红松, 赵忠华, 甘伟, 李晓森, 刘利营, 张晓明. 一种开放型无线传感网性能测试方法及系统. CN: CN103716201A, 2014-04-09.
[143] 芦翔, 孙利民, 朱红松, 周新运, 吕世超, 潘磊. 一种双网络耦合结构协同仿真方法及系统. CN: CN103729232A, 2014-04-16.
[144] 石志强, 甘伟, 孙利民, 刘燕. 一种低功耗有损网络的路由构建方法及系统. CN: CN103619045A, 2014-03-05.
[145] 石志强, 金永明, 孙利民, 芦翔. 一种认证方法及系统. 中国: CN103532718A, 2014-01-22.
[146] 孙利民, 李红, 芦翔, 周新运, 曾轶. 一种Wifi指纹定位的隐私保护方法及装置. CN: CN103442335A, 2013-12-11.
[147] 葛仕明, 文辉, 陈水仙, 秦伟俊, 孙利民. 一种在线视频目标跟踪方法和装置. CN: CN103440668A, 2013-12-11.
[148] 朱红松, 陈磊, 黄文军, 曾轶, 孙利民. 一种异构无线网络拓扑认知方法及系统. CN: CN103476066A, 2013-12-25.
[149] 秦伟俊, 张佳棣, 李波, 孙利民. 移动智能终端Wi-Fi信号数据包的收集装置、方法及系统. CN: CN104349339A, 2015-02-11.
[150] 孙利民, 于重重, 吴子珺, 孙玉砚, 李志. 一种针对特定车辆潜在群体的行驶轨迹预测方法. CN: CN103366566A, 2013-10-23.
[151] 孙玉砚, 于重重, 吴子珺, 李志, 孙利民. 一种黑名单车辆的时空行驶轨迹预测方法. CN: CN103325245A, 2013-09-25.
[152] 陈良银, 王金磊, 张靖宇, 孙利民, 朱红松. 一种基于链路质量的节点休眠调度方法. CN: CN103327518A, 2013-09-25.
[153] 孙利民, 陈良银, 付松涛, 张靖宇, 李志. 基于车辆轨迹的数据传输方法及系统. CN: CN103338441A, 2013-10-02.
[154] 卢翔, 陈良银, 王朝龙, 颜秉姝, 孙利民. 一种基于道路的入侵目标检测方法及系统. CN: CN103338477A, 2013-10-02.
[155] 孙利民, 刘伟, 朱红松, 周新运. 一种信号强度预测方法. CN: CN102780536A, 2012-11-14.
[156] 朱红松, 刘伟, 孙利民, 秦伟俊. 通信调度方法、系统及监测系统和方法. CN: CN102781062A, 2012-11-14.
[157] 蒋文涛, 孙利民, 朱红松, 周新运. 一种时间同步方法. CN: CN102752843B, 2016-04-13.
[158] 孙玉砚, 孙利民, 周新运, 刘燕. 一种公交车到站时间实时预测系统和方法. CN: CN102708701A, 2012-10-03.
[159] 李平, 孙利民, 朱红松. 一种对无线传感器网络中的节点进行无线升级的方法. CN: CN102711095A, 2012-10-03.
[160] 皇甫伟, 张昊, 刘燕, 孙利民. 一种无线传感器网络节点能耗测试设备. CN: CN202918501U, 2013-05-01.
[161] 黄文军, 朱红松, 孙利民, 秦伟俊. 一种用于物品移动检测与报警的嵌入式设备. CN: CN202916932U, 2013-05-01.
[162] 孙利民, 张洋, 吕世超, 李志, 司帅宗, 陈新. 模糊测试方法、装置、设备及可读存储介质. CN: CN118332560A, 2024-07-12.
[163] 李志, 周鑫, 徐顺超, 张祖成, 于楠, 孙利民. web容器识别方法、装置、设备及可读存储介质. CN: CN118337718A, 2024-07-12.
[164] 石志强, 黄晋涛, 吕世超, 宋站威, 张卫东, 孙利民. 补丁存在性检测方法及系统. CN: CN118034720A, 2024-05-14.
[165] 李红, 李思远, 王勇攀, 宋站威, 朱红松, 孙利民. 基于方向识别的复杂重用关系检测方法及装置. CN: CN118012740A, 2024-05-10.
[166] 李红, 刘建铄, 孙梦杰, 文辉, 刘明东, 李志, 孙利民. 针对近场通信回传数据篡改攻击的防护方法及装置. CN: CN117915336A, 2024-04-19.
[167] 李志, 宾浩宇, 朱红松, 于楠, 李红, 孙利民. 设备指纹提取方法、装置、电子设备及存储介质. CN: CN117714419A, 2024-03-15.
[168] 孙利民, 辛明峰, 文辉, 邓立廷, 吕世超, 张卫东. 针对嵌入式固件的模糊测试方法、装置及存储介质. CN: CN117707924A, 2024-03-15.
[169] 孙利民, 辛明峰, 文辉, 邓立廷, 吕世超, 张卫东. 嵌入式设备固件仿真方法、装置及存储介质. CN: CN117539586A, 2024-02-09.
[170] 孙利民, 孙怡亭, 刘俊矫, 陈新. PLC控制逻辑攻击检测方法及装置. CN: CN114371682B, 2024-04-05.
[171] 孙利民, 白双朋, 宋站威, 孙玉砚, 李志, 朱红松. 一种安全漏洞测试方法、装置、设备及可读存储介质. CN: CN113722717B, 2024-04-05.
[172] 宋站威, 曾怡诚, 王进法, 于楠, 李志, 朱红松, 孙利民. 基于符号执行的漏洞利用点查找方法及装置. CN: CN113656280B, 2024-04-05.
[173] 李红, 刘培培, 于楠, 文辉, 闫兆腾, 朱红松, 孙利民. 物联网设备数据集构建方法、装置、电子设备和存储介质. CN: CN112445862B, 2024-01-26.
[174] 朱朝阳, 杨寿国, 周亮, 张国栋, 应欢, 王海翔, 缪思薇, 石志强, 孙利民, 韩丽芳. 一种电网嵌入式终端的固件编译优化选项识别方法及装置. CN: CN111444513B, 2024-03-12.
[2] 石志强, 肖群, 孙利民, 吕世超, 丁云杰. 基于蒙特卡罗的工控系统主动防御效果评估方法及装置. CN: CN117353987A, 2024-01-05.
[3] 朱红松, 曾怡诚, 宋站威, 李志, 于楠, 孙利民. 代码测试方法及系统. CN: CN117493164A, 2024-02-02.
[4] 文辉, 李思源, 邓立廷, 张文源, 李志, 孙利民. 恶意软件分类方法、装置、设备和存储介质. CN: CN117407764A, 2024-01-16.
[5] 于楠, 赵智慧, 朱红松, 李红, 孙利民. 边缘节点可信评估方法及相关设备. CN: CN117375885A, 2024-01-09.
[6] 孙利民, 陈晓惠, 文辉, 李志, 吕世超, 朱红松. 一种基于API序列特征的恶意软件对抗样本生成方法. CN: CN117273066A, 2023-12-22.
[7] 石志强, 杨泊宁, 王凯龙, 孙利民, 吕世超, 宋站威, 刘明东, 薛丁钊. 基于二进制重写的模糊测试方法、装置、设备和存储介质. CN: CN117389858A, 2024-01-12.
[8] 石志强, 赵嘉鹏, 吕世超, 孙利民, 文辉, 李志. 恶意代码的评估样本生成方法及装置. CN: CN117195211A, 2023-12-08.
[9] 孙利民, 文辉, 邓立廷, 辛明峰, 李红, 吕世超, 李志. 跨架构的物联网恶意软件分析方法及装置. CN: CN116956286A, 2023-10-27.
[10] 孙利民, 陈新, 付家乐, 路晓, 吕世超, 李志. 工业控制系统的PLC运行时攻击检测方法及系统. CN: CN116880343A, 2023-10-13.
[11] 孙利民, 李仕杰, 吕世超, 陈新, 司帅宗, 吕飞. 数控机床加工状态监测方法及装置. CN: CN116880356A, 2023-10-13.
[12] 孙利民, 刘圃卓, 李志, 刘明东, 宋站威. 污点源识别方法、污点源识别装置、电子设备及介质. CN: CN116956285A, 2023-10-27.
[13] 孙利民, 孙越, 李志, 吕世超, 张卫东, 司帅宗. 基于字段符号表达式的工控协议逆向分析方法. CN: CN116954707A, 2023-10-27.
[14] 孙利民, 孙越, 吕世超, 孙玉砚, 陈新, 李志. 面向工业上位机的工控协议逆向分析方法. CN: CN116800649A, 2023-09-22.
[15] 孙利民, 秦川, 彭佳谦, 张卫东, 吕世超, 李志. 嵌入式设备中网络服务器的模糊测试方法及装置. CN: CN117130906A, 2023-11-28.
[16] 李红, 王勇攀, 刘明东, 吕飞, 孙利民. 相似代码搜索方法及系统. CN: CN117033546A, 2023-11-10.
[17] 石志强, 杨寿国, 李志, 吕世超, 孙利民. 基于符号执行的嵌入式设备固件补丁检测方法及装置. CN: CN117034277A, 2023-11-10.
[18] 孙利民, 李仕杰, 吕世超, 陈新, 李泽东, 吕飞. 数控系统隐蔽攻击检测方法及相关设备. CN: CN117008531A, 2023-11-07.
[19] 王进法, 郑春阳, 张晓峰, 李红, 孙利民. 面向BGP网络的威胁构建方法、装置、电子设备及存储介质. CN: CN116846616A, 2023-10-03.
[20] 吕世超, 丁云杰, 孙利民, 马叶桐, 刘圃卓. 面向工业控制系统的一体化风险评估方法及系统. CN: CN116880375A, 2023-10-13.
[21] 孙利民, 丁云杰, 马叶桐, 吕世超, 刘圃卓. 基于STAMP的工业控制系统的风险识别方法及系统. CN: CN116880374A, 2023-10-13.
[22] 孙利民, 丁云杰, 马叶桐, 吕世超, 袁天伟. 面向工业控制系统的攻击图生成方法及系统. CN: CN116909217A, 2023-10-20.
[23] 孙玉砚, 印君男, 孙嘉伟, 朱红松, 孙利民. 基于联邦学习的模型更新方法及系统. CN: CN116719607A, 2023-09-08.
[24] 薛娜, 秦泳祎, 于楠, 赵小超, 徐顺超, 李志, 孙利民. 信息检索提示方法、装置、电子设备及存储介质. CN: CN116402044A, 2023-07-07.
[25] 吕飞, 孙利民, 李泽东, 吕世超, 潘志文, 薛娜, 孙玉砚. NC代码异常检测方法、装置、设备及存储介质. CN: CN115481396A, 2022-12-16.
[26] 吕飞, 孙利民, 吕世超, 潘志文, 薛娜. 工控流量异常行为防护方法及系统. CN: CN115529162A, 2022-12-27.
[27] 朱红松, 赵森, 王进法, 于楠, 李志, 孙利民. 协议格式分割方法、设备及存储介质. CN: CN115550460A, 2022-12-30.
[28] 孙利民, 丁云杰, 马叶桐, 吕世超, 刘圃卓. 一体化风险攻击树生成方法、装置、电子设备及存储介质. CN: CN114666115B, 2023-02-24.
[29] 孙利民, 丁云杰, 马叶桐, 吕世超, 刘圃卓. 一体化风险攻击树生成方法、装置、电子设备及存储介质. CN: CN114666115A, 2022-06-24.
[30] 于楠, 赵智慧, 朱红松, 王进法, 孙利民. 数据传输与处理可信认证的方法、装置及电子设备. CN: CN114520733A, 2022-05-20.
[31] 孙利民, 孙怡亭, 刘俊矫, 陈新. PLC控制逻辑攻击检测方法及装置. CN: CN114371682A, 2022-04-19.
[32] 孙利民, 方栋梁, 宋站威, 吕世超, 孙玉砚, 朱红松. 模糊测试方法、系统、电子设备及介质. CN: CN113934621A, 2022-01-14.
[33] 孙利民, 刘圃卓, 吕世超, 孙玉砚, 朱红松, 宋站威. 固件内部二进制程序脆弱性发现方法及装置. CN: CN113901459A, 2022-01-07.
[34] 李志, 丁子恒, 徐顺超, 朱红松, 孙利民. 一种二进制软件协议探测载荷的挖掘方法及装置. CN: CN113746819A, 2021-12-03.
[35] 孙利民, 白双朋, 宋站威, 孙玉砚, 李志, 朱红松. 一种安全漏洞测试方法、装置、设备及可读存储介质. CN: CN113722717A, 2021-11-30.
[36] 朱红松, 吴健, 文辉, 陈新, 石志强, 孙利民. 僵尸网络流量分类检测方法、装置、电子设备及存储介质. CN: CN113705604A, 2021-11-26.
[37] 宋站威, 曾怡诚, 王进法, 于楠, 李志, 朱红松, 孙利民. 基于符号执行的漏洞利用点查找方法及装置. CN: CN113656280A, 2021-11-16.
[38] 孙利民, 刘圃卓, 宋站威, 孙玉砚, 顾智敏, 黄伟, 刘伟, 郭雅娟, 姜海涛, 朱道华, 周超, 郭静, 王梓莹. 针对控制设备私有协议的脆弱性发现方法和装置. CN: CN113472739A, 2021-10-01.
[39] 朱红松, 王作广, 边靖飞, 文辉, 李志, 孙利民. 一种社工邮件防御方法、系统、电子设备及存储介质. CN: CN113452599A, 2021-09-28.
[40] 朱红松, 王作广, 边靖飞, 彭佳谦, 文辉, 闫兆腾, 孙利民. 社工攻击应激变换防护方法、系统、电子设备及存储介质. CN: CN113381981A, 2021-09-10.
[41] 朱红松, 王作广, 彭佳谦, 李红, 孙利民. 社工信息保护方法、装置、电子设备和存储介质. CN: CN113141347A, 2021-07-20.
[42] 孙利民, 陈新, 刘凯祥, 谢永芳, 吕世超. ICS入侵检测方法、装置、电子设备和存储介质. CN: CN113067798A, 2021-07-02.
[43] 孙利民, 陈新, 刘凯祥, 谢永芳, 吕世超. 工业防火墙状态检测方法、装置、电子设备及存储介质. CN: CN113098837A, 2021-07-09.
[44] 于楠, 王作广, 黄文军, 朱红松, 孙利民. 社工攻击威胁、事件、场景分析方法、装置及系统. CN: CN112910872A, 2021-06-04.
[45] 石志强, 杨寿国, 曾怡诚, 宋站威, 朱红松, 孙利民. 一种基于二进制程序的漏洞检测方法及相关设备. CN: CN112613040A, 2021-04-06.
[46] 孙利民, 董浩阳, 游建舟, 吕世超, 文辉, 袁天伟. 基于工控业务仿真的PLC蜜罐系统、实现方法及仿真设备. CN: CN112650077A, 2021-04-13.
[47] 李红, 刘培培, 于楠, 文辉, 闫兆腾, 朱红松, 孙利民. 物联网设备数据集构建方法、装置、电子设备和存储介质. CN: CN112445862A, 2021-03-05.
[48] 孙利民, 白双朋, 宋站威, 孙玉砚, 朱红松. 工控漏洞挖掘方法及装置. CN: CN112398839A, 2021-02-23.
[49] 宋站威, 曾怡诚, 刘明东, 朱红松, 李志, 孙利民, 石志强. 一种面向文本配置文件的模糊测试方法及装置. CN: CN111913877B, 2021-09-28.
[50] 石志强, 李明轩, 孙利民, 孙玉砚, 文辉, 吕世超. 一种工业互联网恶意代码识别方法及装置. CN: CN111881446A, 2020-11-03.
[51] 石志强, 李明轩, 孙利民, 孙玉砚, 文辉, 吕世超. 一种工业互联网恶意代码识别方法及装置. CN: CN111881446B, 2023-10-27.
[52] 李红, 胡旭伦, 李志, 于楠, 朱红松, 孙利民. 针对MIPS架构的物联网设备组件版本信息提取方法. CN: CN111580856A, 2020-08-25.
[53] 李红, 胡旭伦, 李志, 于楠, 朱红松, 孙利民. 基于VEX中间语言的物联网设备组件版本信息提取方法. CN: CN111580822A, 2020-08-25.
[54] 朱红松, 王雨城, 王进法, 于楠, 李志, 孙利民. 网络设备地理定位方法及装置. CN: CN111526222B, 2021-07-27.
[55] 周亮, 韩嘉佳, 孙玉砚, 王海翔, 石志强, 应欢, 缪思薇, 孙歆, 韩丽芳, 孙利民, 朱亚运, 吕磅. 一种用于电网嵌入式终端的网络安全审计方法及装置. CN: CN111614611A, 2020-09-01.
[56] 石志强, 张国栋, 杨寿国, 黄晋涛, 李志, 李红, 孙利民. 基于开源组件版本识别的固件脆弱性判别方法及系统. CN: CN111400719A, 2020-07-10.
[57] 朱红松, 赵智慧, 李志, 李红, 于楠, 孙利民. 一种边缘服务迁移方法及装置. CN: CN111381962A, 2020-07-07.
[58] 孙利民, 郑尧文, 宋站威, 刘明东, 朱红松, 石志强. 一种模糊测试中高质量种子生成方法及系统. CN: CN111382067A, 2020-07-07.
[59] 朱红松, 王旭, 李红, 李志, 于楠, 徐顺超, 孙利民. 物联网设备指纹库的精细化方法. CN: CN111680286A, 2020-09-18.
[60] 朱朝阳, 杨寿国, 周亮, 张国栋, 应欢, 王海翔, 缪思薇, 石志强, 孙利民, 韩丽芳. 一种电网嵌入式终端的固件编译优化选项识别方法及装置. CN: CN111444513A, 2020-07-24.
[61] 朱朝阳, 马原, 周亮, 石志强, 缪思薇, 孙利民, 应欢, 韩丽芳, 王海翔. 一种电力固件同源二进制文件关联方法及系统. CN: CN111104674A, 2020-05-05.
[62] 孙利民, 刘俊矫, 陈新, 文辉, 辛明峰, 孙越. 一种工业控制系统的过程控制攻击检测方法及装置. CN: CN110825040B, 2021-02-19.
[63] 文辉, 邓立廷, 朱红松, 孙利民. 物联网恶意软件的可视化分类方法、装置与电子设备. CN: CN110826060A, 2020-02-21.
[64] 李志, 邹宇驰, 朱红松, 于楠, 徐顺超, 闫兆腾, 李红, 孙利民. 一种网络设备探测中端口选择方法及系统. CN: CN110380925A, 2019-10-25.
[65] 石志强, 马原, 张国栋, 杨寿国, 朱红松, 孙利民. 同源二进制代码的检索方法及装置. CN: CN110414238A, 2019-11-05.
[66] 石志强, 张国栋, 杨寿国, 刘明东, 马原, 孙利民. 基于机器学习的大规模嵌入式设备在线固件智能识别方法. CN: CN110413909A, 2019-11-05.
[67] 孙利民, 栾世杰, 吕世超, 游建舟, 石志强, 李红. 用于数控机床的蜜罐方法及装置. CN: CN110351237A, 2019-10-18.
[68] 孙利民, 牛梦瑶, 吕世超, 游建舟, 李红, 石志强. 工控蜜罐攻击数据来源的判别方法及装置. CN: CN110365636A, 2019-10-22.
[69] 吕世超, 张悦阳, 游建舟, 闫兆腾, 孙利民, 朱红松. Conpot工控蜜罐的识别方法. CN: CN110266650A, 2019-09-20.
[70] 吕世超, 牛梦瑶, 游建舟, 孙利民, 朱红松, 石志强. 工控蜜罐系统. CN: CN110351238A, 2019-10-18.
[71] 孙利民, 吕世超, 石志强. 工业控制系统的威胁检测方法及装置. CN: CN110059726A, 2019-07-26.
[72] 于楠, 王旭, 闫兆腾, 朱红松, 孙利民, 丰轩, 李红. 一种物联网设备识别方法、系统、电子设备及存储介质. CN: CN110022308B, 2020-05-29.
[73] 于楠, 王旭, 闫兆腾, 朱红松, 孙利民, 丰轩, 李红. 一种物联网设备识别方法及系统. CN: CN110022308A, 2019-07-16.
[74] 石志强, 张国栋, 杨寿国, 孙利民. 一种针对智能设备固件的脆弱哈希函数的识别与破解方法. CN: CN109740347A, 2019-05-10.
[75] 孙利民, 杨安, 王小山, 孙玉砚, 石志强, 李红. 工控系统的隐蔽攻击的检测方法及装置. CN: CN109361648A, 2019-02-19.
[76] 孙利民, 杨安, 石志强, 李红. 序列攻击的检测方法及装置. CN: CN109344610A, 2019-02-15.
[77] 石志强, 马原, 陈昱, 李红, 孙利民. 同源二进制文件检索方法和装置. CN: CN109063055B, 2021-02-02.
[78] 朱红松, 杨月, 文辉, 石志强, 孙利民. 内网设备类型识别方法及装置. CN: CN108900351A, 2018-11-27.
[79] 常丽娟, 王志豪, 于楠, 朱红松, 孙利民. 一种网络中IP设备的位置确定方法及装置. CN: CN108900566A, 2018-11-27.
[80] 孙利民, 牛月晗, 李志, 黄文军, 朱红松. 一种面向视频监控网络的入侵检测方法、装置及系统. CN: CN108600003A, 2018-09-28.
[81] 孙利民, 陈子琦, 游建舟. 一种基于DCS分布式控制的蜜罐系统. CN: CN108833333A, 2018-11-16.
[82] 孙利民, 陈子琦, 游建舟. 一种蜜罐系统. CN: CN108712370A, 2018-10-26.
[83] 孙利民, 牛月晗, 李志, 黄文军, 朱红松. 一种视频监控网络的异常检测方法及系统. CN: CN108737367A, 2018-11-02.
[84] 石志强, 王思琪, 陈昱, 严彪, 张林, 孙利民. 一种基于多维度的固件Web漏洞检测方法及系统. CN: CN108520180A, 2018-09-11.
[85] 朱红松, 陈千, 程凯, 李红, 孙利民. 针对不安全函数的数据依赖图构建方法及装置. CN: CN108319858A, 2018-07-24.
[86] 石志强, 陈昱, 孙利民, 朱红松, 赵威威. 一种识别同源二进制文件的方法及系统. CN: CN108280197A, 2018-07-13.
[87] 文辉, 李科, 李红, 朱红松, 孙利民. 一种网络威胁情报生成方法及系统. CN: CN108399194A, 2018-08-14.
[88] 朱红松, 刘松, 李志, 于楠, 孙利民. 一种探测网络设备的方法及系统. CN: CN108418727A, 2018-08-17.
[89] 李志, 张晨, 朱红松, 孙利民. 一种签到数据的映射方法及设备. CN: CN107766422A, 2018-03-06.
[90] 石志强, 陈昱, 赵威威, 李红, 孙利民. 一种识别同源二进制文件的方法及系统. CN: CN107704501A, 2018-02-16.
[91] 孙利民, 杨安, 王小山, 石志强, 孙玉砚. 一种工业控制系统序列攻击检测方法及设备. CN: CN107491058A, 2017-12-19.
[92] 孙利民, 易锋, 李红, 王洪涛, 文辉. 一种社交关系推断方法及系统. CN: CN107563402A, 2018-01-09.
[93] 孙利民, 王志豪, 朱红松, 文辉. 一种网络设备定位方法及装置. CN: CN107277121A, 2017-10-20.
[94] 闫兆腾, 丰轩, 白稳平, 朱红松, 孙利民. 一种基于聚类分析的自动化指纹特征提取方法. CN: CN108628876A, 2018-10-09.
[95] 孙利民, 余文豪, 朱红松, 陈千. 一种基于协议状态图深度遍历的工控漏洞挖掘方法. CN: CN106888209A, 2017-06-23.
[96] 宋烨青, 芦翔, 王夏丽, 刘刚, 孙利民. 一种内核源码级的系统调用跟踪方法. CN: CN108228434A, 2018-06-29.
[97] 朱红松, 任春林, 丰轩, 白稳平, 闫兆腾, 李志, 孙利民. 一种基于反馈聚类的网络设备识别方法及系统. CN: CN106850333A, 2017-06-13.
[98] 孙利民, 田莹莹, 芦翔, 文辉, 张园. 一种基于梯度式级联SVM分类器的行人识别方法. CN: CN106778603A, 2017-05-31.
[99] 张园, 孙利民, 芦翔, 文辉, 田莹莹. 一种基于混合特征的带缓存机制的实时行人检测与跟踪方法. CN: CN106778478A, 2017-05-31.
[100] 孙利民, 杨安, 石志强, 其他发明人请求不公开姓名. 一种基于网络报文的序列号识别方法. CN: CN106533955A, 2017-03-22.
[101] 孙利民, 李强, 丰轩, 刘燕. 一种基于智能手机时钟机制的批处理唤醒低功耗方法. CN: CN106445077A, 2017-02-22.
[102] 吕世超, 芦翔, 王小山, 石志强, 孙利民. 一种适用于MIMO RFID系统的身份认证方法. CN: CN106452780A, 2017-02-22.
[103] 葛仕明, 解凯旋, 罗朝, 叶奇挺, 孙利民. 基于级联深度学习的交通标志识别方法和系统. CN: CN106022300A, 2016-10-12.
[104] 孙利民, 李强, 丰轩, 刘燕. 一种网络空间工业控制设备快速检测识别方法. CN: CN105871620A, 2016-08-17.
[105] 石志强, 王中杰, 杨安, 孙利民, 朱红松. 一种自学习协议规则的入侵检测方法. CN: CN105871861A, 2016-08-17.
[106] 石志强, 刘中金, 常青, 陈昱, 孙利民, 朱红松, 王猛涛. 基于神经网络的指令集无关的二进制代码相似性检测方法. CN: CN105868108A, 2016-08-17.
[107] 石志强, 常青, 陈昱, 王猛涛, 孙利民, 朱红松. 一种跨架构的二进制程序漏洞函数关联方法. CN: CN107229563A, 2017-10-03.
[108] 石志强, 陈昱, 王猛涛, 常青, 孙利民, 朱红松. 针对大规模嵌入式设备固件的函数搜索方法和搜索引擎. CN: CN105740477A, 2016-07-06.
[109] 孙利民, 田莹莹, 文辉, 芦翔, 朱红松. 一种基于整数规划的人群密度估计方法. CN: CN105740819A, 2016-07-06.
[110] 黄伟武, 闫兆腾, 郑尧文, 白稳平, 朱红松, 孙利民. 一种网络扫描发包速率探测系统及方法. CN: CN105634868A, 2016-06-01.
[111] 宋烨青, 芦翔, 汪明伟, 魏振宇, 刘刚, 孙利民. 一种基于H.264视频流的密钥同步信息传输方法. CN: CN105704545A, 2016-06-22.
[112] 刘刚, 汪明伟, 宋烨青, 芦翔, 郑为民, 孙利民. 一种视频监控系统日志安全审计方法. CN: CN105721198A, 2016-06-29.
[113] 朱红松, 陶冶, 孙利民, 黄文军, 于楠. 一种室内区域定位优化方法及系统. CN: CN105554879A, 2016-05-04.
[114] 石志强, 刘中金, 王猛涛, 陈昱, 常青, 孙利民. 一种嵌入式设备固件解压成功的判断方法. CN: CN105488531A, 2016-04-13.
[115] 周新运, 张园, 孙利民, 文辉, 芦翔. 一种基于DM8148开发板的运动目标检测与跟踪方法. CN: CN105427343A, 2016-03-23.
[116] 闫兆腾, 黄伟武, 芦翔, 朱红松, 孙利民. 一种事件触发式的MTD防护系统及方法. CN: CN105227540B, 2018-05-08.
[117] 朱红松, 孙利民, 刘玉红, 肖松, 陶冶. 一种基于物理环境感知的计算机访问控制方法及系统. CN: CN105138922A, 2015-12-09.
[118] 石志强, 金永明, 胡晴, 孙利民, 王中杰. 一种适用于工业控制系统的风险评估方法. CN: CN106709613A, 2017-05-24.
[119] 李伟达, 吕世超, 芦翔, 熊乃学, 汪明伟, 周新运, 孙利民. 密钥生成方法. CN: CN105120453A, 2015-12-02.
[120] 陈玉成, 汪明伟, 芦翔, 龚慧芸, 魏振宇, 周新运, 孙利民. 基于Hadoop的密文视频流处理方法、装置、服务器及系统. CN: CN105072456A, 2015-11-18.
[121] 陈玉成, 芦翔, 汪明伟, 熊乃学, 郭春云, 马超, 周新运, 孙利民. 基于Hadoop和Red5的视频点播系统及方法. CN: CN105187855A, 2015-12-23.
[122] 陈玉成, 张园, 汪明伟, 芦翔, 刘刚, 宋烨青, 周新运, 孙利民. 密文视频播放器及播放方法. CN: CN105187912A, 2015-12-23.
[123] 石志强, 陈昱, 孙利民, 朱红松. 一种面向嵌入式设备的固件漏洞检测方法及系统. CN: CN106295335A, 2017-01-04.
[124] 孙利民, 刘玉红, 朱红松, 周新运, 黄文军, 陶冶. 一种具有网络选择功能的多网络覆盖设备及方法. CN: CN105007587A, 2015-10-28.
[125] 闫兆腾, 黄伟武, 芦翔, 朱红松, 孙利民. 一种事件触发式的MTD防护系统及方法. CN: CN104917757A, 2015-09-16.
[126] 朱红松, 孙利民, 刘玉红, 肖松, 陶冶. 一种基于物理环境感知的计算机访问控制方法及系统. CN: CN104866772A, 2015-08-26.
[127] 朱红松, 陶冶, 孙利民, 黄文军, 于楠. 一种室内区域定位优化方法及系统. CN: CN105163382A, 2015-12-16.
[128] 葛仕明, 杜丰宇, 解凯旋, 杨睿, 孙利民. 一种基于分级迭代的大规模图像样本标注方法及系统. CN: CN104850832A, 2015-08-19.
[129] 朱红松, 陈磊, 孙利民, 于楠, 闫兆腾, 黄伟武. 一种海量数据下可靠索引更新系统及方法. CN: CN104899249A, 2015-09-09.
[130] 于楠, 雷迅, 朱红松, 孙利民, 郝轶, 陶冶. 一种物联网资源访问权限控制方法及系统. CN: CN104717206A, 2015-06-17.
[131] 刘庆超, 芦翔, 潘磊, 汪明伟, 吕世超, 周新运, 孙利民. 一种基于H.264编码标准的通用视频加密方法及系统. CN: CN104639943A, 2015-05-20.
[132] 孙利民, 李强, 李志, 朱红松. 一种基于多种异构传感器的排队行为检测方法及系统. CN: CN104581939A, 2015-04-29.
[133] 孙利民, 文辉, 葛仕明, 陈水仙. 一种基于级联字典的人群异常检测方法及系统. CN: CN104504367A, 2015-04-08.
[134] 宋子龙, 倪顺, 朱红松, 于楠, 孙利民. 一种基于长连接的双向调用方法及系统. CN: CN105282128A, 2016-01-27.
[135] 芦翔, 吕世超, 孙利民, 石志强, 朱红松, 潘磊. 一种SIP安全防范视频监控入网控制系统. CN: CN104113547A, 2014-10-22.
[136] 孙利民, 吕世超, 芦翔, 朱红松, 潘磊, 周新运. 一种SIP视频监控联网系统的密钥管理方法及系统. CN: CN104113409A, 2014-10-22.
[137] 葛仕明, 文辉, 杨睿, 陈水仙, 孙利民. 一种基于多摄像头的在线目标跟踪方法及系统. CN: CN104123732A, 2014-10-29.
[138] 葛仕明, 杨睿, 孙利民, 陈水仙, 谢凯旋, 朱红松. 滤波器组训练方法及系统和图像关键点定位方法及系统. CN: CN103955719A, 2014-07-30.
[139] 葛仕明, 杨睿, 陈水仙, 文辉, 孙利民. 一种图像生物特征保护方法和装置及信息恢复方法. CN: CN103955881A, 2014-07-30.
[140] 孙利民, 刘伟, 朱红松, 石玲玲. 网络快速邻居发现机制的组管理方法及系统. CN: CN103889031A, 2014-06-25.
[141] 孙利民, 刘伟, 朱红松, 石玲玲. 一种基于捷径的移动容迟网络快速消息通知方法及装置. CN: CN103716880A, 2014-04-09.
[142] 石志强, 孙利民, 朱红松, 赵忠华, 甘伟, 李晓森, 刘利营, 张晓明. 一种开放型无线传感网性能测试方法及系统. CN: CN103716201A, 2014-04-09.
[143] 芦翔, 孙利民, 朱红松, 周新运, 吕世超, 潘磊. 一种双网络耦合结构协同仿真方法及系统. CN: CN103729232A, 2014-04-16.
[144] 石志强, 甘伟, 孙利民, 刘燕. 一种低功耗有损网络的路由构建方法及系统. CN: CN103619045A, 2014-03-05.
[145] 石志强, 金永明, 孙利民, 芦翔. 一种认证方法及系统. 中国: CN103532718A, 2014-01-22.
[146] 孙利民, 李红, 芦翔, 周新运, 曾轶. 一种Wifi指纹定位的隐私保护方法及装置. CN: CN103442335A, 2013-12-11.
[147] 葛仕明, 文辉, 陈水仙, 秦伟俊, 孙利民. 一种在线视频目标跟踪方法和装置. CN: CN103440668A, 2013-12-11.
[148] 朱红松, 陈磊, 黄文军, 曾轶, 孙利民. 一种异构无线网络拓扑认知方法及系统. CN: CN103476066A, 2013-12-25.
[149] 秦伟俊, 张佳棣, 李波, 孙利民. 移动智能终端Wi-Fi信号数据包的收集装置、方法及系统. CN: CN104349339A, 2015-02-11.
[150] 孙利民, 于重重, 吴子珺, 孙玉砚, 李志. 一种针对特定车辆潜在群体的行驶轨迹预测方法. CN: CN103366566A, 2013-10-23.
[151] 孙玉砚, 于重重, 吴子珺, 李志, 孙利民. 一种黑名单车辆的时空行驶轨迹预测方法. CN: CN103325245A, 2013-09-25.
[152] 陈良银, 王金磊, 张靖宇, 孙利民, 朱红松. 一种基于链路质量的节点休眠调度方法. CN: CN103327518A, 2013-09-25.
[153] 孙利民, 陈良银, 付松涛, 张靖宇, 李志. 基于车辆轨迹的数据传输方法及系统. CN: CN103338441A, 2013-10-02.
[154] 卢翔, 陈良银, 王朝龙, 颜秉姝, 孙利民. 一种基于道路的入侵目标检测方法及系统. CN: CN103338477A, 2013-10-02.
[155] 孙利民, 刘伟, 朱红松, 周新运. 一种信号强度预测方法. CN: CN102780536A, 2012-11-14.
[156] 朱红松, 刘伟, 孙利民, 秦伟俊. 通信调度方法、系统及监测系统和方法. CN: CN102781062A, 2012-11-14.
[157] 蒋文涛, 孙利民, 朱红松, 周新运. 一种时间同步方法. CN: CN102752843B, 2016-04-13.
[158] 孙玉砚, 孙利民, 周新运, 刘燕. 一种公交车到站时间实时预测系统和方法. CN: CN102708701A, 2012-10-03.
[159] 李平, 孙利民, 朱红松. 一种对无线传感器网络中的节点进行无线升级的方法. CN: CN102711095A, 2012-10-03.
[160] 皇甫伟, 张昊, 刘燕, 孙利民. 一种无线传感器网络节点能耗测试设备. CN: CN202918501U, 2013-05-01.
[161] 黄文军, 朱红松, 孙利民, 秦伟俊. 一种用于物品移动检测与报警的嵌入式设备. CN: CN202916932U, 2013-05-01.
[162] 孙利民, 张洋, 吕世超, 李志, 司帅宗, 陈新. 模糊测试方法、装置、设备及可读存储介质. CN: CN118332560A, 2024-07-12.
[163] 李志, 周鑫, 徐顺超, 张祖成, 于楠, 孙利民. web容器识别方法、装置、设备及可读存储介质. CN: CN118337718A, 2024-07-12.
[164] 石志强, 黄晋涛, 吕世超, 宋站威, 张卫东, 孙利民. 补丁存在性检测方法及系统. CN: CN118034720A, 2024-05-14.
[165] 李红, 李思远, 王勇攀, 宋站威, 朱红松, 孙利民. 基于方向识别的复杂重用关系检测方法及装置. CN: CN118012740A, 2024-05-10.
[166] 李红, 刘建铄, 孙梦杰, 文辉, 刘明东, 李志, 孙利民. 针对近场通信回传数据篡改攻击的防护方法及装置. CN: CN117915336A, 2024-04-19.
[167] 李志, 宾浩宇, 朱红松, 于楠, 李红, 孙利民. 设备指纹提取方法、装置、电子设备及存储介质. CN: CN117714419A, 2024-03-15.
[168] 孙利民, 辛明峰, 文辉, 邓立廷, 吕世超, 张卫东. 针对嵌入式固件的模糊测试方法、装置及存储介质. CN: CN117707924A, 2024-03-15.
[169] 孙利民, 辛明峰, 文辉, 邓立廷, 吕世超, 张卫东. 嵌入式设备固件仿真方法、装置及存储介质. CN: CN117539586A, 2024-02-09.
[170] 孙利民, 孙怡亭, 刘俊矫, 陈新. PLC控制逻辑攻击检测方法及装置. CN: CN114371682B, 2024-04-05.
[171] 孙利民, 白双朋, 宋站威, 孙玉砚, 李志, 朱红松. 一种安全漏洞测试方法、装置、设备及可读存储介质. CN: CN113722717B, 2024-04-05.
[172] 宋站威, 曾怡诚, 王进法, 于楠, 李志, 朱红松, 孙利民. 基于符号执行的漏洞利用点查找方法及装置. CN: CN113656280B, 2024-04-05.
[173] 李红, 刘培培, 于楠, 文辉, 闫兆腾, 朱红松, 孙利民. 物联网设备数据集构建方法、装置、电子设备和存储介质. CN: CN112445862B, 2024-01-26.
[174] 朱朝阳, 杨寿国, 周亮, 张国栋, 应欢, 王海翔, 缪思薇, 石志强, 孙利民, 韩丽芳. 一种电网嵌入式终端的固件编译优化选项识别方法及装置. CN: CN111444513B, 2024-03-12.
出版信息
发表论文
[1] 孙越, 杨寿国, 吕世超, 李志, 孙利民. Concrete Constraint Guided Symbolic Execution. International Conference on Software Engineering (ICSE) (CCF-A). 2024, 第 5 作者 通讯作者 https://dl.acm.org/doi/pdf/10.1145/3597503.3639078.
[2] Li, Siyuan, Wang, Yongpan, Dong, Chaopeng, Yang, Shouguo, Li, Hong, Sun, Hao, Lang, Zhe, Chen, Zuxin, Wang, Weijie, Zhu, Hongsong, Sun, Limin. LibAM: An Area Matching Framework for Detecting Third-Party Libraries in Binaries. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY[J]. 2024, 第 11 作者33(2): http://dx.doi.org/10.1145/3625294.
[3] Senming Yan, Lei Shi, Jing Ren, Wei Wang, Yaxin Liu, 孙利民, Xiong Wang, Wei Zhang. Log-based Anomaly Detection with Transformers Pre-trained on Large-scale Unlabeled Data. 2024 IEEE International Conference on Communications (ICC). 2024, 第 6 作者null(null):
[4] Liu, Peipei, Wang, Gaosheng, Li, Hong, Liu, Jie, Ren, Yimo, Zhu, Hongsong, Sun, Limin. Multi-granularity cross-modal representation learning for named entity recognition on social media. INFORMATION PROCESSING & MANAGEMENT[J]. 2024, 第 7 作者61(1): http://dx.doi.org/10.1016/j.ipm.2023.103546.
[5] 赵智慧, 宾浩宇, 李红, 于楠, 朱红松, 孙利民. FeaShare: Feature Sharing for Computation Correctness in Edge Preprocessing. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2024, 第 6 作者23(12):
[6] Jianshuo Liu, Hong Li, Mengjie Sun, Haining Wang, Hui Wen, Zhi Li, 孙利民. NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal. 2024 IEEE Symposium on Security and Privacy. 2024, 第 7 作者null(null):
[7] Li, Ke, Wang, Haining, Zhou, Ming, Zhu, Hongsong, Sun, Limin. Cascading Threat Analysis of IoT Devices in Trigger-Action Platforms. IEEE INTERNET OF THINGS JOURNAL[J]. 2024, 第 5 作者11(7): 12240-12251, http://dx.doi.org/10.1109/JIOT.2023.3335279.
[8] 郎哲, Zhengzi Xu, Xiaohui Chen, 吕世超, 宋站威, 石志强, 孙利民. DeLink: Source File Information Recovery in Binaries. Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (CCF A). 2024, 第 7 作者null(null): https://dl.acm.org/doi/abs/10.1145/3660782.
[9] 李仕杰, Yuqi Chen, 陈新, 李泽东, 方栋梁, Kaixiang Liu, 吕世超, 孙利民. PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2024, 第 8 作者 通讯作者 19(null):
[10] Li, Zedong, Chen, Xin, Chen, Yuqi, Li, Shijie, Wang, Hangyu, Lv, Shichao, Sun, Limin. Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach. IEEE INTERNET OF THINGS JOURNAL[J]. 2024, 第 7 作者 通讯作者 11(10): 17602-17614, http://dx.doi.org/10.1109/JIOT.2024.3358798.
[11] Cen Zhang, Yaowen Zheng, Mingqiang Bai, Yeting Li, Wei Ma, Xiaofei Xie, Yuekang Li, 孙利民, Yang Liu. How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation. 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA '24). 2024, 第 8 作者null(null):
[12] 张小玲, ZHENGZI XU, 杨寿国, 李志, 石志强, 孙利民. Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-task Learning(CCF A). Proceedings of the ACM on Software Engineering(CCF A). 2024, 第 6 作者null(null): https://dl.acm.org/doi/abs/10.1145/3660782.
[13] Song, Jinke, Wan, Shangfeng, Huang, Min, Liu, Jiqiang, Sun, Limin, Li, Qiang. Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild. ACM TRANSACTIONS ON SENSOR NETWORKS[J]. 2024, 第 5 作者20(1): http://dx.doi.org/10.1145/3608951.
[14] Liu, Puzhuo, Zheng, Yaowen, Sun, Chengnian, Li, Hong, Li, Zhi, Sun, Limin. Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY[J]. 2024, 第 6 作者33(4): http://dx.doi.org/10.1145/3641847.
[15] Anni Peng, Dongliang Fang, Le Guan, ERIK VAN DER KOUWE, Yin Li, Wenwen Wang, 孙利民, Yuqing Zhang. Bitmap-Based Security Monitoring for Deeply Embedded Systems. ACM Transactions on Software Engineering and Methodology (TOSEM)[J]. 2024, 第 7 作者33(7):
[16] Yang Zhang, Dongliang Fang, Puzhuo Liu, Laile Xi, Xiao Lu, Xin Chen, Shuaizong Si, 孙利民. MSGFuzzer: Message Sequence Guided Industrial Robot Protocol Fuzzing. 2024 IEEE Conference on Software Testing, Verification and Validation (ICST). 2024, 第 8 作者null(null):
[17] Zhao, Zhihui, Zhao, Sen, Lv, Fei, Si, Shuaizong, Zhu, Hongsong, Sun, Limin. RIETD: A Reputation Incentive Scheme Facilitates Personalized Edge Tampering Detection. IEEE INTERNET OF THINGS JOURNAL[J]. 2024, 第 6 作者11(8): 14771-14788, http://dx.doi.org/10.1109/JIOT.2023.3344709.
[18] 周明, Haining Wang, Ke Li, 朱红松, 孙利民. Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs. 19th European Conference on Computer Systems (EuroSys '24). 2024, 第 5 作者null(null):
[19] Chunyang Zheng, Jinfa Wang, Shuaizong Si, Zhi Li, Nan Yu, 孙利民. MOMR: A Threat in Web Application Due to the Malicious Orchestration of Microservice Requests. 2024 IEEE International Conference on Communications (ICC): Communication and Information System Security Symposium. 2024, 第 6 作者null(null):
[20] 任一墨, 王进法, 刘洁, 刘培培, 李红, 朱红松, 孙利民. A Relation-Aware Heterogeneous Graph Transformer on Dynamic Fusion for Multimodal Classification Tasks. ICASSP. 2024, 第 7 作者null(null): https://ieeexplore.ieee.org/document/10446972.
[21] Puzhuo liu, Yaowen Zheng, Sun Chengnian, HONG LI, ZHI LI, Limin Sun. Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers. TOSEM[J]. 2024, 第 6 作者null(null):
[22] 董超鹏, 李思远, 杨寿国, 肖扬, 王勇攀, 李红, 李志, 孙利民. LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries. International Conference on Software Engineering (ICSE) (CCF-A). 2024, 第 8 作者null(null):
[23] Yang, Kai, Li, Qiang, Wang, Haining, Sun, Limin, Liu, Jiqiang. Fingerprinting Industrial IoT devices based on multi-branch neural network. EXPERT SYSTEMS WITH APPLICATIONS[J]. 2024, 第 4 作者238(null): http://dx.doi.org/10.1016/j.eswa.2023.122371.
[24] Jintao Huang, Kai Yang, Gaosheng Wang, 石志强, Shichao Lv, Limin Sun. TaiE: Function Identification for Monolithic Firmware. International Conference on Program Comprehension(CCF B). 2024, 第 6 作者
[25] Puzhuo liu, Yaowen Zheng, Sun Chengnian, Chuan Qin, Dongliang Fang, Mingdong Liu, Limin Sun. FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware. ASPLOS. 2024, 第 7 作者null(null):
[26] 刘培培, 李红, 任一墨, 刘洁, 司帅宗, 朱红松, 孙利民. Hierarchical Aligned Multimodal Learning for NER on Tweet Posts. AAAI. 2024, 第 7 作者null(null): https://ojs.aaai.org/index.php/AAAI/article/view/29831.
[27] 杨寿国, 董超鹏, 肖扬, 程怡然, 石志强, 李志, 孙利民. Asteria-Pro: Enhancing Deep-Learning Based Binary Code Similarity Detection by Incorporating Domain Knowledge. ACM Transactions on Software Engineering and Methodology (CCF-A)[J]. 2024, 第 7 作者33(1): 1-40,
[28] 刘培培, 王高升, 李红, 刘洁, 任一墨, 朱红松, 孙利民. Multi-Granularity Cross-Modality Representation Learning for Named Entity Recognition on Social Media. IPM[J]. 2023, 第 7 作者https://www.sciencedirect.com/science/article/pii/S0306457323002832.
[29] 李思远, 王勇攀, 董超鹏, 杨寿国, 李红, 孙昊, 郎哲, 陈祖欣, 王伟杰, 朱红松, 孙利民. LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries. TOSEM[J]. 2023, 第 11 作者https://dl.acm.org/doi/10.1145/3625294.
[30] 郑春阳, 王进法, 司帅宗, 张卫东, 孙利民. ChainDet: A Traffic-Based Detection Method of Microservice Chains. IEEE International Performance Computing and Communications Conference. 2023, 第 5 作者
[31] Yan, Senming, Ren, Jing, Wang, Wei, Sun, Limin, Zhang, Wei, Yu, Quan. A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS[J]. 2023, 第 4 作者25(1): 467-496, http://dx.doi.org/10.1109/COMST.2022.3225137.
[32] Wang, Xifeng, Zhu, Hongsong, Xiao, Han, Zhou, Zan, Yang, Shujie, Sun, Limin. Blockchain-enhanced trust management for mobile edge computing-enabled intelligent vehicular collaboration in the 6G era. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES[J]. 2023, 第 6 作者34(7): http://dx.doi.org/10.1002/ett.4791.
[33] 张杰, 文辉, 邓力廷, 辛明峰, 李志, 李伦, 朱红松, 孙利民. HackMentor: Fine-Tuning Large Language Models for Cybersecurity. TrustCom2023. 2023, 第 8 作者
[34] 刘培培, 李红, 王志宇, 任一墨, 刘洁, 吕飞, 朱红松, 孙利民. CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises. International Joint Conference on Neural Networks. 2023, 第 8 作者https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10191251.
[35] 陈晓惠, 崔磊, 文辉, 李志, 朱红松, 郝志宇, 孙利民. MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors. Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 2023, 第 7 作者 通讯作者
[36] 宾浩宇, 赵森, 李志, 于楠, 席荣荣, 朱红松, 孙利民. UID-Auto-Gen: Extracting Device Fingerprinting from Network Traffic. IEEE International Performance Computing and Communications Conference. 2023, 第 7 作者
[37] 闫兆腾, 李志, 李红, 杨寿国, 朱红松, 孙利民. Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2023, 第 6 作者20(5): 3890-3909, https://ieeexplore.ieee.org/document/9954619.
[38] Yimo Ren, Hong Li, Peipei Liu, Jie Liu, Hongsong Zhu, Limin Sun. Owner name entity recognition in websites based on multiscale features and multimodal co-attention. EXPERT SYSTEMS WITH APPLICATIONS. 2023, 第 6 作者224: http://dx.doi.org/10.1016/j.eswa.2023.120014.
[39] Chuan Qin, Jiaqian Peng, Puzhuo Liu, Yaowen Zheng, Kai Cheng, Weidong Zhang, Limin Sun. UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router. COMPUTERS & SECURITY[J]. 2023, 第 7 作者 通讯作者 128(null): http://dx.doi.org/10.1016/j.cose.2023.103157.
[40] 王高升, 刘培培, 黄晋涛, 司帅宗, 朱红松, 孙利民. CSEDesc: CyberSecurity Event Detection with Event Description. International Conference on Artificial Neural Networks. 2023, 第 6 作者https://link.springer.com/chapter/10.1007/978-3-031-44213-1_3.
[41] 任一墨, 王进法, 李红, 朱红松, 孙利民. DeviceGPT: A Generative Pre-Training Transformer on the Heterogenous Graph for Internet of Things. International Conference on Research on Development in Information Retrieval. 2023, 第 5 作者https://dl.acm.org/doi/pdf/10.1145/3539618.3591972.
[42] 李思源, 文辉, 邓立廷, 周宇, 张文源, 李志, 孙利民. Denoising Network of Dynamic Features for Enhanced Malware Classification. IEEE International Performance Computing and Communications Conference. 2023, 第 7 作者
[43] Kai Cheng, Yaowen Zheng, Tao Liu, Guan Le, Peng Liu, Hong Li, Hongsong Zhu, Kejiang Ye, Limin Sun. Detecting Vulnerabilities in Linux-based Embedded Firmware with SSE-based On-demand Alias Analysis. ISSTA'23. 2023, 第 9 作者
[44] 任一墨, 李志, 李红, 刘培培, 刘洁, 朱红松, 孙利民. ip2text A Reasoning-Aware Dataset for Text Generation of Devices on the Internet. Database Systems for Advanced Applications. 2023, 第 7 作者https://link.springer.com/chapter/10.1007/978-3-031-35415-1_2.
[45] Ren, Yimo, Li, Hong, Liu, Peipei, Liu, Jie, Zhu, Hongsong, Sun, Limin. CL-GAN: A GAN-based continual learning model for generating and detecting AGDs. COMPUTERS & SECURITY[J]. 2023, 第 6 作者131: http://dx.doi.org/10.1016/j.cose.2023.103317.
[46] 孙怡亭, 郭越, 李长进, 张红军, 刘康, 刘俊矫, 孙利民. 可编程逻辑控制器的控制逻辑注入攻击入侵检测方法. 计算机应用[J]. 2023, 第 7 作者43(6): 1861-1869, http://lib.cqvip.com/Qikan/Article/Detail?id=7109941717.
[47] 郑尧文, 文辉, 程凯, 李红, 朱红松, 孙利民. 物联网安全威胁与安全模型. 信息安全学报[J]. 2023, 第 6 作者8(5): 81-95, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20230506&flag=1.
[48] 杨寿国, Zhengzi Xu, 肖扬, Zhe Lang, 唐伟, Yang Liu, 石志强, 李红, 孙利民. Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis. ACM Transactions on Software Engineering and Methodology (TOSEM) (CCF-A)[J]. 2023, 第 9 作者
[49] Ren, Yimo, Li, Hong, Liu, Peipei, Liu, Jie, Li, Zhi, Zhu, Hongsong, Sun, Limin. Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer. KNOWLEDGE AND INFORMATION SYSTEMS[J]. 2023, 第 7 作者65(10): 4411-4429, http://dx.doi.org/10.1007/s10115-023-01908-4.
[50] Ren, Yimo, Li, Hong, Liu, Peipei, Liu, Jie, Zhu, Hongsong, Sun, Limin. Multiview Embedding with Partial Labels to Recognize Users of Devices Based on Unified Transformer. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS[J]. 2023, 第 6 作者2023: http://dx.doi.org/10.1155/2023/3138551.
[51] Chen, Yanru, Yin, Fengming, Hu, Shunfang, Sun, Limin, Li, Yang, Xing, Bin, Chen, Liangyin, Guo, Bing. ECC-Based Authenticated Key Agreement Protocol for Industrial Control System. IEEE INTERNET OF THINGS JOURNAL[J]. 2023, 第 4 作者10(6): 4688-4697, http://dx.doi.org/10.1109/JIOT.2022.3219233.
[52] 孙越, 李志, 吕世超, 孙利民. Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2023, 第 4 作者https://ieeexplore.ieee.org/abstract/document/9978697/metrics#metrics.
[53] Cheng, Yiran, Yang, Shouguo, Lang, Zhe, Shi, Zhiqiang, Sun, Limin. VERI: A Large-scale Open-Source Components Vulnerability Detection in IoT Firmware. COMPUTERS & SECURITY(CCF B)[J]. 2023, 第 5 作者126: http://dx.doi.org/10.1016/j.cose.2022.103068.
[54] 邓立廷, 文辉, 辛明峰, 李红, 潘志文, 孙利民. ENIMANAL: Augmented Cross-Architecture IoT Malware Analysis using Graph Neural Networks. Computers & Security[J]. 2023, 第 6 作者
[55] 任一墨, 王进法, 李红, 朱红松, 孙利民. User Recognition of Devices on the Internet based on Heterogeneous Graph Transformer with Partial Label. International Joint Conference on Neural Networks. 2023, 第 5 作者https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10192043.
[56] Zhengyang Ai, Junnan Yin, Shuaizong Si, Hongsong Zhu, Limin Sun. Mining Implicit Behavioral Patterns via Attention Networks for Sequential Recommendation. PROCEDIA COMPUTER SCIENCE. 2023, 第 5 作者222: 177-186, http://dx.doi.org/10.1016/j.procs.2023.08.155.
[57] Sen Zhao, Jinfa Wang, yang shouguo, Yicheng Zeng, Zhihui Zhao, Hongsong Zhu, Limin Sun. ProsegDL: Binary Protocol Format Extraction by Deep Learning-based Field Boundary Identification. 30th IEEE International Conference on Network Protocols(ICNP 2022). 2022, 第 7 作者
[58] Yimo Ren, Hong Li, Min Xu, Gang Xiong, ,Shuqin Zhang, Hongsong Zhu, Limin Sun. Joint Classification of IoT Devices and Relations In the Internet with Network Traffic. IEEE Wireless Communications and Networking Conference(WCNC2022). 2022, 第 7 作者
[59] Yaowen Zheng, Yuekang Li, Cen Zhang, Hongsong Zhu, Yang Liu, Limin Sun. Efficient Greybox Fuzzing of Applications in Linux-based IoT Devices via Enhanced User-mode Emulation. 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2022). 2022, 第 6 作者 通讯作者
[60] 刘培培, 李红, 刘洁, 朱红松, 孙利民. Improving the Modality Representation with Multi-View Contrastive Learning for Multimodal Sentiment Analysis. Proceedings of the International Conference on Acoustics, Speech and Signal Processing(ICASSP 2023).. 2022, 第 5 作者
[61] Ke Li, Zhi Li, Zhimin Gu, Ziying Wang, Limin Sun. Compromised IoT Devices Detection in Smart Home via Semantic Information. IEEE International Conference on Communications(ICC). 2022, 第 5 作者
[62] Yang, Kai, Haining Wang, Limin Sun. An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks. COMPUTERS IN INDUSTRY[J]. 2022, 第 3 作者138: http://dx.doi.org/10.1016/j.compind.2022.103613.
[63] Liu, Puzhuo, Zheng, Yaowen, Song, Zhanwei, Fang, Dongliang, Lv, Shichao, Sun, Limin. Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control. JOURNAL OF SYSTEMS ARCHITECTURE[J]. 2022, 第 6 作者 通讯作者 127: http://dx.doi.org/10.1016/j.sysarc.2022.102483.
[64] 方栋梁, 刘圃卓, 秦川, 宋站威, 孙玉砚, 石志强, 孙利民. 工业控制系统协议安全综述. 计算机研究与发展[J]. 2022, 第 7 作者 通讯作者 59(5): 978-993, http://lib.cqvip.com/Qikan/Article/Detail?id=7107098515.
[65] 周明, 吕世超, 游建舟, 朱红松, 石志强, 孙利民. 工业控制系统安全态势感知技术研究. 信息安全学报[J]. 2022, 第 6 作者7(2): 101-119, http://lib.cqvip.com/Qikan/Article/Detail?id=7106868449.
[66] Yimo Ren, Hong Li, Ruinian Li, Hongsong Zhu, Limin Sun. Understanding User-Level IP Blocks on the Internet. SECURITY AND COMMUNICATION NETWORKS[J]. 2022, 第 5 作者https://doaj.org/article/c8c42716667d4f8da07ab482a5a4c977.
[67] Zhihui Zhao, , Yicheng Zeng, Jinfa Wang, Hong Li, Hongsong Zhu, Limin Sun. Detection and Incentive: An tampering detection mechanism for object detection in edge computing. IEEE International Symposium on Reliable Distributed Systems(SRDS 2022). 2022, 第 6 作者
[68] Puzhuo Liu, Dongliang Fang, Chuan Qin, Kai Cheng, Shichao Lv,, Hongsong Zhu, Limin Sun. Finding Vulnerabilities in Internal-binary of Firmware with Clues. ICC 2022. 2022, 第 7 作者 通讯作者
[69] Shijie Li, Junjiao Liu, Zhiwen Pan, Shichao Lv,, Shuaizong Si, Limin Sun. Anomaly Detection based on Robust Spatial-temporal Modeling for Industrial Control Systems. IEEE International Conference on Mobile Ad-Hoc and Sensor Systems(MASS). 2022, 第 6 作者
[70] Yicheng Zeng, Jiaqian Peng, Zhihui Zhao, Zhanwei Song, Hongsong Zhu, Limin Sun. SIFOL: Solving Implicit Flows in Loops for Concolic Execution. IEEE International Performance Computing and Communications Conference(IPCCC 2022). 2022, 第 6 作者
[71] Jiapeng Zhao, Zhongjin Liu, Xiaoling Zhang, Jintao Huang, Zhiqiang Shi, Shichao Lv, Hong Li, Limin Sun. Gradient-based Adversarial Attacks against Malware Detection by Instruction Replacement. International Conference on Wireless Algorithms, Systems, and Applications (CCF C). 2022, 第 8 作者https://link.springer.com/chapter/10.1007/978-3-031-19208-1_50.
[72] Jingfei Bian, Nan Yu, Hong Li, Hongsong Zhu, Qiang Wang, Limin Sun. An Evolutionary Learning Approach towards the Open Challenge of IoT Device Identification. International Conference on Security and Privacy in Communication Networks(SecureComm 2022). 2022, 第 6 作者
[73] Jie Liu, Jinfa Wang, Peipei Liu, Hongsong Zhu, Limin Sun. Discover the ICS Landmarks based on multi-stage clue mining. International Conference on Wireless Algorithms, Systems, and Applications(WASA 2022). 2022, 第 5 作者
[74] 孙越, 吕世超, 游建舟, 孙玉砚, 陈新, 郑尧文, 孙利民. IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol. ACNS 2022: Applied Cryptography and Network Security. 2022, 第 7 作者null(null): doi.org/10.1007/978-3-031-09234-3_1.
[75] 杨锴, 张悦阳, 林晓东, 李志, 孙利民. Characterizing Heterogeneous Internet of Things Devices at Internet Scale Using Semantic Extraction. IEEE INTERNET OF THINGS JOURNAL[J]. 2021, 第 5 作者https://ieeexplore.ieee.org/document/9530590.
[76] Xiaoling Zhang, Shouguo Yang, Luqian Duan, Zhe Lang, Zhiqiang Shi, Limin Sun. Transformer XL With Graph Neural Network for Source Code Summarization. IEEE International Conference on Systems, Man, and Cybernetics(CCF C)[J]. 2021, 第 6 作者
[77] Li, Qiang, Wang, Zhihao, Tan, Dawei, Song, Jinke, Wang, Haining, Sun, Limin, Liu, Jiqiang. GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks. IEEE-ACM TRANSACTIONS ON NETWORKING[J]. 2021, 第 6 作者29(4): 1798-1812, http://dx.doi.org/10.1109/TNET.2021.3073926.
[78] Junjiao Liu, Xiaodong Lin, Xin Chen, Hui Wen, Hong Li, Yan Hu, Jiawei Sun, Zhiqiang Shi, Limin Sun. SHADOWPLCS: A Novel Scheme for Remote Detection of Industrial Process Control Attacks. IEEE Transactions on Dependable and Secure Computing(CCF A)[J]. 2021, 第 9 作者19(3): 2054-2069,
[79] Zhou, Wei, Cao, Chen, Huo, Dongdong, Cheng, Kai, Zhang, Lan, Guan, Le, Liu, Tao, Jia, Yan, Zheng, Yaowen, Zhang, Yuqing, Sun, Limin, Wang, Yazhe, Liu, Peng. Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems. IEEE INTERNET OF THINGS JOURNAL[J]. 2021, 第 11 作者8(14): 11621-11639, http://dx.doi.org/10.1109/JIOT.2021.3059457.
[80] Wang, Zuoguang, Zhu, Hongsong, Liu, Peipei, Sun, Limin. Social Engineering in Cybersecurity: A Domain Ontology and Knowledge Graph Application Examples. CYBERSECURITY[J]. 2021, 第 4 作者4(1): 1-21, http://arxiv.org/abs/2106.01157.
[81] Shuangpeng Bai, Hui Wen, Dongliang Fang, Yue Sun, Puzhuo liu, Limin Sun. DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing. Proceedings of the 19th International Conference on Applied Cryptography and Network Security[J]. 2021, 第 6 作者
[82] Kai Cheng, Dongliang Fang, Chuan Qin, Huizhao Wang, Yaowen Zheng, Nan Yu, Limin Sun. Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware. ICT systems security and privacy protection :. 2021, 第 7 作者 通讯作者 83-99,
[83] Li, Jitong, Wang, Chao, Seo, Daehee, Cheng, Xiaoman, He, Yunhua, Sun, Limin, Xiao, Ke. Deep Learning-Based Service Scheduling Mechanism for GreenRSUs in the IoVs. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2021, 第 6 作者2021: https://doaj.org/article/6daa528180744d84bd5d66961f8e9dcc.
[84] 游建舟, 吕世超, 孙越, 文辉, 孙利民. HoneyVP: A Cost-Effective Hybrid Honeypot Architecture for Industrial Control Systems. IEEE International Conference on Communications (ICC 2021). 2021, 第 5 作者https://ieeexplore.ieee.org/document/9500567.
[85] 孙利民, 潘志文, 吕世超, 石志强, 朱红松. 智能制造场景下工业互联网安全风险与对策. 信息通信技术与政策[J]. 2021, 第 1 作者24-29, http://lib.cqvip.com/Qikan/Article/Detail?id=7105457933.
[86] 王作广, 朱红松, 孙利民. 社工概念演化分析. 信息安全学报[J]. 2021, 第 3 作者6(2): 12-29, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20210202&flag=1.
[87] Zhe Lang, Shouguo Yang, Yiran Cheng, Xiaoling Zhang, Zhiqiang Shi, Limin Sun. PMatch: Semantic-based Patch Detection for Binary Programs. IEEE International Performance Computing and Communications Conference. 2021, 第 6 作者https://ieeexplore.ieee.org/document/9679443.
[88] Xiao Hu, Hong Li, Zhiqiang Shi, Nan Yu, Hongsong Zhu, Limin Sun. A Robust IoT Device Identification Method with Unknown Traffic Detection. Proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications(WASA 2021). 2021, 第 6 作者https://link.springer.com/chapter/10.1007/978-3-030-85928-2_15.
[89] 闫兆腾, 李志, 白稳平, 朱红松, 孙利民. Detecting Internet-scale Surveillance Devices using RTSP Recessive Features. International Conference on Science of Cyber Security. 2021, 第 5 作者https://link.springer.com/chapter/10.1007/978-3-030-89137-4_2.
[90] Bowen Yu, Yucheng Wang, Tingwen Liu, Hongsong Zhu, Limin Sun, Bin Wang. Maximal Clique Based Non-Autoregressive Open Information Extraction. EMNLP. 2021, 第 5 作者
[91] Dongliang Fang, Zhanwei Song, Yue Guan, Puzhuo Liu, Anni Peng, Kai Cheng, Yaowen Zheng, Peng Liu, Hongsong Zhu, Limin Sun*. ICS3Fuzzer: A Fuzzing Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software. Proceedings of the Annual Computer Security Applications Conference[J]. 2021,
[92] 何云华, 黄伟, 王伟忠, 张翠, 李红, 孙利民. 基于区块链的分布式激励架构研究. 工程科学与技术[J]. 2021, 第 6 作者53(1): 178-187, http://lib.cqvip.com/Qikan/Article/Detail?id=7103756524.
[93] 何云华, 刘昭阳, 胡堰, 李红, 孙利民, 肖珂. 基于区块链的分布式激励机制研究. 计算机应用研究[J]. 2021, 第 5 作者38(3): 664-670, http://lib.cqvip.com/Qikan/Article/Detail?id=7104037234.
[94] He, Yunhua, Shen, Jialong, Xiao, Ke, Sood, Keshav, Wang, Chao, Sun, Limin, IEEE. A Sparse Protocol Parsing Method for IIoT Protocols Based on HMM hybrid model. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2020, 第 6 作者
[95] Limin Sun. Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks. Proceedings of the the Web Conference (WWW)). 2020, 第 1 作者
[96] You, Jianzhou, Lv, Shichao, Zhao, Lian, Niu, Mengyao, Shi, Zhiqiang, Sun, Limin, IEEE. A Scalable High-interaction Physical Honeypot Framework for Programmable Logic Controller. 2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL). 2020, 第 6 作者
[97] Yucheng Wang, Bowen Yu, Yueyang Zhang, Tingwen Liu,, Hongsong Zhu, Limin Sun. TPLinker: Single-stage Joint Extraction of Entities and Relations Through Token Pair Linking. COLING. 2020, 第 6 作者http://arxiv.org/abs/2010.13415.
[98] Yang, Kai, Li, Qiang, Lin, Xiaodong, Chen, Xin, Sun, Limin. iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS[J]. 2020, 第 5 作者 通讯作者 38(5): 955-967, http://dx.doi.org/10.1109/JSAC.2020.2980921.
[99] 游建舟, 吕世超, 孙玉砚, 石志强, 孙利民. 物联网蜜罐综述. 信息安全学报[J]. 2020, 第 5 作者5(4): 138-156, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20200410&flag=1.
[100] Hu, Yan, Li, Hong, Luan, Tom H, Yang, An, Sun, Limin, Wang, Zhiliang, Wang, Rui. Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE[J]. 2020, 第 5 作者108: 1230-1240, http://dx.doi.org/10.1016/j.future.2018.07.027.
[101] Limin Sun. Malware Classification using Attention-based Transductive Learning Network. Proceedings of the International Conference on Security and Privacy in Communication Networks (SecureComm 2020). 2020, 第 1 作者
[102] You, Jianzhou, Lv, Shichao, Hao, Yichen, Feng, Xuan, Zhou, Ming, Sun, Limin, Zhou, J, Luo, X, Shen, Q, Xu, Z. Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019). 2020, 第 6 作者 通讯作者 11999: 71-88,
[103] Liting deng, Hui Wen, Yue Sun, MingFeng Xin, Limin Sun, Hongsong Zhu. Attention Based Transductive Network for Malware Classification. 16th EAI International Conference on Security and Privacy in Communication Networks. 2020, 第 5 作者
[104] 陈千, 程凯, 郑尧文, 朱红松, 孙利民. 函数级数据依赖图及其在静态脆弱性分析中的应用. 软件学报[J]. 2020, 第 5 作者31(11): 3421-3435, http://lib.cqvip.com/Qikan/Article/Detail?id=7103363893.
[105] 赵国新, 丁若凡, 游建舟, 吕世超, 彭锋, 李菲, 孙利民. 基于工控业务仿真的高交互可编程逻辑控制器蜜罐系统设计实现. 计算机应用[J]. 2020, 第 7 作者40(9): 2650-2656, http://lib.cqvip.com/Qikan/Article/Detail?id=7102860244.
[106] Zhou, Zan, Kuang, Xiaohui, Sun, Limin, Zhong, Lujie, Xu, Changqiao. Endogenous Security Defense against Deductive Attack: When Artificial Intelligence Meets Active Defense for Online Service. IEEE COMMUNICATIONS MAGAZINE[J]. 2020, 第 3 作者58(6): 58-64, http://dx.doi.org/10.1109/MCOM.001.1900367.
[107] 闫兆腾, 于楠, 文辉, 李志, 朱红松, 孙利民. Detecting Internet-Scale NATs for Devices Based on Tri-Net IoT. Wireless Algorithms, Systems, and Applications[J]. 2020, 第 6 作者https://link.springer.com/chapter/10.1007/978-3-030-59016-1_50.
[108] 孙利民. 工业互联网安全首要任务是建立安全检查和风险识别能力. 中国战略新兴产业[J]. 2019, 第 1 作者94-96, http://lib.cqvip.com/Qikan/Article/Detail?id=7003117691.
[109] Yan Hu, Hong Li, Hong Yang, Yuyan Sun, Limin Sun, Zhiliang Wang. Detecting stealthy attacks against industrial control systems based on residual skewness analysis. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING[J]. 2019, 第 5 作者1-14, https://doaj.org/article/2ae3f76953494545bfe90dfa314735ae.
[110] 王志豪, 张卫东, 文辉, 朱红松, 尹丽波, 孙利民. IP定位技术研究. 信息安全学报[J]. 2019, 第 6 作者4(3): 34-47, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20190303&flag=1.
[111] Li Ke, You Jianzhou, Wen Hui, Li Hong, Sun Limin, Arai K, Bhatia R, Kapoor S. Collaborative Intelligence Analysis for Industrial Control Systems Threat Profiling. PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2. 2019, 第 5 作者 通讯作者 881: 94-106,
[112] Yang, Kai, Li, Qiang, Sun, Limin. Towards automatic fingerprinting of IoT devices in the cyberspace. COMPUTER NETWORKS[J]. 2019, 第 3 作者148: 318-327, http://dx.doi.org/10.1016/j.comnet.2018.11.013.
[113] 刘烃, 田决, 王稼舟, 吴宏宇, 孙利民, 周亚东, 沈超, 管晓宏. 信息物理融合系统综合安全威胁与防御研究. 自动化学报[J]. 2019, 第 5 作者45(1): 5-24, http://www.aas.net.cn:80/cn/article/doi/10.16383/j.aas.2018.c180461.
[114] Wang, Yucheng, Wang, Xu, Zhu, Hongsong, Zhao, Hai, Li, Hong, Sun, Limin, Biagioni, ES, Zheng, Y, Cheng, S. ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2019. 2019, 第 6 作者11604: 346-357,
[115] 何云华, 李梦茹, 李红, 孙利民, 肖珂, 杨超. 群智感知应用中基于区块链的激励机制. 计算机研究与发展[J]. 2019, 第 4 作者56(3): 544-554, http://lib.cqvip.com/Qikan/Article/Detail?id=7001418111.
[116] Zheng Yaowen, Davanian Ali, Yin Heng, Song Chengyu, Zhu Hongsong, Su Limin, USENIX Assoc. FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM. 2019, 1099-1114, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000509775000063.
[117] Zhou, Ming, Lv, Shichao, Yin, Libo, Chen, Xin, Li, Hong, Sun, Limin, IEEE. SCTM: A Multi-view Detecting Approach Against Industrial Control Systems Attacks. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2019, 第 6 作者
[118] Wang Xu, Wang Yucheng, Feng Xuan, Zhu Hongsong, Sun Limin, Zou Yuchi, IEEE. IoTTracker: An Enhanced Engine for Discovering Internet-of-Thing Devices. 2019 IEEE 20TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM). 2019, 第 5 作者http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000494803500042.
[119] Feng Xuan, Liao Xiaojing, Wang XiaoFeng, Wang Haining, Li Qiang, Yang Kai, Zhu Hongsong, Sun Limin, USENIX Assoc. Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM. 2019, 第 8 作者 通讯作者 887-903, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000509775000051.
[120] Li, Ruinian, Song, Tianyi, Mei, Bo, Li, Hong, Cheng, Xiuzhen, Sun, Limin. Blockchain for Large-Scale Internet of Things Data Storage and Protection. IEEE TRANSACTIONS ON SERVICES COMPUTING[J]. 2019, 第 6 作者12(5): 762-771, https://www.webofscience.com/wos/woscc/full-record/WOS:000492430500009.
[121] Mi, Xianghang, Feng, Xuan, Liao, Xiaojing, Liu, Baojun, Wang, XiaoFeng, Qian, Feng, Li, Zhou, Alrwais, Sumayah, Sun, Limin, Liu, Ying, IEEE. Resident Evil: Understanding Residential IP Proxy as a Dark Service. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019). 2019, 第 9 作者1185-1201,
[122] Yang, Shouguo, Shi, Zhiqiang, Zhang, Guodong, Li, Mingxuan, Ma, Yuan, Sun, Limin, IEEE. Understand Code Style: Efficient CNN-based Compiler Optimization Recognition System. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2019, 第 6 作者
[123] Li, Ke, Li, Hong, Zhu, Hongsong, Sun, Limin, Wen, Hui, IEEE. Side-Channel Information Leakage of Traffic Data in Instant Messaging. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2019, 第 4 作者
[124] 肖珂, 戴舜, 何云华, 孙利民. 基于城市监控的自然场景图像的中文文本提取方法. 计算机研究与发展[J]. 2019, 第 4 作者56(7): 1525-1533, http://lib.cqvip.com/Qikan/Article/Detail?id=7002364320.
[125] Sun Yuyan, Sun Limin, Shi Zhiqiang, Yu Wenhao, Ying Huan, Urien P, Piramuthu S. Vulnerability Finding and Firmware Association in Power Grid. PROCEEDINGS OF THE 2019 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV). 2019, 第 2 作者
[126] Zheng, Yaowen, Song, Zhanwei, Sun, Yuyan, Cheng, Kai, Zhu, Hongsong, Sun, Limin, IEEE. An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)[J]. 2019, 第 6 作者null(null):
[127] Wen, Hui, Zhang, Weidong, Hu, Yan, Hu, Qing, Zhu, Hongsong, Sun, Limin, Biagioni, ES, Zheng, Y, Cheng, S. Lightweight IoT Malware Visualization Analysis via Two-Bits Networks. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2019. 2019, 第 6 作者11604: 613-621,
[128] 游建舟, 张悦阳, 吕世超, 陈新, 尹丽波, 孙利民. 基于数据包分片的工控蜜罐识别方法. 信息安全学报[J]. 2019, 第 6 作者4(3): 83-92, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20190306&flag=1.
[129] 郑尧文, 文辉, 程凯, 宋站威, 朱红松, 孙利民. 物联网设备漏洞挖掘技术研究综述. 信息安全学报[J]. 2019, 第 6 作者4(5): 61-75, http://lib.cqvip.com/Qikan/Article/Detail?id=7100187215.
[130] 徐顺超, 陈永乐, 李志, 孙利民. 物联网设备Web弱口令自动化探测. 计算机工程与设计[J]. 2019, 第 4 作者40(1): 8-13, http://lib.cqvip.com/Qikan/Article/Detail?id=7001132765.
[131] Yang An, Wang Xiaoshan, Sun Yuyan, Hu Yan, Shi Zhiqiang, Sun Limin, IEEE. Multi-dimensional Data Fusion Intrusion Detection for Stealthy Attacks on Industrial Control Systems. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)[J]. 2018, 第 6 作者
[132] Li Qiang, Feng Xuan, Wang Haining, Sun Limin, IEEE. Discovery of Internet of Thing Devices based on Rules. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS). 2018, 第 4 作者
[133] 杨安, 胡堰, 周亮, 郑为民, 石志强, 孙利民. 基于信息流和状态流融合的工控系统异常检测算法. 计算机研究与发展[J]. 2018, 第 6 作者55(11): 2532-2542, http://lib.cqvip.com/Qikan/Article/Detail?id=7000898773.
[134] 李强, 贾煜璇, 宋金珂, 李红, 朱红松, 孙利民. 网络空间物联网信息搜索. 信息安全学报[J]. 2018, 第 6 作者3(5): 38-53, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20180504&flag=1.
[135] Li, Qiang, Feng, Xuan, Wang, Haining, Li, Zhi, Sun, Limin, IEEE. Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018). 2018, 第 5 作者2537-2545,
[136] Chen, Yu, Li, Hong, Ma, Yuan, Shi, Zhiqiang, Sun, Limin, Chellappan, S, Cheng, W, Li, W. Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File Retrieval. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2018). 2018, 第 5 作者10874: 53-65,
[137] Limin Sun. Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices. USENIX Security '18. 2018, 第 1 作者
[138] Limin Sun. Mining Human Periodic Behaviors using Mobility Internation and Relative Entropy. Proceedings of the 22nd Pacific-Asia Conference on Knowledge Discovery and Date Mining(PAKDD 2018). 2018, 第 1 作者
[139] Li, Qiang, Feng, Xuan, Wang, Haining, Sun, Limin. Understanding the Usage of Industrial Control System Devices on the Internet. IEEE INTERNET OF THINGS JOURNAL[J]. 2018, 第 4 作者 通讯作者 5(3): 2178-2189, http://dx.doi.org/10.1109/JIOT.2018.2826558.
[140] 舒坚, 蒋善东, 孙利民. 表征机会传感网络连通性的方法. 北京邮电大学学报[J]. 2018, 第 3 作者41(1): 59-64, http://lib.cqvip.com/Qikan/Article/Detail?id=675222784.
[141] 王迁, 杨明祥, 雷晓辉, 舒坚, 孙利民, 黄雪姝. 基于PSO-SVR的丹江口年径流预报. 南水北调与水利科技[J]. 2018, 第 5 作者16(3): 65-71, http://lib.cqvip.com/Qikan/Article/Detail?id=675818962.
[142] Wang, Hongtao, Wang, Hongmei, Yi, Feng, Wen, Hui, Li, Gang, Sun, Limin. Context-aware personalized path inference from large-scale GPS snippets. EXPERT SYSTEMS WITH APPLICATIONS[J]. 2018, 第 6 作者91: 78-88, http://dx.doi.org/10.1016/j.eswa.2017.08.027.
[143] Du, Suguo, Li, Xiaolong, Zhong, Jinli, Zhou, Lu, Xue, Minhui, Zhu, Haojin, Sun, Limin. Modeling Privacy Leakage Risks in Large-Scale Social Networks. IEEE ACCESS[J]. 2018, 第 7 作者6: 17653-17665, https://doaj.org/article/0fefefca21664f72a4852ca6b71cafff.
[144] Yan Hu, An Yang, Hong Li, Yuyan Sun, Limin Sun. A survey of intrusion detection on industrial control systems. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2018, 第 5 作者14(8): https://doaj.org/article/323485efa98a4e6cb401827a05edc15b.
[145] Zhang Weidong, Chen Yu, Li Hong, Li Zhi, Sun Limin, IEEE. PANDORA: A Scalable and Efficient Scheme to Extract Version of Binaries in IoT Firmwares. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2018, 第 5 作者
[146] Liu Junjiao, Yin Libo, Hu Yan, Lv Shichao, Sun Limin, IEEE. A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition. 2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2018, 第 5 作者
[147] Liu Qi, Li Hong, Hu Yan, Sun Limin, IEEE. A Check-in System Leveraging Face Recognition. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY. 2018, 第 4 作者412-418, http://dx.doi.org/10.1109/Cybermatics_2018.2018.00095.
[148] Hu, Chunqiang, Yu, Jiguo, Cheng, Xiuzhen, Tian, Zhi, Akkaya, Kemal, Sun, Limin. CP_ABSC: AN ATTRIBUTE-BASED SIGNCRYPTION SCHEME TO SECURE MULTICAST COMMUNICATIONS IN SMART GRIDS. MATHEMATICAL FOUNDATIONS OF COMPUTING[J]. 2018, 第 6 作者1(1): 77-100,
[149] Cheng, Kai, Li, Qiang, Wang, Lei, Chen, Qian, Zheng, Yaowen, Sun, Limin, Liang, Zhenkai, IEEE. DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware. 2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN). 2018, 第 6 作者430-441,
[150] Yang An, Sun Limin, Shi Zhiqiang, Zheng Weimin, Sun Yuyan, Hu Yan, IEEE. SBSD: Detecting the Sequence Attack through Sensor Data in ICSs. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2018, 第 2 作者
[151] 陈昱, 刘中金, 赵威威, 马原, 石志强, 孙利民. 一种大规模的跨平台同源二进制文件检索方法. 计算机研究与发展[J]. 2018, 第 6 作者55(7): 1498-1507, http://lib.cqvip.com/Qikan/Article/Detail?id=676015048.
[152] Yuxuan Jia, Bing Han, Qiang Li, Hong Li, Limin Sun. Who owns Internet of Thing devices?. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2018, 第 5 作者14(11): https://doaj.org/article/c693dbf17b0a4e49a3ab1ed073f2702a.
[153] Zhang Weidong, Li Hong, Wen Hui, Zhu Hongsong, Sun Limin, IEEE. A graph neural network based efficient firmware information extraction method for IoT devices. 2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2018, 第 5 作者
[154] Li Qizhen, Gao Jie, Wen Jinming, Tang Xiaohu, Zhao Lian, Sun Limin, IEEE. SMDP-based Downlink Packet Scheduling Scheme for Solar Energy Assisted Heterogeneous Networks. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY. 2018, 第 6 作者268-273, http://dx.doi.org/10.1109/Cybermatics_2018.2018.00074.
[155] 张光华, 庞少博, 张玉清, 孙利民. 云环境下基于静态博弈的信任等级模型研究. 北京理工大学学报[J]. 2018, 第 4 作者38(1): 96-101, http://lib.cqvip.com/Qikan/Article/Detail?id=674636135.
[156] Feng, Xuan, Li, Qiang, Wang, Haining, Sun, Limin, USENIX Assoc. Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices. PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM. 2018, 第 4 作者327-341, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000485139900020.
[157] He, Yunhua, Li, Hong, Cheng, Xiuzhen, Liu, Yan, Yang, Chao, Sun, Limin. A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications. IEEE ACCESS[J]. 2018, 第 6 作者6: 27324-27335, https://doaj.org/article/95bfd085d9b44e0b8cff8df1a490d768.
[158] Nan, Yuhong, Yang, Zhemin, Yang, Min, Zhou, Shunfan, Zhang, Yuan, Gu, Guofei, Wang, Xiaofeng, Sun, Limin. Identifying User-Input Privacy in Mobile Applications at a Large Scale. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2017, 第 8 作者12(3): 647-661, https://www.webofscience.com/wos/woscc/full-record/WOS:000394666300007.
[159] Zhang, Lin, Li, Hong, Sun, Limin, Shi, Zhiqiang, He, Yunhua, IEEE. POSTER: Towards Fully Distributed User Authentication with Blockchain. 2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC). 2017, 第 3 作者202-203, http://dx.doi.org/10.1109/PAC.2017.28.
[160] Wang, Hongtao, Wen, Hui, Yi, Feng, Zhu, Hongsong, Sun, Limin. Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets. SENSORS[J]. 2017, 第 5 作者17(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000398818700123.
[161] Lu, Xiang, Tu, Linlin, Zhou, Xinyun, Xiong, Naixue, Sun, Limin. ViMediaNet: an emulation system for interactive multimedia based telepresence services. JOURNAL OF SUPERCOMPUTING[J]. 2017, 第 5 作者73(8): 3562-3578, http://dx.doi.org/10.1007/s11227-016-1821-9.
[162] Yi, Feng, Gu, Yu, Wang, Hongtao, Sun, Yuyan, Sun, Limin, IEEE. Mobility Pattern based Relationship Inference from Spatiotemporal Data. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE. 2017, 第 5 作者
[163] Yi Feng, Li Hong, Wang Hongtao, Wen Hui, Sun Limin, Ma L, Khreishah A, Zhang Y, Yan M. Mobility Intention-Based Relationship Inference from Spatiotemporal Data. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017. 2017, 第 5 作者10251: 871-876,
[164] 程冬梅, 严彪, 文辉, 孙利民. 基于规则匹配的分布式工控入侵检测系统设计与实现. 信息网络安全[J]. 2017, 第 4 作者45-51, http://lib.cqvip.com/Qikan/Article/Detail?id=672608923.
[165] Wang, Zhihao, Chen, Yongle, Wen, Hui, Zhao, Lian, Sun, Limin, IEEE. Discovering Routers as Secondary Landmarks for Accurate IP Geolocation. 2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL). 2017, 第 5 作者 通讯作者 http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000428141601091.
[166] 任春林, 谷雨, 崔杰, 刘松, 朱红松, 孙利民. 基于WEB信息的特定类型物联网终端识别方法. 通信技术[J]. 2017, 第 6 作者50(5): 1003-1009, http://lib.cqvip.com/Qikan/Article/Detail?id=672259108.
[167] He Yunhua, Li Hong, Cheng Xiuzhen, Liu Yan, Sun Limin, Ma L, Khreishah A, Zhang Y, Yan M. A Bitcoin Based Incentive Mechanism for Distributed P2P Applications. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017. 2017, 第 5 作者10251: 457-468,
[168] Hu Qing, Lv Shichao, Shi Zhiqiang, Sun Limin, Xiao Liang, Ma L, Khreishah A, Zhang Y, Yan M. Defense Against Advanced Persistent Threats with Expert System for Internet of Things. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017. 2017, 第 4 作者10251: 326-337,
[169] Wang, Xiaoshan, Liu, Yao, Lu, Xiang, Lv, Shichao, Shi, Zhiqiang, Sun, Limin, IEEE. On Eavesdropping Attacks and Countermeasures for MU-MIMO Systems. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM). 2017, 第 6 作者40-45,
[170] Li, Qiang, Feng, Xuan, Zhao, Lian, Sun, Limin. A Framework for Searching Internet-Wide Devices. IEEE NETWORK[J]. 2017, 第 4 作者31(6): 101-107, http://dx.doi.org/10.1109/MNET.2017.1700034.
[171] Yi Feng, Li Zhi, Wang Hongtao, Zheng Weimin, Sun Limin, Li G, Ge Y, Zhang Z, Jin Z, Blumenstein M. MIAC: A Mobility Intention Auto-Completion Model for Location Prediction. KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2017). 2017, 第 5 作者10412: 432-444,
[172] Yi, Feng, Li, Hong, Wang, Hongtao, Sun, Limin. Why You Go Reveals Who You Know: Disclosing Social Relationship by Cooccurrence. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2017, 第 4 作者https://doaj.org/article/8f12121d6fbf4daabb0bed8bf92d3269.
[173] Wang, Xiaoshan, Liu, Yao, Lu, Xiang, Lv, Shichao, Shi, Zhiqiang, Sun, Limin, IEEE. CovertMIMO: A Covert Uplink Transmission Scheme for MIMO Systems. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2017, 第 6 作者
[174] Wang, Hao, Chen, Liangyin, Liu, Shijia, Fu, Songtao, Luo, Qian, Yin, Feng, Sun, Limin, Li, Zhanghua. Trajectory-Based Hierarchical Adaptive Forwarding in Vehicular Ad Hoc Networks. JOURNAL OF SENSORS[J]. 2017, 第 7 作者2017: https://doaj.org/article/748d48fc27924491b131dda6409247eb.
[175] Xiao, Liang, Chen, Tianhua, Han, Guoan, Zhuang, Weihua, Sun, Limin. Game Theoretic Study on Channel-Based Authentication in MIMO Systems. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2017, 第 5 作者66(8): 7474-7484, https://www.webofscience.com/wos/woscc/full-record/WOS:000407686300068.
[176] 张书钦, 李凯江, 郭倩倩, 孙利民, 石志强. 工业控制网络安全脆弱性分析技术研究. 中原工学院学报[J]. 2017, 第 4 作者28(6): 63-69, http://lib.cqvip.com/Qikan/Article/Detail?id=674230076.
[177] Li, Qiang, Feng, Xuan, Wang, Haining, Sun, Limin, ACM. Automatically Discovering Surveillance Devices in the Cyberspace. PROCEEDINGS OF THE 8TH ACM MULTIMEDIA SYSTEMS CONFERENCE (MMSYS'17). 2017, 第 4 作者 通讯作者 331-342, http://dx.doi.org/10.1145/3083187.3084020.
[178] Lv, Shichao, Xiao, Liang, Hu, Qing, Wang, Xiaoshan, Hu, Changzhen, Sun, Limin, IEEE. Anti-jamming Power Control Game in Unmanned Aerial Vehicle Networks. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE. 2017, 第 6 作者
[179] Wang, Hongtao, Li, Qiang, Yi, Feng, Li, Zhi, Sun, Limin. Influential spatial facility prediction over large scale cyber-physical vehicles in smart city. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING[J]. 2016, 第 5 作者 通讯作者 http://dx.doi.org/10.1186/s13638-016-0606-4.
[180] Lv, Shichao, Lu, Xiang, Lu, Zhu, Wang, Xiaoshan, Wang, Ning, Sun, Limin, IEEE. Zero Reconciliation Secret Key Extraction in MIMO Backscatter Wireless Systems. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2016, 第 6 作者http://dx.doi.org/10.1109/ICC.2016.7510987.
[181] Li, Qiang, Han, Qi, Sun, Limin. Collaborative Recognition of Queuing Behavior on Mobile Phones. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2016, 第 3 作者15(1): 60-73, https://www.webofscience.com/wos/woscc/full-record/WOS:000365990700005.
[182] 常青, 刘中金, 王猛涛, 陈昱, 石志强, 孙利民. VDNS:—种跨平台的固件漏洞关联算法. 计算机研究与发展[J]. 2016, 第 6 作者53(10): 2288-2298, http://lib.cqvip.com/Qikan/Article/Detail?id=7000068576.
[183] Hong Li, Limin Sun, Haojin Zhu, Xiang Lu, Xiuzhen Cheng. Achieving Privacy Preservation in WiFi Fingerprint-Based Localization. IEEE INFOCOM 2014 - IEEE Conference on Computer Communications : Volume 3 of 3 Pages 1905-2866.. 2016, 第 2 作者2337-2345,
[184] Feng, Xuan, Li, Qiang, Han, Qi, Zhu, Hongsong, Liu, Yan, Sun, Limin, IEEE. Identification of Visible Industrial Control Devices at Internet Scale. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2016, 第 6 作者http://dx.doi.org/10.1109/ICC.2016.7511426.
[185] Li, Yi, Zhou, Lu, Zhu, Haojin, Sun, Limin. Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks. IEEE INTERNET OF THINGS JOURNAL[J]. 2016, 第 4 作者3(4): 563-571, https://www.webofscience.com/wos/woscc/full-record/WOS:000381470400013.
[186] Yang, Weidong, He, Yunhua, Sun, Limin, Lu, Xiang, Li, Xinghua. An optimal query strategy for protecting location privacy in location-based services. PEER-TO-PEER NETWORKING AND APPLICATIONS[J]. 2016, 第 3 作者9(4): 752-761, https://www.webofscience.com/wos/woscc/full-record/WOS:000377468100012.
[187] Li Hong, Zhang Cheng, He Yunhua, Cheng Xiuzhen, Liu Yan, Sun Limin, Yang Q, Yu W, Challal Y. An Enhanced Structure-Based De-anonymization of Online Social Networks. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016. 2016, 第 6 作者 通讯作者 9798: 331-342,
[188] Feng, Xuan, Li, Qiang, Wang, Haining, Sun, Limin, IEEE. Characterizing Industrial Control System Devices on the Internet. 2016 IEEE 24TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP). 2016, 第 4 作者
[189] Zhao, Qinglin, Sakurai, Taka, Yu, Jiguo, Sun, Limin. Maximizing the stable throughput of high-priority traffic for wireless cyber-physical systems. EURASIPJOURNALONWIRELESSCOMMUNICATIONSANDNETWORKING[J]. 2016, 第 4 作者https://www.webofscience.com/wos/woscc/full-record/WOS:000391597400001.
[190] 杨安, 孙利民, 王小山, 石志强. 工业控制系统入侵检测技术综述. 计算机研究与发展[J]. 2016, 第 2 作者53(9): 2039-2054, http://lib.cqvip.com/Qikan/Article/Detail?id=669858996.
[191] 黄伟武, 闫兆腾, 朱红松, 孙利民. 网络扫描发包速率学习算法. 信息安全与通信保密[J]. 2016, 第 4 作者110-114, http://lib.cqvip.com/Qikan/Article/Detail?id=668364925.
[192] Li, Shujun, Li, Hong, Sun, Limin. Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING[J]. 2016, 第 3 作者http://dx.doi.org/10.1186/s13638-016-0624-2.
[193] Wei, Liangxiong, Zhou, Beisi, Ma, Xichu, Chen, Dexin, Zhang, Jingyu, Peng, Jian, Luo, Qian, Sun, Limin, Li, Dingcheng, Chen, Liangyin. Lightning: A High-Efficient Neighbor Discovery Protocol for Low Duty Cycle WSNs. IEEE COMMUNICATIONS LETTERS[J]. 2016, 第 8 作者20(5): 966-969, https://www.webofscience.com/wos/woscc/full-record/WOS:000376516000033.
[194] Zheng Yaowen, Cheng Kai, Li Zhi, Pan Shiran, Zhu Hongsong, Sun Limin, Lam KY, Chi CH, Qing S. A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016. 2016, 第 6 作者9977: 27-36,
[195] 常青, 刘中金, 王猛涛, 陈昱, 石志强, 孙利民. VDNS: 一种跨平台的固件漏洞关联算法. 计算机研究与发展[J]. 2016, 第 6 作者53(10): 2287-2297, https://crad.ict.ac.cn/cn/article/doi/10.7544/issn1000-1239.2016.20160442.
[196] Feng, Xuan, Li, Qiang, Wang, Haining, Sun, Limin, IEEE. ASCEND: A Search Engine for Online Industrial Control Devices. 2016 IEEE 24TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP). 2016, 第 4 作者
[197] He, Zaobo, Cai, Zhipeng, Han, Qilong, Tong, Weitian, Sun, Limin, Li, Yingshu. An energy efficient privacy-preserving content sharing scheme in mobile social networks. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2016, 第 5 作者20(5): 833-846, http://dx.doi.org/10.1007/s00779-016-0952-6.
[198] Li Hong, He Yunhua, Sun Limin, Cheng Xiuzhen, Yu Jiguo, IEEE. Side-Channel Information Leakage of Encrypted Video Stream in Video Surveillance Systems. IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS. 2016, 第 3 作者 通讯作者
[199] Wen Hui, Ge Shiming, Chen Shuixian, Wang Hongtao, Sun Limin, IEEE. Abnormal Event Detection via Adaptive Cascade Dictionary Learning. 2015 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP). 2015, 第 5 作者 通讯作者 847-851,
[200] 孙玉砚, 孙利民, 朱红松, 周新运. 基于车牌识别系统车辆轨迹的行为异常检测. 计算机研究与发展[J]. 2015, 第 2 作者52(8): 1921-1929, http://lib.cqvip.com/Qikan/Article/Detail?id=665742497.
[201] Chen Shuixian, Lu Xiang, Sun Limin, Ge Shiming, IEEE. Target Domain Adaptation for Face Detection in A Smart Camera Network with Peer-to-Peer Communications. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). 2015, 第 3 作者
[202] Jin Yongming, Zhu Hongsong, Shi Zhiqiang, Lu Xiang, Sun Limin, IEEE. Cryptanalysis and Improvement of two RFID-OT Protocols Based on Quadratic Residues. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2015, 第 5 作者7234-7239,
[203] 蔡青松, 刘燕, 牛建伟, 孙利民. 一种关注消息时效性的机会社会网络中节点传播能力分析模型. 电子学报[J]. 2015, 第 4 作者43(9): 1705-1713, http://lib.cqvip.com/Qikan/Article/Detail?id=666434163.
[204] Wen, Hong, Tang, Jie, Wu, Jinsong, Song, Huanhuan, Wu, Tingyong, Wu, Bin, Ho, PinHan, Lv, ShiChao, Sun, LiMin. A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT). IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING[J]. 2015, 第 9 作者3(1): 119-126, https://www.webofscience.com/wos/woscc/full-record/WOS:000209844700012.
[205] Luan, Tom H, Shen, Xuemin Sherman, Bai, Fan, Sun, Limin. Feel Bored? Join Verse! Engineering Vehicular Proximity Social Networks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2015, 第 4 作者64(3): 1120-1131, https://www.webofscience.com/wos/woscc/full-record/WOS:000351459600022.
[206] Xie Kaixuan, Ge Shiming, Yang Rui, Lu Xiang, Sun Limin, Zha H, Chen X, Wang L, Miao Q. Negative-Supervised Cascaded Deep Learning for Traffic Sign Classification. COMPUTER VISION, CCCV 2015, PT I. 2015, 第 5 作者546: 249-257,
[207] Li, Liqun, Sun, Limin, Xing, Guoliang, Huangfu, Wei, Zhou, Ruogu, Zhu, Hongsong. ROCS: Exploiting FM Radio Data System for Clock Calibration in Sensor Networks. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2015, 第 2 作者14(10): https://www.webofscience.com/wos/woscc/full-record/WOS:000360744700012.
[208] Li, Zhi, Liu, Yan, Zhu, Hongsong, Sun, Limin. Coff: Contact- Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2015, 第 4 作者64(11): 5257-5268, https://www.webofscience.com/wos/woscc/full-record/WOS:000365016700030.
[209] 王小山, 杨安, 石志强, 孙利民. 工业控制系统信息安全新趋势. 信息网络安全[J]. 2015, 第 4 作者6-11, http://lib.cqvip.com/Qikan/Article/Detail?id=663556222.
[210] Gao Shanyan, Zhu Hongsong, Zhou Xinyun, Liu Yan, Sun Limin, Sun L, Ma H, Fang D, Niu J, Wang W. Design and Implementation of Smart Home Linkage System Based on OSGI and REST Architecture. ADVANCES IN WIRELESS SENSOR NETWORKS. 2015, 第 5 作者501: 568-582,
[211] Li, Hong, He, Yunhua, Cheng, Xiuzhen, Zhu, Hongsong, Sun, Limin. Security and Privacy in Localization for Underwater Sensor Networks. IEEE COMMUNICATIONS MAGAZINE[J]. 2015, 第 5 作者53(11): 56-62, http://dx.doi.org/10.1109/MCOM.2015.7321972.
[212] 杨红, 朱红松, 孙利民. B-RPL:低存储开销的RPL路由协议. 计算机科学[J]. 2015, 第 3 作者42(1): 96-100, http://lib.cqvip.com/Qikan/Article/Detail?id=663510087.
[213] 吴子珺, 于重重, 孙利民, 孙玉砚. 一种针对特定车辆潜在群体的行驶轨迹预测方法. 计算机应用研究[J]. 2014, 第 3 作者31(7): 1951-1955, http://lib.cqvip.com/Qikan/Article/Detail?id=50158715.
[214] Wei, Yu, Yan, Hongli, Bie, Rongfang, Wang, Shenling, Sun, Limin. Performance monitoring and evaluation in dance teaching with mobile sensing technology. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2014, 第 5 作者18(8): 1929-1939, https://www.webofscience.com/wos/woscc/full-record/WOS:000344812200013.
[215] 何鹏, 阎保平, 李志, 孙利民. CM-MAC:一种基于分簇的多信道车载网MAC协议. 计算机研究与发展[J]. 2014, 第 4 作者51(3): 502-510, http://lib.cqvip.com/Qikan/Article/Detail?id=48799053.
[216] Weidong Yang, Wei Liu, Pan Li, Limin Sun. TDMA-Based Control Channel Access for IEEE 802.11p in VANETs. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2014, 第 4 作者10: https://doaj.org/article/4d8815e01316407a8d05406a20352ef6.
[217] Han, Yibo, Tang, Jine, Zhou, ZhangBing, Xiao, Mingzhong, Sun, Limin, Wang, Qun. Novel itinerary-based KNN query algorithm leveraging grid division routing in wireless sensor networks of skewness distribution. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2014, 第 5 作者18(8): 1989-2001, https://www.webofscience.com/wos/woscc/full-record/WOS:000344812200018.
[218] Li, Liqun, Xing, Guoliang, Sun, Limin, Liu, Yan. A Quality-Aware Voice Streaming System for Wireless Sensor Networks. ACM TRANSACTIONS ON SENSOR NETWORKS[J]. 2014, 第 3 作者10(4): https://www.webofscience.com/wos/woscc/full-record/WOS:000339008000008.
[219] Cai, Qingsong, Bai, Yuqing, Sun, Limin, Niu, Jianwei, Niu, J, Shu, L, Zhou, Z. Quantifying Individual Communication Capability in Opportunistic Mobile Social Networks. 2014 IEEE COMPUTING, COMMUNICATIONS AND IT APPLICATIONS CONFERENCE (COMCOMAP). 2014, 第 3 作者1-6, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000380447700001.
[220] Liu, Wei, Li, Hong, Chen, Yongle, Zhu, Hongsong, Sun, Limin. LARES: latency-reduced neighbour discovery for contagious diseases prevention. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING[J]. 2014, 第 5 作者 通讯作者 16(1): 3-13, https://www.webofscience.com/wos/woscc/full-record/WOS:000338418800002.
[221] Guo, Junqi, Xie, Xiaobo, Bie, Rongfang, Sun, Limin. Structural health monitoring by using a sparse coding-based deep learning algorithm with wireless sensor networks. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2014, 第 4 作者18(8): 1977-1987, https://www.webofscience.com/wos/woscc/full-record/WOS:000344812200017.
[222] Di Wu, Xiaojing Wang, Limin Sun, Yan Ling, Dongxia Zhang. Identity privacy-based reliable routing method in VANETs. PEER-TO-PEER NETWORKING AND APPLICATIONS[J]. 2014, 第 3 作者7(3): 285-294, http://dx.doi.org/10.1007/s12083-012-0143-9.
[223] Yunhua He, Limin Sun, Weidong Yang, Hong Li. A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2014, 第 2 作者 通讯作者 10: https://doaj.org/article/9d96d4d0a63b45138968bd5897a29609.
[224] Wen Hui, Ge Shiming, Yang Rui, Chen Shuixian, Sun Limin, IEEE. Robust Visual Tracking via Discriminative Sparse Point Matching. PROCEEDINGS OF THE 2014 9TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA). 2014, 第 5 作者1243-1246,
[225] Wu, Di, Wang, Xiaojing, Sun, Limin, Ling, Yan, Zhang, Dongxia. Identity privacy-based reliable routing method in VANETs. PEER-TO-PEER NETWORKING AND APPLICATIONS[J]. 2014, 第 3 作者7(3): 285-294, http://dx.doi.org/10.1007/s12083-012-0143-9.
[226] Zhang, Yuan, Sun, Limin, Song, Houbing, Cao, Xiaojun. Ubiquitous WSN for Healthcare: Recent Advances and Future Prospects. IEEE INTERNET OF THINGS JOURNAL[J]. 2014, 第 2 作者1(4): 311-318, https://www.webofscience.com/wos/woscc/full-record/WOS:000209672500003.
[227] Xiong, Yongping, Zhou, Ruogu, Li, Minming, Xing, Guoliang, Sun, Limin, Ma, Jian. ZiFi: Exploiting Cross-Technology Interference Signatures for Wireless LAN Discovery. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2014, 第 5 作者13(11): 2675-2688, https://www.webofscience.com/wos/woscc/full-record/WOS:000343317500018.
[228] 金永明, 吴棋滢, 石志强, 芦翔, 孙利民. 基于PRF的RFID轻量级认证协议研究. 计算机研究与发展[J]. 2014, 第 5 作者51(7): 1506-1514, http://lib.cqvip.com/Qikan/Article/Detail?id=50300270.
[229] 李平, 孙利民, 吴佳英, 方庆, 谢晋阳, 周博翔. 基于可离散处理的RFID防碰撞混杂算法研究. 通信学报[J]. 2013, 第 2 作者34(8): 10-17, http://lib.cqvip.com/Qikan/Article/Detail?id=46897700.
[230] Li Qiang, Han Qi, Sun Limin, IEEE. Context-aware Handoff on Smartphones. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013). 2013, 第 3 作者470-478,
[231] Chen, Yongle, Chen, Ci, Zhu, Hongsong, Sun, Limin. Efficient Deterministic Anchor Deployment for Sensor Network Positioning. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 第 4 作者 通讯作者 9: https://doaj.org/article/950537e1f14e4f2bbd9cab7aad3893bf.
[232] Zhang, Qinyu, Cao, Bin, Wang, Ye, Zhang, Naitong, Lin, Xiaodong, Sun, Limin. ON EXPLOITING POLARIZATION FOR ENERGY-HARVESTING ENABLED COOPERATIVE COGNITIVE RADIO NETWORKING. IEEE WIRELESS COMMUNICATIONS[J]. 2013, 第 6 作者20(4): https://www.webofscience.com/wos/woscc/full-record/WOS:000324598600017.
[233] Di Wu, Dongxia Zhang, Guozhen Tan, Limin Sun, Juanjuan Li, Jiangchuan Liu. Improvement and Performance Evaluation for Multimedia Files Transmission in Vehicle-Based DTNs. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 第 4 作者9: https://doaj.org/article/7095cec7979b4b048eb79e68e72ffc90.
[234] Xiao, Fu, Wang, Ruchuan, Sun, Limin, Li, Qun, Zhang, Hongwei, Huang, Liusheng. Selected Papers from "The 6th China Conference of Wireless Sensor Networks". INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 第 3 作者9: https://doaj.org/article/fa832fa3372940518646454436502e11.
[235] Weijun Qin, Jiadi Zhang, Bo Li, Limin Sun. Discovering Human Presence Activities with Smartphones Using Nonintrusive Wi-Fi Sniffer Sensors: The Big Data Prospective. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 第 4 作者9: https://doaj.org/article/ae665d8df86749ca9c4d28e40ded8724.
[236] Zhi Li, Limin Sun, Xinyun Zhou. Amortized Fairness for Drive-Thru Internet. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 第 2 作者 通讯作者 9: https://doaj.org/article/b770bcc6afad4346aa3274506317a5be.
[237] 孙利民, 刘伟. 对大规模传感器网络应用面临问题的思考. 中兴通讯技术[J]. 2012, 第 1 作者18(2): 10-14, http://lib.cqvip.com/Qikan/Article/Detail?id=41345877.
[238] 周新运, 李志, 李立群, 孙利民. 一种移动容迟网络体系结构及其应用. 计算机研究与发展[J]. 2012, 第 4 作者49(3): 518-528, http://lib.cqvip.com/Qikan/Article/Detail?id=41043886.
[239] 蒋文涛, 孙利民, 吕俊伟, 朱红松. 传感器网络中基于局部信号重建的目标计数算法. 通信学报[J]. 2012, 第 2 作者33(9): 44-52, http://lib.cqvip.com/Qikan/Article/Detail?id=43269893.
[240] 周新运, 李志, 李立群, 孙利民. 一种移动容迟网络体系结构及其应用. 计算机研究与发展[J]. 2012, 第 4 作者49(3): 518-528, http://lib.cqvip.com/Qikan/Article/Detail?id=41043886.
[241] 蒋文涛, 孙利民, 吕俊伟, 朱红松. 传感器网络中基于局部信号重建的目标计数算法. 通信学报[J]. 2012, 第 2 作者33(9): 44-52, http://lib.cqvip.com/Qikan/Article/Detail?id=43269893.
[242] Limin Sun. Exploiting Ephemeral Link Correlation for Mobile Wireless Networks. 2012, 第 1 作者 通讯作者
[243] Li, Liqun, Xing, Guoliang, Han, Qi, Sun, Limin. ASM: Adaptive Voice Stream Multicast over Low-Power Wireless Networks. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2012, 第 4 作者23(4): 626-633, https://www.webofscience.com/wos/woscc/full-record/WOS:000300981100007.
[244] Chen Yongle, Sun Limin, Wang Feng, Zhou Xinyun. Congestion-aware indoor emergency navigation algorithm for wireless sensor networks. GLOBECOM - IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE. 2011, 第 2 作者http://ir.iscas.ac.cn/handle/311060/16297.
[245] Xiong Yongping, He Wenbo, Chen Canfeng, Ma Jian, Sun Limin. Phoenix: peer-to-peer location based notification in mobile networks. PROCEEDINGS - 8TH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, MASS 2011. 2011, 第 5 作者691-696, http://ir.iscas.ac.cn/handle/311060/16247.
[246] Li Liqun, Xing Guoliang, Sun Limin, Huangfu Wei, Zhou Ruogu, Zhu Hongsong. Exploiting fm radio data system for adaptive clock calibration in sensor networks. MOBISYS'11 - COMPILATION PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS AND SERVICES AND CO-LOCATED WORKSHOPS. 2011, 第 3 作者169-181, http://124.16.136.157/handle/311060/14309.
[247] Ma Li, Liu Jiangchuan, Sun Limin, Karimi Ouldooz Baghban. The trajectory exposure problem in location-aware mobile networking. PROCEEDINGS - 8TH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, MASS 2011. 2011, 第 3 作者7-12, http://ir.iscas.ac.cn/handle/311060/16270.
[248] Xing, Guoliang, Wang, Jianping, Yuan, Zhaohui, Tan, Rui, Sun, Limin, Huang, Qingfeng, Jia, Xiaohua, So, Hing Cheung. Mobile Scheduling for Spatiotemporal Detection in Wireless Sensor Networks. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2010, 第 5 作者21(12): 1851-1866, https://www.webofscience.com/wos/woscc/full-record/WOS:000283559800011.
[249] Zhou, Ruogu, Xiong, Yongping, Xing, Guoliang, Sun, Limin, Ma, Jian, ACM. ZiFi: Wireless LAN Discovery via ZigBee Interference Signatures. MOBICOM 10 & MOBIHOC 10: PROCEEDINGS OF THE 16TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING AND THE 11TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING. 2010, 第 4 作者49-60, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000332847500005.
[250] Li Liqun, 孙利民. Seer: trend-prediction-based geographic message forwarding in sparse vehicular networks. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS. 2010, 第 2 作者http://124.16.136.157/handle/311060/8896.
[251] 熊永平, 孙利民, 牛建伟, 刘燕. 机会网络. 软件学报[J]. 2009, 第 2 作者124-137, http://lib.cqvip.com/Qikan/Article/Detail?id=29337262.
[252] Li Liqun, Xing Guoliang, Sun Limin, Liu Yan. QVS: Quality-aware Voice Streaming for Wireless Sensor Networks. 2009 29TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS. 2009, 第 3 作者450-+,
[253] Huangfu Wei, Duan Bin, Sun Limin, Chen Canfeng, Ma Jian. Thta: triangle-shaped hierarchy aggregation time allocation algorithm for wireless sensor network. IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC. 2008, 第 3 作者2397-2402, http://124.16.136.157/handle/311060/10498.
[254] Bi, Yanzhong, Li, Na, Sun, Limin. DAR: An energy-balanced data-gathering scheme for wireless sensor networks. COMPUTER COMMUNICATIONS[J]. 2007, 第 3 作者 通讯作者 30(14-15): 2812-2825, http://dx.doi.org/10.1016/j.comcom.2007.05.021.
[255] Kai Yang, Xiaodong Lin, Limin Sun. CShield: Enabling code privacy for Cyber-Pysical systems. FUTURE GENERATION COMPUTER SYSTEMS. 第 3 作者http://dx.doi.org/10.1016/j.future.2021.06.051.
[256] Yan Hu, Hong Li, Tom H Luan, An Yang, Limin Sun, Zhiliang Wang, Rui Wang. Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. FUTURE GENERATION COMPUTER SYSTEMS. 第 5 作者http://dx.doi.org/10.1016/j.future.2018.07.027.
[2] Li, Siyuan, Wang, Yongpan, Dong, Chaopeng, Yang, Shouguo, Li, Hong, Sun, Hao, Lang, Zhe, Chen, Zuxin, Wang, Weijie, Zhu, Hongsong, Sun, Limin. LibAM: An Area Matching Framework for Detecting Third-Party Libraries in Binaries. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY[J]. 2024, 第 11 作者33(2): http://dx.doi.org/10.1145/3625294.
[3] Senming Yan, Lei Shi, Jing Ren, Wei Wang, Yaxin Liu, 孙利民, Xiong Wang, Wei Zhang. Log-based Anomaly Detection with Transformers Pre-trained on Large-scale Unlabeled Data. 2024 IEEE International Conference on Communications (ICC). 2024, 第 6 作者null(null):
[4] Liu, Peipei, Wang, Gaosheng, Li, Hong, Liu, Jie, Ren, Yimo, Zhu, Hongsong, Sun, Limin. Multi-granularity cross-modal representation learning for named entity recognition on social media. INFORMATION PROCESSING & MANAGEMENT[J]. 2024, 第 7 作者61(1): http://dx.doi.org/10.1016/j.ipm.2023.103546.
[5] 赵智慧, 宾浩宇, 李红, 于楠, 朱红松, 孙利民. FeaShare: Feature Sharing for Computation Correctness in Edge Preprocessing. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2024, 第 6 作者23(12):
[6] Jianshuo Liu, Hong Li, Mengjie Sun, Haining Wang, Hui Wen, Zhi Li, 孙利民. NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal. 2024 IEEE Symposium on Security and Privacy. 2024, 第 7 作者null(null):
[7] Li, Ke, Wang, Haining, Zhou, Ming, Zhu, Hongsong, Sun, Limin. Cascading Threat Analysis of IoT Devices in Trigger-Action Platforms. IEEE INTERNET OF THINGS JOURNAL[J]. 2024, 第 5 作者11(7): 12240-12251, http://dx.doi.org/10.1109/JIOT.2023.3335279.
[8] 郎哲, Zhengzi Xu, Xiaohui Chen, 吕世超, 宋站威, 石志强, 孙利民. DeLink: Source File Information Recovery in Binaries. Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (CCF A). 2024, 第 7 作者null(null): https://dl.acm.org/doi/abs/10.1145/3660782.
[9] 李仕杰, Yuqi Chen, 陈新, 李泽东, 方栋梁, Kaixiang Liu, 吕世超, 孙利民. PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2024, 第 8 作者 通讯作者 19(null):
[10] Li, Zedong, Chen, Xin, Chen, Yuqi, Li, Shijie, Wang, Hangyu, Lv, Shichao, Sun, Limin. Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach. IEEE INTERNET OF THINGS JOURNAL[J]. 2024, 第 7 作者 通讯作者 11(10): 17602-17614, http://dx.doi.org/10.1109/JIOT.2024.3358798.
[11] Cen Zhang, Yaowen Zheng, Mingqiang Bai, Yeting Li, Wei Ma, Xiaofei Xie, Yuekang Li, 孙利民, Yang Liu. How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation. 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA '24). 2024, 第 8 作者null(null):
[12] 张小玲, ZHENGZI XU, 杨寿国, 李志, 石志强, 孙利民. Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-task Learning(CCF A). Proceedings of the ACM on Software Engineering(CCF A). 2024, 第 6 作者null(null): https://dl.acm.org/doi/abs/10.1145/3660782.
[13] Song, Jinke, Wan, Shangfeng, Huang, Min, Liu, Jiqiang, Sun, Limin, Li, Qiang. Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild. ACM TRANSACTIONS ON SENSOR NETWORKS[J]. 2024, 第 5 作者20(1): http://dx.doi.org/10.1145/3608951.
[14] Liu, Puzhuo, Zheng, Yaowen, Sun, Chengnian, Li, Hong, Li, Zhi, Sun, Limin. Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY[J]. 2024, 第 6 作者33(4): http://dx.doi.org/10.1145/3641847.
[15] Anni Peng, Dongliang Fang, Le Guan, ERIK VAN DER KOUWE, Yin Li, Wenwen Wang, 孙利民, Yuqing Zhang. Bitmap-Based Security Monitoring for Deeply Embedded Systems. ACM Transactions on Software Engineering and Methodology (TOSEM)[J]. 2024, 第 7 作者33(7):
[16] Yang Zhang, Dongliang Fang, Puzhuo Liu, Laile Xi, Xiao Lu, Xin Chen, Shuaizong Si, 孙利民. MSGFuzzer: Message Sequence Guided Industrial Robot Protocol Fuzzing. 2024 IEEE Conference on Software Testing, Verification and Validation (ICST). 2024, 第 8 作者null(null):
[17] Zhao, Zhihui, Zhao, Sen, Lv, Fei, Si, Shuaizong, Zhu, Hongsong, Sun, Limin. RIETD: A Reputation Incentive Scheme Facilitates Personalized Edge Tampering Detection. IEEE INTERNET OF THINGS JOURNAL[J]. 2024, 第 6 作者11(8): 14771-14788, http://dx.doi.org/10.1109/JIOT.2023.3344709.
[18] 周明, Haining Wang, Ke Li, 朱红松, 孙利民. Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs. 19th European Conference on Computer Systems (EuroSys '24). 2024, 第 5 作者null(null):
[19] Chunyang Zheng, Jinfa Wang, Shuaizong Si, Zhi Li, Nan Yu, 孙利民. MOMR: A Threat in Web Application Due to the Malicious Orchestration of Microservice Requests. 2024 IEEE International Conference on Communications (ICC): Communication and Information System Security Symposium. 2024, 第 6 作者null(null):
[20] 任一墨, 王进法, 刘洁, 刘培培, 李红, 朱红松, 孙利民. A Relation-Aware Heterogeneous Graph Transformer on Dynamic Fusion for Multimodal Classification Tasks. ICASSP. 2024, 第 7 作者null(null): https://ieeexplore.ieee.org/document/10446972.
[21] Puzhuo liu, Yaowen Zheng, Sun Chengnian, HONG LI, ZHI LI, Limin Sun. Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers. TOSEM[J]. 2024, 第 6 作者null(null):
[22] 董超鹏, 李思远, 杨寿国, 肖扬, 王勇攀, 李红, 李志, 孙利民. LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries. International Conference on Software Engineering (ICSE) (CCF-A). 2024, 第 8 作者null(null):
[23] Yang, Kai, Li, Qiang, Wang, Haining, Sun, Limin, Liu, Jiqiang. Fingerprinting Industrial IoT devices based on multi-branch neural network. EXPERT SYSTEMS WITH APPLICATIONS[J]. 2024, 第 4 作者238(null): http://dx.doi.org/10.1016/j.eswa.2023.122371.
[24] Jintao Huang, Kai Yang, Gaosheng Wang, 石志强, Shichao Lv, Limin Sun. TaiE: Function Identification for Monolithic Firmware. International Conference on Program Comprehension(CCF B). 2024, 第 6 作者
[25] Puzhuo liu, Yaowen Zheng, Sun Chengnian, Chuan Qin, Dongliang Fang, Mingdong Liu, Limin Sun. FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware. ASPLOS. 2024, 第 7 作者null(null):
[26] 刘培培, 李红, 任一墨, 刘洁, 司帅宗, 朱红松, 孙利民. Hierarchical Aligned Multimodal Learning for NER on Tweet Posts. AAAI. 2024, 第 7 作者null(null): https://ojs.aaai.org/index.php/AAAI/article/view/29831.
[27] 杨寿国, 董超鹏, 肖扬, 程怡然, 石志强, 李志, 孙利民. Asteria-Pro: Enhancing Deep-Learning Based Binary Code Similarity Detection by Incorporating Domain Knowledge. ACM Transactions on Software Engineering and Methodology (CCF-A)[J]. 2024, 第 7 作者33(1): 1-40,
[28] 刘培培, 王高升, 李红, 刘洁, 任一墨, 朱红松, 孙利民. Multi-Granularity Cross-Modality Representation Learning for Named Entity Recognition on Social Media. IPM[J]. 2023, 第 7 作者https://www.sciencedirect.com/science/article/pii/S0306457323002832.
[29] 李思远, 王勇攀, 董超鹏, 杨寿国, 李红, 孙昊, 郎哲, 陈祖欣, 王伟杰, 朱红松, 孙利民. LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries. TOSEM[J]. 2023, 第 11 作者https://dl.acm.org/doi/10.1145/3625294.
[30] 郑春阳, 王进法, 司帅宗, 张卫东, 孙利民. ChainDet: A Traffic-Based Detection Method of Microservice Chains. IEEE International Performance Computing and Communications Conference. 2023, 第 5 作者
[31] Yan, Senming, Ren, Jing, Wang, Wei, Sun, Limin, Zhang, Wei, Yu, Quan. A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS[J]. 2023, 第 4 作者25(1): 467-496, http://dx.doi.org/10.1109/COMST.2022.3225137.
[32] Wang, Xifeng, Zhu, Hongsong, Xiao, Han, Zhou, Zan, Yang, Shujie, Sun, Limin. Blockchain-enhanced trust management for mobile edge computing-enabled intelligent vehicular collaboration in the 6G era. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES[J]. 2023, 第 6 作者34(7): http://dx.doi.org/10.1002/ett.4791.
[33] 张杰, 文辉, 邓力廷, 辛明峰, 李志, 李伦, 朱红松, 孙利民. HackMentor: Fine-Tuning Large Language Models for Cybersecurity. TrustCom2023. 2023, 第 8 作者
[34] 刘培培, 李红, 王志宇, 任一墨, 刘洁, 吕飞, 朱红松, 孙利民. CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises. International Joint Conference on Neural Networks. 2023, 第 8 作者https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10191251.
[35] 陈晓惠, 崔磊, 文辉, 李志, 朱红松, 郝志宇, 孙利民. MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors. Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 2023, 第 7 作者 通讯作者
[36] 宾浩宇, 赵森, 李志, 于楠, 席荣荣, 朱红松, 孙利民. UID-Auto-Gen: Extracting Device Fingerprinting from Network Traffic. IEEE International Performance Computing and Communications Conference. 2023, 第 7 作者
[37] 闫兆腾, 李志, 李红, 杨寿国, 朱红松, 孙利民. Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2023, 第 6 作者20(5): 3890-3909, https://ieeexplore.ieee.org/document/9954619.
[38] Yimo Ren, Hong Li, Peipei Liu, Jie Liu, Hongsong Zhu, Limin Sun. Owner name entity recognition in websites based on multiscale features and multimodal co-attention. EXPERT SYSTEMS WITH APPLICATIONS. 2023, 第 6 作者224: http://dx.doi.org/10.1016/j.eswa.2023.120014.
[39] Chuan Qin, Jiaqian Peng, Puzhuo Liu, Yaowen Zheng, Kai Cheng, Weidong Zhang, Limin Sun. UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router. COMPUTERS & SECURITY[J]. 2023, 第 7 作者 通讯作者 128(null): http://dx.doi.org/10.1016/j.cose.2023.103157.
[40] 王高升, 刘培培, 黄晋涛, 司帅宗, 朱红松, 孙利民. CSEDesc: CyberSecurity Event Detection with Event Description. International Conference on Artificial Neural Networks. 2023, 第 6 作者https://link.springer.com/chapter/10.1007/978-3-031-44213-1_3.
[41] 任一墨, 王进法, 李红, 朱红松, 孙利民. DeviceGPT: A Generative Pre-Training Transformer on the Heterogenous Graph for Internet of Things. International Conference on Research on Development in Information Retrieval. 2023, 第 5 作者https://dl.acm.org/doi/pdf/10.1145/3539618.3591972.
[42] 李思源, 文辉, 邓立廷, 周宇, 张文源, 李志, 孙利民. Denoising Network of Dynamic Features for Enhanced Malware Classification. IEEE International Performance Computing and Communications Conference. 2023, 第 7 作者
[43] Kai Cheng, Yaowen Zheng, Tao Liu, Guan Le, Peng Liu, Hong Li, Hongsong Zhu, Kejiang Ye, Limin Sun. Detecting Vulnerabilities in Linux-based Embedded Firmware with SSE-based On-demand Alias Analysis. ISSTA'23. 2023, 第 9 作者
[44] 任一墨, 李志, 李红, 刘培培, 刘洁, 朱红松, 孙利民. ip2text A Reasoning-Aware Dataset for Text Generation of Devices on the Internet. Database Systems for Advanced Applications. 2023, 第 7 作者https://link.springer.com/chapter/10.1007/978-3-031-35415-1_2.
[45] Ren, Yimo, Li, Hong, Liu, Peipei, Liu, Jie, Zhu, Hongsong, Sun, Limin. CL-GAN: A GAN-based continual learning model for generating and detecting AGDs. COMPUTERS & SECURITY[J]. 2023, 第 6 作者131: http://dx.doi.org/10.1016/j.cose.2023.103317.
[46] 孙怡亭, 郭越, 李长进, 张红军, 刘康, 刘俊矫, 孙利民. 可编程逻辑控制器的控制逻辑注入攻击入侵检测方法. 计算机应用[J]. 2023, 第 7 作者43(6): 1861-1869, http://lib.cqvip.com/Qikan/Article/Detail?id=7109941717.
[47] 郑尧文, 文辉, 程凯, 李红, 朱红松, 孙利民. 物联网安全威胁与安全模型. 信息安全学报[J]. 2023, 第 6 作者8(5): 81-95, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20230506&flag=1.
[48] 杨寿国, Zhengzi Xu, 肖扬, Zhe Lang, 唐伟, Yang Liu, 石志强, 李红, 孙利民. Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis. ACM Transactions on Software Engineering and Methodology (TOSEM) (CCF-A)[J]. 2023, 第 9 作者
[49] Ren, Yimo, Li, Hong, Liu, Peipei, Liu, Jie, Li, Zhi, Zhu, Hongsong, Sun, Limin. Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer. KNOWLEDGE AND INFORMATION SYSTEMS[J]. 2023, 第 7 作者65(10): 4411-4429, http://dx.doi.org/10.1007/s10115-023-01908-4.
[50] Ren, Yimo, Li, Hong, Liu, Peipei, Liu, Jie, Zhu, Hongsong, Sun, Limin. Multiview Embedding with Partial Labels to Recognize Users of Devices Based on Unified Transformer. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS[J]. 2023, 第 6 作者2023: http://dx.doi.org/10.1155/2023/3138551.
[51] Chen, Yanru, Yin, Fengming, Hu, Shunfang, Sun, Limin, Li, Yang, Xing, Bin, Chen, Liangyin, Guo, Bing. ECC-Based Authenticated Key Agreement Protocol for Industrial Control System. IEEE INTERNET OF THINGS JOURNAL[J]. 2023, 第 4 作者10(6): 4688-4697, http://dx.doi.org/10.1109/JIOT.2022.3219233.
[52] 孙越, 李志, 吕世超, 孙利民. Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2023, 第 4 作者https://ieeexplore.ieee.org/abstract/document/9978697/metrics#metrics.
[53] Cheng, Yiran, Yang, Shouguo, Lang, Zhe, Shi, Zhiqiang, Sun, Limin. VERI: A Large-scale Open-Source Components Vulnerability Detection in IoT Firmware. COMPUTERS & SECURITY(CCF B)[J]. 2023, 第 5 作者126: http://dx.doi.org/10.1016/j.cose.2022.103068.
[54] 邓立廷, 文辉, 辛明峰, 李红, 潘志文, 孙利民. ENIMANAL: Augmented Cross-Architecture IoT Malware Analysis using Graph Neural Networks. Computers & Security[J]. 2023, 第 6 作者
[55] 任一墨, 王进法, 李红, 朱红松, 孙利民. User Recognition of Devices on the Internet based on Heterogeneous Graph Transformer with Partial Label. International Joint Conference on Neural Networks. 2023, 第 5 作者https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10192043.
[56] Zhengyang Ai, Junnan Yin, Shuaizong Si, Hongsong Zhu, Limin Sun. Mining Implicit Behavioral Patterns via Attention Networks for Sequential Recommendation. PROCEDIA COMPUTER SCIENCE. 2023, 第 5 作者222: 177-186, http://dx.doi.org/10.1016/j.procs.2023.08.155.
[57] Sen Zhao, Jinfa Wang, yang shouguo, Yicheng Zeng, Zhihui Zhao, Hongsong Zhu, Limin Sun. ProsegDL: Binary Protocol Format Extraction by Deep Learning-based Field Boundary Identification. 30th IEEE International Conference on Network Protocols(ICNP 2022). 2022, 第 7 作者
[58] Yimo Ren, Hong Li, Min Xu, Gang Xiong, ,Shuqin Zhang, Hongsong Zhu, Limin Sun. Joint Classification of IoT Devices and Relations In the Internet with Network Traffic. IEEE Wireless Communications and Networking Conference(WCNC2022). 2022, 第 7 作者
[59] Yaowen Zheng, Yuekang Li, Cen Zhang, Hongsong Zhu, Yang Liu, Limin Sun. Efficient Greybox Fuzzing of Applications in Linux-based IoT Devices via Enhanced User-mode Emulation. 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2022). 2022, 第 6 作者 通讯作者
[60] 刘培培, 李红, 刘洁, 朱红松, 孙利民. Improving the Modality Representation with Multi-View Contrastive Learning for Multimodal Sentiment Analysis. Proceedings of the International Conference on Acoustics, Speech and Signal Processing(ICASSP 2023).. 2022, 第 5 作者
[61] Ke Li, Zhi Li, Zhimin Gu, Ziying Wang, Limin Sun. Compromised IoT Devices Detection in Smart Home via Semantic Information. IEEE International Conference on Communications(ICC). 2022, 第 5 作者
[62] Yang, Kai, Haining Wang, Limin Sun. An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks. COMPUTERS IN INDUSTRY[J]. 2022, 第 3 作者138: http://dx.doi.org/10.1016/j.compind.2022.103613.
[63] Liu, Puzhuo, Zheng, Yaowen, Song, Zhanwei, Fang, Dongliang, Lv, Shichao, Sun, Limin. Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control. JOURNAL OF SYSTEMS ARCHITECTURE[J]. 2022, 第 6 作者 通讯作者 127: http://dx.doi.org/10.1016/j.sysarc.2022.102483.
[64] 方栋梁, 刘圃卓, 秦川, 宋站威, 孙玉砚, 石志强, 孙利民. 工业控制系统协议安全综述. 计算机研究与发展[J]. 2022, 第 7 作者 通讯作者 59(5): 978-993, http://lib.cqvip.com/Qikan/Article/Detail?id=7107098515.
[65] 周明, 吕世超, 游建舟, 朱红松, 石志强, 孙利民. 工业控制系统安全态势感知技术研究. 信息安全学报[J]. 2022, 第 6 作者7(2): 101-119, http://lib.cqvip.com/Qikan/Article/Detail?id=7106868449.
[66] Yimo Ren, Hong Li, Ruinian Li, Hongsong Zhu, Limin Sun. Understanding User-Level IP Blocks on the Internet. SECURITY AND COMMUNICATION NETWORKS[J]. 2022, 第 5 作者https://doaj.org/article/c8c42716667d4f8da07ab482a5a4c977.
[67] Zhihui Zhao, , Yicheng Zeng, Jinfa Wang, Hong Li, Hongsong Zhu, Limin Sun. Detection and Incentive: An tampering detection mechanism for object detection in edge computing. IEEE International Symposium on Reliable Distributed Systems(SRDS 2022). 2022, 第 6 作者
[68] Puzhuo Liu, Dongliang Fang, Chuan Qin, Kai Cheng, Shichao Lv,, Hongsong Zhu, Limin Sun. Finding Vulnerabilities in Internal-binary of Firmware with Clues. ICC 2022. 2022, 第 7 作者 通讯作者
[69] Shijie Li, Junjiao Liu, Zhiwen Pan, Shichao Lv,, Shuaizong Si, Limin Sun. Anomaly Detection based on Robust Spatial-temporal Modeling for Industrial Control Systems. IEEE International Conference on Mobile Ad-Hoc and Sensor Systems(MASS). 2022, 第 6 作者
[70] Yicheng Zeng, Jiaqian Peng, Zhihui Zhao, Zhanwei Song, Hongsong Zhu, Limin Sun. SIFOL: Solving Implicit Flows in Loops for Concolic Execution. IEEE International Performance Computing and Communications Conference(IPCCC 2022). 2022, 第 6 作者
[71] Jiapeng Zhao, Zhongjin Liu, Xiaoling Zhang, Jintao Huang, Zhiqiang Shi, Shichao Lv, Hong Li, Limin Sun. Gradient-based Adversarial Attacks against Malware Detection by Instruction Replacement. International Conference on Wireless Algorithms, Systems, and Applications (CCF C). 2022, 第 8 作者https://link.springer.com/chapter/10.1007/978-3-031-19208-1_50.
[72] Jingfei Bian, Nan Yu, Hong Li, Hongsong Zhu, Qiang Wang, Limin Sun. An Evolutionary Learning Approach towards the Open Challenge of IoT Device Identification. International Conference on Security and Privacy in Communication Networks(SecureComm 2022). 2022, 第 6 作者
[73] Jie Liu, Jinfa Wang, Peipei Liu, Hongsong Zhu, Limin Sun. Discover the ICS Landmarks based on multi-stage clue mining. International Conference on Wireless Algorithms, Systems, and Applications(WASA 2022). 2022, 第 5 作者
[74] 孙越, 吕世超, 游建舟, 孙玉砚, 陈新, 郑尧文, 孙利民. IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol. ACNS 2022: Applied Cryptography and Network Security. 2022, 第 7 作者null(null): doi.org/10.1007/978-3-031-09234-3_1.
[75] 杨锴, 张悦阳, 林晓东, 李志, 孙利民. Characterizing Heterogeneous Internet of Things Devices at Internet Scale Using Semantic Extraction. IEEE INTERNET OF THINGS JOURNAL[J]. 2021, 第 5 作者https://ieeexplore.ieee.org/document/9530590.
[76] Xiaoling Zhang, Shouguo Yang, Luqian Duan, Zhe Lang, Zhiqiang Shi, Limin Sun. Transformer XL With Graph Neural Network for Source Code Summarization. IEEE International Conference on Systems, Man, and Cybernetics(CCF C)[J]. 2021, 第 6 作者
[77] Li, Qiang, Wang, Zhihao, Tan, Dawei, Song, Jinke, Wang, Haining, Sun, Limin, Liu, Jiqiang. GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks. IEEE-ACM TRANSACTIONS ON NETWORKING[J]. 2021, 第 6 作者29(4): 1798-1812, http://dx.doi.org/10.1109/TNET.2021.3073926.
[78] Junjiao Liu, Xiaodong Lin, Xin Chen, Hui Wen, Hong Li, Yan Hu, Jiawei Sun, Zhiqiang Shi, Limin Sun. SHADOWPLCS: A Novel Scheme for Remote Detection of Industrial Process Control Attacks. IEEE Transactions on Dependable and Secure Computing(CCF A)[J]. 2021, 第 9 作者19(3): 2054-2069,
[79] Zhou, Wei, Cao, Chen, Huo, Dongdong, Cheng, Kai, Zhang, Lan, Guan, Le, Liu, Tao, Jia, Yan, Zheng, Yaowen, Zhang, Yuqing, Sun, Limin, Wang, Yazhe, Liu, Peng. Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems. IEEE INTERNET OF THINGS JOURNAL[J]. 2021, 第 11 作者8(14): 11621-11639, http://dx.doi.org/10.1109/JIOT.2021.3059457.
[80] Wang, Zuoguang, Zhu, Hongsong, Liu, Peipei, Sun, Limin. Social Engineering in Cybersecurity: A Domain Ontology and Knowledge Graph Application Examples. CYBERSECURITY[J]. 2021, 第 4 作者4(1): 1-21, http://arxiv.org/abs/2106.01157.
[81] Shuangpeng Bai, Hui Wen, Dongliang Fang, Yue Sun, Puzhuo liu, Limin Sun. DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing. Proceedings of the 19th International Conference on Applied Cryptography and Network Security[J]. 2021, 第 6 作者
[82] Kai Cheng, Dongliang Fang, Chuan Qin, Huizhao Wang, Yaowen Zheng, Nan Yu, Limin Sun. Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware. ICT systems security and privacy protection :. 2021, 第 7 作者 通讯作者 83-99,
[83] Li, Jitong, Wang, Chao, Seo, Daehee, Cheng, Xiaoman, He, Yunhua, Sun, Limin, Xiao, Ke. Deep Learning-Based Service Scheduling Mechanism for GreenRSUs in the IoVs. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2021, 第 6 作者2021: https://doaj.org/article/6daa528180744d84bd5d66961f8e9dcc.
[84] 游建舟, 吕世超, 孙越, 文辉, 孙利民. HoneyVP: A Cost-Effective Hybrid Honeypot Architecture for Industrial Control Systems. IEEE International Conference on Communications (ICC 2021). 2021, 第 5 作者https://ieeexplore.ieee.org/document/9500567.
[85] 孙利民, 潘志文, 吕世超, 石志强, 朱红松. 智能制造场景下工业互联网安全风险与对策. 信息通信技术与政策[J]. 2021, 第 1 作者24-29, http://lib.cqvip.com/Qikan/Article/Detail?id=7105457933.
[86] 王作广, 朱红松, 孙利民. 社工概念演化分析. 信息安全学报[J]. 2021, 第 3 作者6(2): 12-29, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20210202&flag=1.
[87] Zhe Lang, Shouguo Yang, Yiran Cheng, Xiaoling Zhang, Zhiqiang Shi, Limin Sun. PMatch: Semantic-based Patch Detection for Binary Programs. IEEE International Performance Computing and Communications Conference. 2021, 第 6 作者https://ieeexplore.ieee.org/document/9679443.
[88] Xiao Hu, Hong Li, Zhiqiang Shi, Nan Yu, Hongsong Zhu, Limin Sun. A Robust IoT Device Identification Method with Unknown Traffic Detection. Proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications(WASA 2021). 2021, 第 6 作者https://link.springer.com/chapter/10.1007/978-3-030-85928-2_15.
[89] 闫兆腾, 李志, 白稳平, 朱红松, 孙利民. Detecting Internet-scale Surveillance Devices using RTSP Recessive Features. International Conference on Science of Cyber Security. 2021, 第 5 作者https://link.springer.com/chapter/10.1007/978-3-030-89137-4_2.
[90] Bowen Yu, Yucheng Wang, Tingwen Liu, Hongsong Zhu, Limin Sun, Bin Wang. Maximal Clique Based Non-Autoregressive Open Information Extraction. EMNLP. 2021, 第 5 作者
[91] Dongliang Fang, Zhanwei Song, Yue Guan, Puzhuo Liu, Anni Peng, Kai Cheng, Yaowen Zheng, Peng Liu, Hongsong Zhu, Limin Sun*. ICS3Fuzzer: A Fuzzing Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software. Proceedings of the Annual Computer Security Applications Conference[J]. 2021,
[92] 何云华, 黄伟, 王伟忠, 张翠, 李红, 孙利民. 基于区块链的分布式激励架构研究. 工程科学与技术[J]. 2021, 第 6 作者53(1): 178-187, http://lib.cqvip.com/Qikan/Article/Detail?id=7103756524.
[93] 何云华, 刘昭阳, 胡堰, 李红, 孙利民, 肖珂. 基于区块链的分布式激励机制研究. 计算机应用研究[J]. 2021, 第 5 作者38(3): 664-670, http://lib.cqvip.com/Qikan/Article/Detail?id=7104037234.
[94] He, Yunhua, Shen, Jialong, Xiao, Ke, Sood, Keshav, Wang, Chao, Sun, Limin, IEEE. A Sparse Protocol Parsing Method for IIoT Protocols Based on HMM hybrid model. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2020, 第 6 作者
[95] Limin Sun. Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks. Proceedings of the the Web Conference (WWW)). 2020, 第 1 作者
[96] You, Jianzhou, Lv, Shichao, Zhao, Lian, Niu, Mengyao, Shi, Zhiqiang, Sun, Limin, IEEE. A Scalable High-interaction Physical Honeypot Framework for Programmable Logic Controller. 2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL). 2020, 第 6 作者
[97] Yucheng Wang, Bowen Yu, Yueyang Zhang, Tingwen Liu,, Hongsong Zhu, Limin Sun. TPLinker: Single-stage Joint Extraction of Entities and Relations Through Token Pair Linking. COLING. 2020, 第 6 作者http://arxiv.org/abs/2010.13415.
[98] Yang, Kai, Li, Qiang, Lin, Xiaodong, Chen, Xin, Sun, Limin. iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS[J]. 2020, 第 5 作者 通讯作者 38(5): 955-967, http://dx.doi.org/10.1109/JSAC.2020.2980921.
[99] 游建舟, 吕世超, 孙玉砚, 石志强, 孙利民. 物联网蜜罐综述. 信息安全学报[J]. 2020, 第 5 作者5(4): 138-156, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20200410&flag=1.
[100] Hu, Yan, Li, Hong, Luan, Tom H, Yang, An, Sun, Limin, Wang, Zhiliang, Wang, Rui. Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE[J]. 2020, 第 5 作者108: 1230-1240, http://dx.doi.org/10.1016/j.future.2018.07.027.
[101] Limin Sun. Malware Classification using Attention-based Transductive Learning Network. Proceedings of the International Conference on Security and Privacy in Communication Networks (SecureComm 2020). 2020, 第 1 作者
[102] You, Jianzhou, Lv, Shichao, Hao, Yichen, Feng, Xuan, Zhou, Ming, Sun, Limin, Zhou, J, Luo, X, Shen, Q, Xu, Z. Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019). 2020, 第 6 作者 通讯作者 11999: 71-88,
[103] Liting deng, Hui Wen, Yue Sun, MingFeng Xin, Limin Sun, Hongsong Zhu. Attention Based Transductive Network for Malware Classification. 16th EAI International Conference on Security and Privacy in Communication Networks. 2020, 第 5 作者
[104] 陈千, 程凯, 郑尧文, 朱红松, 孙利民. 函数级数据依赖图及其在静态脆弱性分析中的应用. 软件学报[J]. 2020, 第 5 作者31(11): 3421-3435, http://lib.cqvip.com/Qikan/Article/Detail?id=7103363893.
[105] 赵国新, 丁若凡, 游建舟, 吕世超, 彭锋, 李菲, 孙利民. 基于工控业务仿真的高交互可编程逻辑控制器蜜罐系统设计实现. 计算机应用[J]. 2020, 第 7 作者40(9): 2650-2656, http://lib.cqvip.com/Qikan/Article/Detail?id=7102860244.
[106] Zhou, Zan, Kuang, Xiaohui, Sun, Limin, Zhong, Lujie, Xu, Changqiao. Endogenous Security Defense against Deductive Attack: When Artificial Intelligence Meets Active Defense for Online Service. IEEE COMMUNICATIONS MAGAZINE[J]. 2020, 第 3 作者58(6): 58-64, http://dx.doi.org/10.1109/MCOM.001.1900367.
[107] 闫兆腾, 于楠, 文辉, 李志, 朱红松, 孙利民. Detecting Internet-Scale NATs for Devices Based on Tri-Net IoT. Wireless Algorithms, Systems, and Applications[J]. 2020, 第 6 作者https://link.springer.com/chapter/10.1007/978-3-030-59016-1_50.
[108] 孙利民. 工业互联网安全首要任务是建立安全检查和风险识别能力. 中国战略新兴产业[J]. 2019, 第 1 作者94-96, http://lib.cqvip.com/Qikan/Article/Detail?id=7003117691.
[109] Yan Hu, Hong Li, Hong Yang, Yuyan Sun, Limin Sun, Zhiliang Wang. Detecting stealthy attacks against industrial control systems based on residual skewness analysis. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING[J]. 2019, 第 5 作者1-14, https://doaj.org/article/2ae3f76953494545bfe90dfa314735ae.
[110] 王志豪, 张卫东, 文辉, 朱红松, 尹丽波, 孙利民. IP定位技术研究. 信息安全学报[J]. 2019, 第 6 作者4(3): 34-47, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20190303&flag=1.
[111] Li Ke, You Jianzhou, Wen Hui, Li Hong, Sun Limin, Arai K, Bhatia R, Kapoor S. Collaborative Intelligence Analysis for Industrial Control Systems Threat Profiling. PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2. 2019, 第 5 作者 通讯作者 881: 94-106,
[112] Yang, Kai, Li, Qiang, Sun, Limin. Towards automatic fingerprinting of IoT devices in the cyberspace. COMPUTER NETWORKS[J]. 2019, 第 3 作者148: 318-327, http://dx.doi.org/10.1016/j.comnet.2018.11.013.
[113] 刘烃, 田决, 王稼舟, 吴宏宇, 孙利民, 周亚东, 沈超, 管晓宏. 信息物理融合系统综合安全威胁与防御研究. 自动化学报[J]. 2019, 第 5 作者45(1): 5-24, http://www.aas.net.cn:80/cn/article/doi/10.16383/j.aas.2018.c180461.
[114] Wang, Yucheng, Wang, Xu, Zhu, Hongsong, Zhao, Hai, Li, Hong, Sun, Limin, Biagioni, ES, Zheng, Y, Cheng, S. ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2019. 2019, 第 6 作者11604: 346-357,
[115] 何云华, 李梦茹, 李红, 孙利民, 肖珂, 杨超. 群智感知应用中基于区块链的激励机制. 计算机研究与发展[J]. 2019, 第 4 作者56(3): 544-554, http://lib.cqvip.com/Qikan/Article/Detail?id=7001418111.
[116] Zheng Yaowen, Davanian Ali, Yin Heng, Song Chengyu, Zhu Hongsong, Su Limin, USENIX Assoc. FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM. 2019, 1099-1114, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000509775000063.
[117] Zhou, Ming, Lv, Shichao, Yin, Libo, Chen, Xin, Li, Hong, Sun, Limin, IEEE. SCTM: A Multi-view Detecting Approach Against Industrial Control Systems Attacks. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2019, 第 6 作者
[118] Wang Xu, Wang Yucheng, Feng Xuan, Zhu Hongsong, Sun Limin, Zou Yuchi, IEEE. IoTTracker: An Enhanced Engine for Discovering Internet-of-Thing Devices. 2019 IEEE 20TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM). 2019, 第 5 作者http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000494803500042.
[119] Feng Xuan, Liao Xiaojing, Wang XiaoFeng, Wang Haining, Li Qiang, Yang Kai, Zhu Hongsong, Sun Limin, USENIX Assoc. Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM. 2019, 第 8 作者 通讯作者 887-903, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000509775000051.
[120] Li, Ruinian, Song, Tianyi, Mei, Bo, Li, Hong, Cheng, Xiuzhen, Sun, Limin. Blockchain for Large-Scale Internet of Things Data Storage and Protection. IEEE TRANSACTIONS ON SERVICES COMPUTING[J]. 2019, 第 6 作者12(5): 762-771, https://www.webofscience.com/wos/woscc/full-record/WOS:000492430500009.
[121] Mi, Xianghang, Feng, Xuan, Liao, Xiaojing, Liu, Baojun, Wang, XiaoFeng, Qian, Feng, Li, Zhou, Alrwais, Sumayah, Sun, Limin, Liu, Ying, IEEE. Resident Evil: Understanding Residential IP Proxy as a Dark Service. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019). 2019, 第 9 作者1185-1201,
[122] Yang, Shouguo, Shi, Zhiqiang, Zhang, Guodong, Li, Mingxuan, Ma, Yuan, Sun, Limin, IEEE. Understand Code Style: Efficient CNN-based Compiler Optimization Recognition System. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2019, 第 6 作者
[123] Li, Ke, Li, Hong, Zhu, Hongsong, Sun, Limin, Wen, Hui, IEEE. Side-Channel Information Leakage of Traffic Data in Instant Messaging. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2019, 第 4 作者
[124] 肖珂, 戴舜, 何云华, 孙利民. 基于城市监控的自然场景图像的中文文本提取方法. 计算机研究与发展[J]. 2019, 第 4 作者56(7): 1525-1533, http://lib.cqvip.com/Qikan/Article/Detail?id=7002364320.
[125] Sun Yuyan, Sun Limin, Shi Zhiqiang, Yu Wenhao, Ying Huan, Urien P, Piramuthu S. Vulnerability Finding and Firmware Association in Power Grid. PROCEEDINGS OF THE 2019 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV). 2019, 第 2 作者
[126] Zheng, Yaowen, Song, Zhanwei, Sun, Yuyan, Cheng, Kai, Zhu, Hongsong, Sun, Limin, IEEE. An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)[J]. 2019, 第 6 作者null(null):
[127] Wen, Hui, Zhang, Weidong, Hu, Yan, Hu, Qing, Zhu, Hongsong, Sun, Limin, Biagioni, ES, Zheng, Y, Cheng, S. Lightweight IoT Malware Visualization Analysis via Two-Bits Networks. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2019. 2019, 第 6 作者11604: 613-621,
[128] 游建舟, 张悦阳, 吕世超, 陈新, 尹丽波, 孙利民. 基于数据包分片的工控蜜罐识别方法. 信息安全学报[J]. 2019, 第 6 作者4(3): 83-92, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20190306&flag=1.
[129] 郑尧文, 文辉, 程凯, 宋站威, 朱红松, 孙利民. 物联网设备漏洞挖掘技术研究综述. 信息安全学报[J]. 2019, 第 6 作者4(5): 61-75, http://lib.cqvip.com/Qikan/Article/Detail?id=7100187215.
[130] 徐顺超, 陈永乐, 李志, 孙利民. 物联网设备Web弱口令自动化探测. 计算机工程与设计[J]. 2019, 第 4 作者40(1): 8-13, http://lib.cqvip.com/Qikan/Article/Detail?id=7001132765.
[131] Yang An, Wang Xiaoshan, Sun Yuyan, Hu Yan, Shi Zhiqiang, Sun Limin, IEEE. Multi-dimensional Data Fusion Intrusion Detection for Stealthy Attacks on Industrial Control Systems. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)[J]. 2018, 第 6 作者
[132] Li Qiang, Feng Xuan, Wang Haining, Sun Limin, IEEE. Discovery of Internet of Thing Devices based on Rules. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS). 2018, 第 4 作者
[133] 杨安, 胡堰, 周亮, 郑为民, 石志强, 孙利民. 基于信息流和状态流融合的工控系统异常检测算法. 计算机研究与发展[J]. 2018, 第 6 作者55(11): 2532-2542, http://lib.cqvip.com/Qikan/Article/Detail?id=7000898773.
[134] 李强, 贾煜璇, 宋金珂, 李红, 朱红松, 孙利民. 网络空间物联网信息搜索. 信息安全学报[J]. 2018, 第 6 作者3(5): 38-53, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20180504&flag=1.
[135] Li, Qiang, Feng, Xuan, Wang, Haining, Li, Zhi, Sun, Limin, IEEE. Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018). 2018, 第 5 作者2537-2545,
[136] Chen, Yu, Li, Hong, Ma, Yuan, Shi, Zhiqiang, Sun, Limin, Chellappan, S, Cheng, W, Li, W. Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File Retrieval. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2018). 2018, 第 5 作者10874: 53-65,
[137] Limin Sun. Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices. USENIX Security '18. 2018, 第 1 作者
[138] Limin Sun. Mining Human Periodic Behaviors using Mobility Internation and Relative Entropy. Proceedings of the 22nd Pacific-Asia Conference on Knowledge Discovery and Date Mining(PAKDD 2018). 2018, 第 1 作者
[139] Li, Qiang, Feng, Xuan, Wang, Haining, Sun, Limin. Understanding the Usage of Industrial Control System Devices on the Internet. IEEE INTERNET OF THINGS JOURNAL[J]. 2018, 第 4 作者 通讯作者 5(3): 2178-2189, http://dx.doi.org/10.1109/JIOT.2018.2826558.
[140] 舒坚, 蒋善东, 孙利民. 表征机会传感网络连通性的方法. 北京邮电大学学报[J]. 2018, 第 3 作者41(1): 59-64, http://lib.cqvip.com/Qikan/Article/Detail?id=675222784.
[141] 王迁, 杨明祥, 雷晓辉, 舒坚, 孙利民, 黄雪姝. 基于PSO-SVR的丹江口年径流预报. 南水北调与水利科技[J]. 2018, 第 5 作者16(3): 65-71, http://lib.cqvip.com/Qikan/Article/Detail?id=675818962.
[142] Wang, Hongtao, Wang, Hongmei, Yi, Feng, Wen, Hui, Li, Gang, Sun, Limin. Context-aware personalized path inference from large-scale GPS snippets. EXPERT SYSTEMS WITH APPLICATIONS[J]. 2018, 第 6 作者91: 78-88, http://dx.doi.org/10.1016/j.eswa.2017.08.027.
[143] Du, Suguo, Li, Xiaolong, Zhong, Jinli, Zhou, Lu, Xue, Minhui, Zhu, Haojin, Sun, Limin. Modeling Privacy Leakage Risks in Large-Scale Social Networks. IEEE ACCESS[J]. 2018, 第 7 作者6: 17653-17665, https://doaj.org/article/0fefefca21664f72a4852ca6b71cafff.
[144] Yan Hu, An Yang, Hong Li, Yuyan Sun, Limin Sun. A survey of intrusion detection on industrial control systems. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2018, 第 5 作者14(8): https://doaj.org/article/323485efa98a4e6cb401827a05edc15b.
[145] Zhang Weidong, Chen Yu, Li Hong, Li Zhi, Sun Limin, IEEE. PANDORA: A Scalable and Efficient Scheme to Extract Version of Binaries in IoT Firmwares. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2018, 第 5 作者
[146] Liu Junjiao, Yin Libo, Hu Yan, Lv Shichao, Sun Limin, IEEE. A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition. 2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2018, 第 5 作者
[147] Liu Qi, Li Hong, Hu Yan, Sun Limin, IEEE. A Check-in System Leveraging Face Recognition. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY. 2018, 第 4 作者412-418, http://dx.doi.org/10.1109/Cybermatics_2018.2018.00095.
[148] Hu, Chunqiang, Yu, Jiguo, Cheng, Xiuzhen, Tian, Zhi, Akkaya, Kemal, Sun, Limin. CP_ABSC: AN ATTRIBUTE-BASED SIGNCRYPTION SCHEME TO SECURE MULTICAST COMMUNICATIONS IN SMART GRIDS. MATHEMATICAL FOUNDATIONS OF COMPUTING[J]. 2018, 第 6 作者1(1): 77-100,
[149] Cheng, Kai, Li, Qiang, Wang, Lei, Chen, Qian, Zheng, Yaowen, Sun, Limin, Liang, Zhenkai, IEEE. DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware. 2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN). 2018, 第 6 作者430-441,
[150] Yang An, Sun Limin, Shi Zhiqiang, Zheng Weimin, Sun Yuyan, Hu Yan, IEEE. SBSD: Detecting the Sequence Attack through Sensor Data in ICSs. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2018, 第 2 作者
[151] 陈昱, 刘中金, 赵威威, 马原, 石志强, 孙利民. 一种大规模的跨平台同源二进制文件检索方法. 计算机研究与发展[J]. 2018, 第 6 作者55(7): 1498-1507, http://lib.cqvip.com/Qikan/Article/Detail?id=676015048.
[152] Yuxuan Jia, Bing Han, Qiang Li, Hong Li, Limin Sun. Who owns Internet of Thing devices?. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2018, 第 5 作者14(11): https://doaj.org/article/c693dbf17b0a4e49a3ab1ed073f2702a.
[153] Zhang Weidong, Li Hong, Wen Hui, Zhu Hongsong, Sun Limin, IEEE. A graph neural network based efficient firmware information extraction method for IoT devices. 2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2018, 第 5 作者
[154] Li Qizhen, Gao Jie, Wen Jinming, Tang Xiaohu, Zhao Lian, Sun Limin, IEEE. SMDP-based Downlink Packet Scheduling Scheme for Solar Energy Assisted Heterogeneous Networks. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY. 2018, 第 6 作者268-273, http://dx.doi.org/10.1109/Cybermatics_2018.2018.00074.
[155] 张光华, 庞少博, 张玉清, 孙利民. 云环境下基于静态博弈的信任等级模型研究. 北京理工大学学报[J]. 2018, 第 4 作者38(1): 96-101, http://lib.cqvip.com/Qikan/Article/Detail?id=674636135.
[156] Feng, Xuan, Li, Qiang, Wang, Haining, Sun, Limin, USENIX Assoc. Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices. PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM. 2018, 第 4 作者327-341, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000485139900020.
[157] He, Yunhua, Li, Hong, Cheng, Xiuzhen, Liu, Yan, Yang, Chao, Sun, Limin. A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications. IEEE ACCESS[J]. 2018, 第 6 作者6: 27324-27335, https://doaj.org/article/95bfd085d9b44e0b8cff8df1a490d768.
[158] Nan, Yuhong, Yang, Zhemin, Yang, Min, Zhou, Shunfan, Zhang, Yuan, Gu, Guofei, Wang, Xiaofeng, Sun, Limin. Identifying User-Input Privacy in Mobile Applications at a Large Scale. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2017, 第 8 作者12(3): 647-661, https://www.webofscience.com/wos/woscc/full-record/WOS:000394666300007.
[159] Zhang, Lin, Li, Hong, Sun, Limin, Shi, Zhiqiang, He, Yunhua, IEEE. POSTER: Towards Fully Distributed User Authentication with Blockchain. 2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC). 2017, 第 3 作者202-203, http://dx.doi.org/10.1109/PAC.2017.28.
[160] Wang, Hongtao, Wen, Hui, Yi, Feng, Zhu, Hongsong, Sun, Limin. Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets. SENSORS[J]. 2017, 第 5 作者17(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000398818700123.
[161] Lu, Xiang, Tu, Linlin, Zhou, Xinyun, Xiong, Naixue, Sun, Limin. ViMediaNet: an emulation system for interactive multimedia based telepresence services. JOURNAL OF SUPERCOMPUTING[J]. 2017, 第 5 作者73(8): 3562-3578, http://dx.doi.org/10.1007/s11227-016-1821-9.
[162] Yi, Feng, Gu, Yu, Wang, Hongtao, Sun, Yuyan, Sun, Limin, IEEE. Mobility Pattern based Relationship Inference from Spatiotemporal Data. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE. 2017, 第 5 作者
[163] Yi Feng, Li Hong, Wang Hongtao, Wen Hui, Sun Limin, Ma L, Khreishah A, Zhang Y, Yan M. Mobility Intention-Based Relationship Inference from Spatiotemporal Data. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017. 2017, 第 5 作者10251: 871-876,
[164] 程冬梅, 严彪, 文辉, 孙利民. 基于规则匹配的分布式工控入侵检测系统设计与实现. 信息网络安全[J]. 2017, 第 4 作者45-51, http://lib.cqvip.com/Qikan/Article/Detail?id=672608923.
[165] Wang, Zhihao, Chen, Yongle, Wen, Hui, Zhao, Lian, Sun, Limin, IEEE. Discovering Routers as Secondary Landmarks for Accurate IP Geolocation. 2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL). 2017, 第 5 作者 通讯作者 http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000428141601091.
[166] 任春林, 谷雨, 崔杰, 刘松, 朱红松, 孙利民. 基于WEB信息的特定类型物联网终端识别方法. 通信技术[J]. 2017, 第 6 作者50(5): 1003-1009, http://lib.cqvip.com/Qikan/Article/Detail?id=672259108.
[167] He Yunhua, Li Hong, Cheng Xiuzhen, Liu Yan, Sun Limin, Ma L, Khreishah A, Zhang Y, Yan M. A Bitcoin Based Incentive Mechanism for Distributed P2P Applications. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017. 2017, 第 5 作者10251: 457-468,
[168] Hu Qing, Lv Shichao, Shi Zhiqiang, Sun Limin, Xiao Liang, Ma L, Khreishah A, Zhang Y, Yan M. Defense Against Advanced Persistent Threats with Expert System for Internet of Things. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017. 2017, 第 4 作者10251: 326-337,
[169] Wang, Xiaoshan, Liu, Yao, Lu, Xiang, Lv, Shichao, Shi, Zhiqiang, Sun, Limin, IEEE. On Eavesdropping Attacks and Countermeasures for MU-MIMO Systems. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM). 2017, 第 6 作者40-45,
[170] Li, Qiang, Feng, Xuan, Zhao, Lian, Sun, Limin. A Framework for Searching Internet-Wide Devices. IEEE NETWORK[J]. 2017, 第 4 作者31(6): 101-107, http://dx.doi.org/10.1109/MNET.2017.1700034.
[171] Yi Feng, Li Zhi, Wang Hongtao, Zheng Weimin, Sun Limin, Li G, Ge Y, Zhang Z, Jin Z, Blumenstein M. MIAC: A Mobility Intention Auto-Completion Model for Location Prediction. KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2017). 2017, 第 5 作者10412: 432-444,
[172] Yi, Feng, Li, Hong, Wang, Hongtao, Sun, Limin. Why You Go Reveals Who You Know: Disclosing Social Relationship by Cooccurrence. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2017, 第 4 作者https://doaj.org/article/8f12121d6fbf4daabb0bed8bf92d3269.
[173] Wang, Xiaoshan, Liu, Yao, Lu, Xiang, Lv, Shichao, Shi, Zhiqiang, Sun, Limin, IEEE. CovertMIMO: A Covert Uplink Transmission Scheme for MIMO Systems. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2017, 第 6 作者
[174] Wang, Hao, Chen, Liangyin, Liu, Shijia, Fu, Songtao, Luo, Qian, Yin, Feng, Sun, Limin, Li, Zhanghua. Trajectory-Based Hierarchical Adaptive Forwarding in Vehicular Ad Hoc Networks. JOURNAL OF SENSORS[J]. 2017, 第 7 作者2017: https://doaj.org/article/748d48fc27924491b131dda6409247eb.
[175] Xiao, Liang, Chen, Tianhua, Han, Guoan, Zhuang, Weihua, Sun, Limin. Game Theoretic Study on Channel-Based Authentication in MIMO Systems. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2017, 第 5 作者66(8): 7474-7484, https://www.webofscience.com/wos/woscc/full-record/WOS:000407686300068.
[176] 张书钦, 李凯江, 郭倩倩, 孙利民, 石志强. 工业控制网络安全脆弱性分析技术研究. 中原工学院学报[J]. 2017, 第 4 作者28(6): 63-69, http://lib.cqvip.com/Qikan/Article/Detail?id=674230076.
[177] Li, Qiang, Feng, Xuan, Wang, Haining, Sun, Limin, ACM. Automatically Discovering Surveillance Devices in the Cyberspace. PROCEEDINGS OF THE 8TH ACM MULTIMEDIA SYSTEMS CONFERENCE (MMSYS'17). 2017, 第 4 作者 通讯作者 331-342, http://dx.doi.org/10.1145/3083187.3084020.
[178] Lv, Shichao, Xiao, Liang, Hu, Qing, Wang, Xiaoshan, Hu, Changzhen, Sun, Limin, IEEE. Anti-jamming Power Control Game in Unmanned Aerial Vehicle Networks. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE. 2017, 第 6 作者
[179] Wang, Hongtao, Li, Qiang, Yi, Feng, Li, Zhi, Sun, Limin. Influential spatial facility prediction over large scale cyber-physical vehicles in smart city. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING[J]. 2016, 第 5 作者 通讯作者 http://dx.doi.org/10.1186/s13638-016-0606-4.
[180] Lv, Shichao, Lu, Xiang, Lu, Zhu, Wang, Xiaoshan, Wang, Ning, Sun, Limin, IEEE. Zero Reconciliation Secret Key Extraction in MIMO Backscatter Wireless Systems. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2016, 第 6 作者http://dx.doi.org/10.1109/ICC.2016.7510987.
[181] Li, Qiang, Han, Qi, Sun, Limin. Collaborative Recognition of Queuing Behavior on Mobile Phones. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2016, 第 3 作者15(1): 60-73, https://www.webofscience.com/wos/woscc/full-record/WOS:000365990700005.
[182] 常青, 刘中金, 王猛涛, 陈昱, 石志强, 孙利民. VDNS:—种跨平台的固件漏洞关联算法. 计算机研究与发展[J]. 2016, 第 6 作者53(10): 2288-2298, http://lib.cqvip.com/Qikan/Article/Detail?id=7000068576.
[183] Hong Li, Limin Sun, Haojin Zhu, Xiang Lu, Xiuzhen Cheng. Achieving Privacy Preservation in WiFi Fingerprint-Based Localization. IEEE INFOCOM 2014 - IEEE Conference on Computer Communications : Volume 3 of 3 Pages 1905-2866.. 2016, 第 2 作者2337-2345,
[184] Feng, Xuan, Li, Qiang, Han, Qi, Zhu, Hongsong, Liu, Yan, Sun, Limin, IEEE. Identification of Visible Industrial Control Devices at Internet Scale. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2016, 第 6 作者http://dx.doi.org/10.1109/ICC.2016.7511426.
[185] Li, Yi, Zhou, Lu, Zhu, Haojin, Sun, Limin. Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks. IEEE INTERNET OF THINGS JOURNAL[J]. 2016, 第 4 作者3(4): 563-571, https://www.webofscience.com/wos/woscc/full-record/WOS:000381470400013.
[186] Yang, Weidong, He, Yunhua, Sun, Limin, Lu, Xiang, Li, Xinghua. An optimal query strategy for protecting location privacy in location-based services. PEER-TO-PEER NETWORKING AND APPLICATIONS[J]. 2016, 第 3 作者9(4): 752-761, https://www.webofscience.com/wos/woscc/full-record/WOS:000377468100012.
[187] Li Hong, Zhang Cheng, He Yunhua, Cheng Xiuzhen, Liu Yan, Sun Limin, Yang Q, Yu W, Challal Y. An Enhanced Structure-Based De-anonymization of Online Social Networks. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016. 2016, 第 6 作者 通讯作者 9798: 331-342,
[188] Feng, Xuan, Li, Qiang, Wang, Haining, Sun, Limin, IEEE. Characterizing Industrial Control System Devices on the Internet. 2016 IEEE 24TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP). 2016, 第 4 作者
[189] Zhao, Qinglin, Sakurai, Taka, Yu, Jiguo, Sun, Limin. Maximizing the stable throughput of high-priority traffic for wireless cyber-physical systems. EURASIPJOURNALONWIRELESSCOMMUNICATIONSANDNETWORKING[J]. 2016, 第 4 作者https://www.webofscience.com/wos/woscc/full-record/WOS:000391597400001.
[190] 杨安, 孙利民, 王小山, 石志强. 工业控制系统入侵检测技术综述. 计算机研究与发展[J]. 2016, 第 2 作者53(9): 2039-2054, http://lib.cqvip.com/Qikan/Article/Detail?id=669858996.
[191] 黄伟武, 闫兆腾, 朱红松, 孙利民. 网络扫描发包速率学习算法. 信息安全与通信保密[J]. 2016, 第 4 作者110-114, http://lib.cqvip.com/Qikan/Article/Detail?id=668364925.
[192] Li, Shujun, Li, Hong, Sun, Limin. Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING[J]. 2016, 第 3 作者http://dx.doi.org/10.1186/s13638-016-0624-2.
[193] Wei, Liangxiong, Zhou, Beisi, Ma, Xichu, Chen, Dexin, Zhang, Jingyu, Peng, Jian, Luo, Qian, Sun, Limin, Li, Dingcheng, Chen, Liangyin. Lightning: A High-Efficient Neighbor Discovery Protocol for Low Duty Cycle WSNs. IEEE COMMUNICATIONS LETTERS[J]. 2016, 第 8 作者20(5): 966-969, https://www.webofscience.com/wos/woscc/full-record/WOS:000376516000033.
[194] Zheng Yaowen, Cheng Kai, Li Zhi, Pan Shiran, Zhu Hongsong, Sun Limin, Lam KY, Chi CH, Qing S. A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016. 2016, 第 6 作者9977: 27-36,
[195] 常青, 刘中金, 王猛涛, 陈昱, 石志强, 孙利民. VDNS: 一种跨平台的固件漏洞关联算法. 计算机研究与发展[J]. 2016, 第 6 作者53(10): 2287-2297, https://crad.ict.ac.cn/cn/article/doi/10.7544/issn1000-1239.2016.20160442.
[196] Feng, Xuan, Li, Qiang, Wang, Haining, Sun, Limin, IEEE. ASCEND: A Search Engine for Online Industrial Control Devices. 2016 IEEE 24TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP). 2016, 第 4 作者
[197] He, Zaobo, Cai, Zhipeng, Han, Qilong, Tong, Weitian, Sun, Limin, Li, Yingshu. An energy efficient privacy-preserving content sharing scheme in mobile social networks. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2016, 第 5 作者20(5): 833-846, http://dx.doi.org/10.1007/s00779-016-0952-6.
[198] Li Hong, He Yunhua, Sun Limin, Cheng Xiuzhen, Yu Jiguo, IEEE. Side-Channel Information Leakage of Encrypted Video Stream in Video Surveillance Systems. IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS. 2016, 第 3 作者 通讯作者
[199] Wen Hui, Ge Shiming, Chen Shuixian, Wang Hongtao, Sun Limin, IEEE. Abnormal Event Detection via Adaptive Cascade Dictionary Learning. 2015 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP). 2015, 第 5 作者 通讯作者 847-851,
[200] 孙玉砚, 孙利民, 朱红松, 周新运. 基于车牌识别系统车辆轨迹的行为异常检测. 计算机研究与发展[J]. 2015, 第 2 作者52(8): 1921-1929, http://lib.cqvip.com/Qikan/Article/Detail?id=665742497.
[201] Chen Shuixian, Lu Xiang, Sun Limin, Ge Shiming, IEEE. Target Domain Adaptation for Face Detection in A Smart Camera Network with Peer-to-Peer Communications. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). 2015, 第 3 作者
[202] Jin Yongming, Zhu Hongsong, Shi Zhiqiang, Lu Xiang, Sun Limin, IEEE. Cryptanalysis and Improvement of two RFID-OT Protocols Based on Quadratic Residues. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2015, 第 5 作者7234-7239,
[203] 蔡青松, 刘燕, 牛建伟, 孙利民. 一种关注消息时效性的机会社会网络中节点传播能力分析模型. 电子学报[J]. 2015, 第 4 作者43(9): 1705-1713, http://lib.cqvip.com/Qikan/Article/Detail?id=666434163.
[204] Wen, Hong, Tang, Jie, Wu, Jinsong, Song, Huanhuan, Wu, Tingyong, Wu, Bin, Ho, PinHan, Lv, ShiChao, Sun, LiMin. A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT). IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING[J]. 2015, 第 9 作者3(1): 119-126, https://www.webofscience.com/wos/woscc/full-record/WOS:000209844700012.
[205] Luan, Tom H, Shen, Xuemin Sherman, Bai, Fan, Sun, Limin. Feel Bored? Join Verse! Engineering Vehicular Proximity Social Networks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2015, 第 4 作者64(3): 1120-1131, https://www.webofscience.com/wos/woscc/full-record/WOS:000351459600022.
[206] Xie Kaixuan, Ge Shiming, Yang Rui, Lu Xiang, Sun Limin, Zha H, Chen X, Wang L, Miao Q. Negative-Supervised Cascaded Deep Learning for Traffic Sign Classification. COMPUTER VISION, CCCV 2015, PT I. 2015, 第 5 作者546: 249-257,
[207] Li, Liqun, Sun, Limin, Xing, Guoliang, Huangfu, Wei, Zhou, Ruogu, Zhu, Hongsong. ROCS: Exploiting FM Radio Data System for Clock Calibration in Sensor Networks. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2015, 第 2 作者14(10): https://www.webofscience.com/wos/woscc/full-record/WOS:000360744700012.
[208] Li, Zhi, Liu, Yan, Zhu, Hongsong, Sun, Limin. Coff: Contact- Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2015, 第 4 作者64(11): 5257-5268, https://www.webofscience.com/wos/woscc/full-record/WOS:000365016700030.
[209] 王小山, 杨安, 石志强, 孙利民. 工业控制系统信息安全新趋势. 信息网络安全[J]. 2015, 第 4 作者6-11, http://lib.cqvip.com/Qikan/Article/Detail?id=663556222.
[210] Gao Shanyan, Zhu Hongsong, Zhou Xinyun, Liu Yan, Sun Limin, Sun L, Ma H, Fang D, Niu J, Wang W. Design and Implementation of Smart Home Linkage System Based on OSGI and REST Architecture. ADVANCES IN WIRELESS SENSOR NETWORKS. 2015, 第 5 作者501: 568-582,
[211] Li, Hong, He, Yunhua, Cheng, Xiuzhen, Zhu, Hongsong, Sun, Limin. Security and Privacy in Localization for Underwater Sensor Networks. IEEE COMMUNICATIONS MAGAZINE[J]. 2015, 第 5 作者53(11): 56-62, http://dx.doi.org/10.1109/MCOM.2015.7321972.
[212] 杨红, 朱红松, 孙利民. B-RPL:低存储开销的RPL路由协议. 计算机科学[J]. 2015, 第 3 作者42(1): 96-100, http://lib.cqvip.com/Qikan/Article/Detail?id=663510087.
[213] 吴子珺, 于重重, 孙利民, 孙玉砚. 一种针对特定车辆潜在群体的行驶轨迹预测方法. 计算机应用研究[J]. 2014, 第 3 作者31(7): 1951-1955, http://lib.cqvip.com/Qikan/Article/Detail?id=50158715.
[214] Wei, Yu, Yan, Hongli, Bie, Rongfang, Wang, Shenling, Sun, Limin. Performance monitoring and evaluation in dance teaching with mobile sensing technology. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2014, 第 5 作者18(8): 1929-1939, https://www.webofscience.com/wos/woscc/full-record/WOS:000344812200013.
[215] 何鹏, 阎保平, 李志, 孙利民. CM-MAC:一种基于分簇的多信道车载网MAC协议. 计算机研究与发展[J]. 2014, 第 4 作者51(3): 502-510, http://lib.cqvip.com/Qikan/Article/Detail?id=48799053.
[216] Weidong Yang, Wei Liu, Pan Li, Limin Sun. TDMA-Based Control Channel Access for IEEE 802.11p in VANETs. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2014, 第 4 作者10: https://doaj.org/article/4d8815e01316407a8d05406a20352ef6.
[217] Han, Yibo, Tang, Jine, Zhou, ZhangBing, Xiao, Mingzhong, Sun, Limin, Wang, Qun. Novel itinerary-based KNN query algorithm leveraging grid division routing in wireless sensor networks of skewness distribution. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2014, 第 5 作者18(8): 1989-2001, https://www.webofscience.com/wos/woscc/full-record/WOS:000344812200018.
[218] Li, Liqun, Xing, Guoliang, Sun, Limin, Liu, Yan. A Quality-Aware Voice Streaming System for Wireless Sensor Networks. ACM TRANSACTIONS ON SENSOR NETWORKS[J]. 2014, 第 3 作者10(4): https://www.webofscience.com/wos/woscc/full-record/WOS:000339008000008.
[219] Cai, Qingsong, Bai, Yuqing, Sun, Limin, Niu, Jianwei, Niu, J, Shu, L, Zhou, Z. Quantifying Individual Communication Capability in Opportunistic Mobile Social Networks. 2014 IEEE COMPUTING, COMMUNICATIONS AND IT APPLICATIONS CONFERENCE (COMCOMAP). 2014, 第 3 作者1-6, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000380447700001.
[220] Liu, Wei, Li, Hong, Chen, Yongle, Zhu, Hongsong, Sun, Limin. LARES: latency-reduced neighbour discovery for contagious diseases prevention. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING[J]. 2014, 第 5 作者 通讯作者 16(1): 3-13, https://www.webofscience.com/wos/woscc/full-record/WOS:000338418800002.
[221] Guo, Junqi, Xie, Xiaobo, Bie, Rongfang, Sun, Limin. Structural health monitoring by using a sparse coding-based deep learning algorithm with wireless sensor networks. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2014, 第 4 作者18(8): 1977-1987, https://www.webofscience.com/wos/woscc/full-record/WOS:000344812200017.
[222] Di Wu, Xiaojing Wang, Limin Sun, Yan Ling, Dongxia Zhang. Identity privacy-based reliable routing method in VANETs. PEER-TO-PEER NETWORKING AND APPLICATIONS[J]. 2014, 第 3 作者7(3): 285-294, http://dx.doi.org/10.1007/s12083-012-0143-9.
[223] Yunhua He, Limin Sun, Weidong Yang, Hong Li. A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2014, 第 2 作者 通讯作者 10: https://doaj.org/article/9d96d4d0a63b45138968bd5897a29609.
[224] Wen Hui, Ge Shiming, Yang Rui, Chen Shuixian, Sun Limin, IEEE. Robust Visual Tracking via Discriminative Sparse Point Matching. PROCEEDINGS OF THE 2014 9TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA). 2014, 第 5 作者1243-1246,
[225] Wu, Di, Wang, Xiaojing, Sun, Limin, Ling, Yan, Zhang, Dongxia. Identity privacy-based reliable routing method in VANETs. PEER-TO-PEER NETWORKING AND APPLICATIONS[J]. 2014, 第 3 作者7(3): 285-294, http://dx.doi.org/10.1007/s12083-012-0143-9.
[226] Zhang, Yuan, Sun, Limin, Song, Houbing, Cao, Xiaojun. Ubiquitous WSN for Healthcare: Recent Advances and Future Prospects. IEEE INTERNET OF THINGS JOURNAL[J]. 2014, 第 2 作者1(4): 311-318, https://www.webofscience.com/wos/woscc/full-record/WOS:000209672500003.
[227] Xiong, Yongping, Zhou, Ruogu, Li, Minming, Xing, Guoliang, Sun, Limin, Ma, Jian. ZiFi: Exploiting Cross-Technology Interference Signatures for Wireless LAN Discovery. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2014, 第 5 作者13(11): 2675-2688, https://www.webofscience.com/wos/woscc/full-record/WOS:000343317500018.
[228] 金永明, 吴棋滢, 石志强, 芦翔, 孙利民. 基于PRF的RFID轻量级认证协议研究. 计算机研究与发展[J]. 2014, 第 5 作者51(7): 1506-1514, http://lib.cqvip.com/Qikan/Article/Detail?id=50300270.
[229] 李平, 孙利民, 吴佳英, 方庆, 谢晋阳, 周博翔. 基于可离散处理的RFID防碰撞混杂算法研究. 通信学报[J]. 2013, 第 2 作者34(8): 10-17, http://lib.cqvip.com/Qikan/Article/Detail?id=46897700.
[230] Li Qiang, Han Qi, Sun Limin, IEEE. Context-aware Handoff on Smartphones. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013). 2013, 第 3 作者470-478,
[231] Chen, Yongle, Chen, Ci, Zhu, Hongsong, Sun, Limin. Efficient Deterministic Anchor Deployment for Sensor Network Positioning. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 第 4 作者 通讯作者 9: https://doaj.org/article/950537e1f14e4f2bbd9cab7aad3893bf.
[232] Zhang, Qinyu, Cao, Bin, Wang, Ye, Zhang, Naitong, Lin, Xiaodong, Sun, Limin. ON EXPLOITING POLARIZATION FOR ENERGY-HARVESTING ENABLED COOPERATIVE COGNITIVE RADIO NETWORKING. IEEE WIRELESS COMMUNICATIONS[J]. 2013, 第 6 作者20(4): https://www.webofscience.com/wos/woscc/full-record/WOS:000324598600017.
[233] Di Wu, Dongxia Zhang, Guozhen Tan, Limin Sun, Juanjuan Li, Jiangchuan Liu. Improvement and Performance Evaluation for Multimedia Files Transmission in Vehicle-Based DTNs. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 第 4 作者9: https://doaj.org/article/7095cec7979b4b048eb79e68e72ffc90.
[234] Xiao, Fu, Wang, Ruchuan, Sun, Limin, Li, Qun, Zhang, Hongwei, Huang, Liusheng. Selected Papers from "The 6th China Conference of Wireless Sensor Networks". INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 第 3 作者9: https://doaj.org/article/fa832fa3372940518646454436502e11.
[235] Weijun Qin, Jiadi Zhang, Bo Li, Limin Sun. Discovering Human Presence Activities with Smartphones Using Nonintrusive Wi-Fi Sniffer Sensors: The Big Data Prospective. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 第 4 作者9: https://doaj.org/article/ae665d8df86749ca9c4d28e40ded8724.
[236] Zhi Li, Limin Sun, Xinyun Zhou. Amortized Fairness for Drive-Thru Internet. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 第 2 作者 通讯作者 9: https://doaj.org/article/b770bcc6afad4346aa3274506317a5be.
[237] 孙利民, 刘伟. 对大规模传感器网络应用面临问题的思考. 中兴通讯技术[J]. 2012, 第 1 作者18(2): 10-14, http://lib.cqvip.com/Qikan/Article/Detail?id=41345877.
[238] 周新运, 李志, 李立群, 孙利民. 一种移动容迟网络体系结构及其应用. 计算机研究与发展[J]. 2012, 第 4 作者49(3): 518-528, http://lib.cqvip.com/Qikan/Article/Detail?id=41043886.
[239] 蒋文涛, 孙利民, 吕俊伟, 朱红松. 传感器网络中基于局部信号重建的目标计数算法. 通信学报[J]. 2012, 第 2 作者33(9): 44-52, http://lib.cqvip.com/Qikan/Article/Detail?id=43269893.
[240] 周新运, 李志, 李立群, 孙利民. 一种移动容迟网络体系结构及其应用. 计算机研究与发展[J]. 2012, 第 4 作者49(3): 518-528, http://lib.cqvip.com/Qikan/Article/Detail?id=41043886.
[241] 蒋文涛, 孙利民, 吕俊伟, 朱红松. 传感器网络中基于局部信号重建的目标计数算法. 通信学报[J]. 2012, 第 2 作者33(9): 44-52, http://lib.cqvip.com/Qikan/Article/Detail?id=43269893.
[242] Limin Sun. Exploiting Ephemeral Link Correlation for Mobile Wireless Networks. 2012, 第 1 作者 通讯作者
[243] Li, Liqun, Xing, Guoliang, Han, Qi, Sun, Limin. ASM: Adaptive Voice Stream Multicast over Low-Power Wireless Networks. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2012, 第 4 作者23(4): 626-633, https://www.webofscience.com/wos/woscc/full-record/WOS:000300981100007.
[244] Chen Yongle, Sun Limin, Wang Feng, Zhou Xinyun. Congestion-aware indoor emergency navigation algorithm for wireless sensor networks. GLOBECOM - IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE. 2011, 第 2 作者http://ir.iscas.ac.cn/handle/311060/16297.
[245] Xiong Yongping, He Wenbo, Chen Canfeng, Ma Jian, Sun Limin. Phoenix: peer-to-peer location based notification in mobile networks. PROCEEDINGS - 8TH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, MASS 2011. 2011, 第 5 作者691-696, http://ir.iscas.ac.cn/handle/311060/16247.
[246] Li Liqun, Xing Guoliang, Sun Limin, Huangfu Wei, Zhou Ruogu, Zhu Hongsong. Exploiting fm radio data system for adaptive clock calibration in sensor networks. MOBISYS'11 - COMPILATION PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS AND SERVICES AND CO-LOCATED WORKSHOPS. 2011, 第 3 作者169-181, http://124.16.136.157/handle/311060/14309.
[247] Ma Li, Liu Jiangchuan, Sun Limin, Karimi Ouldooz Baghban. The trajectory exposure problem in location-aware mobile networking. PROCEEDINGS - 8TH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, MASS 2011. 2011, 第 3 作者7-12, http://ir.iscas.ac.cn/handle/311060/16270.
[248] Xing, Guoliang, Wang, Jianping, Yuan, Zhaohui, Tan, Rui, Sun, Limin, Huang, Qingfeng, Jia, Xiaohua, So, Hing Cheung. Mobile Scheduling for Spatiotemporal Detection in Wireless Sensor Networks. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2010, 第 5 作者21(12): 1851-1866, https://www.webofscience.com/wos/woscc/full-record/WOS:000283559800011.
[249] Zhou, Ruogu, Xiong, Yongping, Xing, Guoliang, Sun, Limin, Ma, Jian, ACM. ZiFi: Wireless LAN Discovery via ZigBee Interference Signatures. MOBICOM 10 & MOBIHOC 10: PROCEEDINGS OF THE 16TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING AND THE 11TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING. 2010, 第 4 作者49-60, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000332847500005.
[250] Li Liqun, 孙利民. Seer: trend-prediction-based geographic message forwarding in sparse vehicular networks. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS. 2010, 第 2 作者http://124.16.136.157/handle/311060/8896.
[251] 熊永平, 孙利民, 牛建伟, 刘燕. 机会网络. 软件学报[J]. 2009, 第 2 作者124-137, http://lib.cqvip.com/Qikan/Article/Detail?id=29337262.
[252] Li Liqun, Xing Guoliang, Sun Limin, Liu Yan. QVS: Quality-aware Voice Streaming for Wireless Sensor Networks. 2009 29TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS. 2009, 第 3 作者450-+,
[253] Huangfu Wei, Duan Bin, Sun Limin, Chen Canfeng, Ma Jian. Thta: triangle-shaped hierarchy aggregation time allocation algorithm for wireless sensor network. IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC. 2008, 第 3 作者2397-2402, http://124.16.136.157/handle/311060/10498.
[254] Bi, Yanzhong, Li, Na, Sun, Limin. DAR: An energy-balanced data-gathering scheme for wireless sensor networks. COMPUTER COMMUNICATIONS[J]. 2007, 第 3 作者 通讯作者 30(14-15): 2812-2825, http://dx.doi.org/10.1016/j.comcom.2007.05.021.
[255] Kai Yang, Xiaodong Lin, Limin Sun. CShield: Enabling code privacy for Cyber-Pysical systems. FUTURE GENERATION COMPUTER SYSTEMS. 第 3 作者http://dx.doi.org/10.1016/j.future.2021.06.051.
[256] Yan Hu, Hong Li, Tom H Luan, An Yang, Limin Sun, Zhiliang Wang, Rui Wang. Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. FUTURE GENERATION COMPUTER SYSTEMS. 第 5 作者http://dx.doi.org/10.1016/j.future.2018.07.027.
发表著作
(1) 移动IP, Mobile IP Technology, 电子工业出版社, 2003-07, 第 1 作者
(2) 无线传感器网络, Wireless Sensor Networks, 清华大学, 2005-05, 第 1 作者
(3) VANET车载网技术与应用, Vehicular Applications and Inter-Networking Technologies, 清华大学出版社, 2013-03, 第 1 作者
(4) 无线传感器网络基础-理论和实践, Fundamentals of Wireless Sensor Networks, 清华大学, 2014-01, 第 1 作者
(5) 美国关键基础设施安全防护体系与策略, 清华大学出版社, 2017-12, 第 1 作者
(6) 无线传感器网络: 理论及应用, Wireless Sensor Networks Theory and Applications, 清华大学出版社, 2018-08, 第 1 作者
(7) 车联网技术, 清华大学出版社, 2021-05, 第 1 作者
(8) 物理域安全优先的工业控制系统主动防御, 科学出版社, 2024-04, 第 1 作者
(2) 无线传感器网络, Wireless Sensor Networks, 清华大学, 2005-05, 第 1 作者
(3) VANET车载网技术与应用, Vehicular Applications and Inter-Networking Technologies, 清华大学出版社, 2013-03, 第 1 作者
(4) 无线传感器网络基础-理论和实践, Fundamentals of Wireless Sensor Networks, 清华大学, 2014-01, 第 1 作者
(5) 美国关键基础设施安全防护体系与策略, 清华大学出版社, 2017-12, 第 1 作者
(6) 无线传感器网络: 理论及应用, Wireless Sensor Networks Theory and Applications, 清华大学出版社, 2018-08, 第 1 作者
(7) 车联网技术, 清华大学出版社, 2021-05, 第 1 作者
(8) 物理域安全优先的工业控制系统主动防御, 科学出版社, 2024-04, 第 1 作者
科研活动
科研项目
( 1 ) 工业互联网企业数据勒索攻击智能识别与风险响应系统项目, 负责人, 国家任务, 2023-08--2025-07
( 2 ) 固件安全性分析技术, 负责人, 国家任务, 2022-11--2025-11
( 3 ) 面向工业互联网可证明安全的身份认证技术研究, 负责人, 地方任务, 2022-01--2023-12
( 4 ) 安全防护技术研究, 负责人, 国家任务, 2021-01--2023-12
( 5 ) 关键基础设施信息安全研究现状、趋势调研及发展建议, 负责人, 国家任务, 2019-01--2019-12
( 6 ) 工控系统主动防御技术研究, 负责人, 中国科学院计划, 2018-07--2023-06
( 7 ) 智能电网信息安全纵深防护关键技术, 负责人, 国家任务, 2018-01--2021-12
( 8 ) 面向电力工控系统的攻击仿真验证技术研究, 负责人, 境内委托项目, 2017-01--2018-12
( 9 ) 脆弱性分析与威胁态势感知技术和验证, 负责人, 国家任务, 2016-07--2019-09
( 10 ) 物联网位置隐私保护的关键技术研究, 负责人, 国家任务, 2015-01--2018-12
( 11 ) 城市公共安全创新应用研究与示范, 负责人, 中国科学院计划, 2012-01--2016-12
( 12 ) 移动容迟网络理论与关键技术研究, 负责人, 国家任务, 2011-01--2014-12
( 13 ) 物联网的基础理论与实践研究-物联网的异构融合和自治机理研究, 负责人, 国家任务, 2011-01--2013-12
( 2 ) 固件安全性分析技术, 负责人, 国家任务, 2022-11--2025-11
( 3 ) 面向工业互联网可证明安全的身份认证技术研究, 负责人, 地方任务, 2022-01--2023-12
( 4 ) 安全防护技术研究, 负责人, 国家任务, 2021-01--2023-12
( 5 ) 关键基础设施信息安全研究现状、趋势调研及发展建议, 负责人, 国家任务, 2019-01--2019-12
( 6 ) 工控系统主动防御技术研究, 负责人, 中国科学院计划, 2018-07--2023-06
( 7 ) 智能电网信息安全纵深防护关键技术, 负责人, 国家任务, 2018-01--2021-12
( 8 ) 面向电力工控系统的攻击仿真验证技术研究, 负责人, 境内委托项目, 2017-01--2018-12
( 9 ) 脆弱性分析与威胁态势感知技术和验证, 负责人, 国家任务, 2016-07--2019-09
( 10 ) 物联网位置隐私保护的关键技术研究, 负责人, 国家任务, 2015-01--2018-12
( 11 ) 城市公共安全创新应用研究与示范, 负责人, 中国科学院计划, 2012-01--2016-12
( 12 ) 移动容迟网络理论与关键技术研究, 负责人, 国家任务, 2011-01--2014-12
( 13 ) 物联网的基础理论与实践研究-物联网的异构融合和自治机理研究, 负责人, 国家任务, 2011-01--2013-12