发表论文
[1] Kai Yang, Qiang Li, Haining Wang, Limin Sun, Jiqiang Liu. Fingerprinting Industrial IoT devices based on multi-branch neural network. EXPERT SYSTEMS WITH APPLICATIONS[J]. 2024, 238: http://dx.doi.org/10.1016/j.eswa.2023.122371.[2] 郑春阳, 王进法, 司帅宗, 张卫东, 孙利民. ChainDet: A Traffic-Based Detection Method of Microservice Chains. IEEE International Performance Computing and Communications Conferencenull. 2023, [3] Yan, Senming, Ren, Jing, Wang, Wei, Sun, Limin, Zhang, Wei, Yu, Quan. A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS[J]. 2023, 25(1): 467-496, http://dx.doi.org/10.1109/COMST.2022.3225137.[4] 刘培培, 李红, 王志宇, 任一墨, 刘洁, 吕飞, 朱红松, 孙利民. CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises. International Joint Conference on Neural Networksnull. 2023, https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10191251.[5] 陈晓惠, 崔磊, 文辉, 李志, 朱红松, 郝志宇, 孙利民. MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors. Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)null. 2023, [6] 宾浩宇, 赵森, 李志, 于楠, 席荣荣, 朱红松, 孙利民. UID-Auto-Gen: Extracting Device Fingerprinting from Network Traffic. IEEE International Performance Computing and Communications Conferencenull. 2023, [7] Yimo Ren, Hong Li, Peipei Liu, Jie Liu, Hongsong Zhu, Limin Sun. Owner name entity recognition in websites based on multiscale features and multimodal co-attention. EXPERT SYSTEMS WITH APPLICATIONS. 2023, 224: http://dx.doi.org/10.1016/j.eswa.2023.120014.[8] Chuan Qin, Jiaqian Peng, Puzhuo Liu, Yaowen Zheng, Kai Cheng, Weidong Zhang, Limin Sun. UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router. COMPUTERS & SECURITY. 2023, 128: http://dx.doi.org/10.1016/j.cose.2023.103157.[9] 闫兆腾, 李志, 李红, 杨寿国, 朱红松, 孙利民. Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2023, 20(5): 3890-3909, https://ieeexplore.ieee.org/document/9954619.[10] 任一墨, 王进法, 李红, 朱红松, 孙利民. DeviceGPT: A Generative Pre-Training Transformer on the Heterogenous Graph for Internet of Things. International Conference on Research on Development in Information Retrievalnull. 2023, https://dl.acm.org/doi/pdf/10.1145/3539618.3591972.[11] 王高升, 刘培培, 黄晋涛, 司帅宗, 朱红松, 孙利民. CSEDesc: CyberSecurity Event Detection with Event Description. International Conference on Artificial Neural Networksnull. 2023, https://link.springer.com/chapter/10.1007/978-3-031-44213-1_3.[12] 李思源, 文辉, 邓立廷, 周宇, 张文源, 李志, 孙利民. Denoising Network of Dynamic Features for Enhanced Malware Classification. IEEE International Performance Computing and Communications Conferencenull. 2023, [13] Ren, Yimo, Li, Hong, Liu, Peipei, Liu, Jie, Zhu, Hongsong, Sun, Limin. CL-GAN: A GAN-based continual learning model for generating and detecting AGDs. COMPUTERS & SECURITY[J]. 2023, 131: http://dx.doi.org/10.1016/j.cose.2023.103317.[14] 任一墨, 李志, 李红, 刘培培, 刘洁, 朱红松, 孙利民. ip2text A Reasoning-Aware Dataset for Text Generation of Devices on the Internet. Database Systems for Advanced Applicationsnull. 2023, https://link.springer.com/chapter/10.1007/978-3-031-35415-1_2.[15] Kai Cheng, Yaowen Zheng, Tao Liu, Guan Le, Peng Liu, Hong Li, Hongsong Zhu, Kejiang Ye, Limin Sun. Detecting Vulnerabilities in Linux-based Embedded Firmware with SSE-based On-demand Alias Analysis. ISSTA'23null. 2023, [16] 杨寿国, 董超鹏, 肖扬, 程怡然, 石志强, 李志, 孙利民. Asteria-Pro: Enhancing Deep-Learning Based Binary Code Similarity Detection by Incorporating Domain Knowledge. ACM Transactions on Software Engineering and Methodology[J]. 2023, [17] 孙怡亭, 郭越, 李长进, 张红军, 刘康, 刘俊矫, 孙利民. 可编程逻辑控制器的控制逻辑注入攻击入侵检测方法. 计算机应用. 2023, 43(6): 1861-1869, http://lib.cqvip.com/Qikan/Article/Detail?id=7109941717.[18] Ren, Yimo, Li, Hong, Liu, Peipei, Liu, Jie, Li, Zhi, Zhu, Hongsong, Sun, Limin. Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer. KNOWLEDGE AND INFORMATION SYSTEMS. 2023, http://dx.doi.org/10.1007/s10115-023-01908-4.[19] 杨寿国, Zhengzi Xu, 肖扬, Zhe Lang, 唐伟, Yang Liu, 石志强, 李红, 孙利民. Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis. ACM Transactions on Software Engineering and Methodology (TOSEM)[J]. 2023, [20] Ren, Yimo, Li, Hong, Liu, Peipei, Liu, Jie, Zhu, Hongsong, Sun, Limin. Multiview Embedding with Partial Labels to Recognize Users of Devices Based on Unified Transformer. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS[J]. 2023, 2023: http://dx.doi.org/10.1155/2023/3138551.[21] Chen, Yanru, Yin, Fengming, Hu, Shunfang, Sun, Limin, Li, Yang, Xing, Bin, Chen, Liangyin, Guo, Bing. ECC-Based Authenticated Key Agreement Protocol for Industrial Control System. IEEE INTERNET OF THINGS JOURNAL[J]. 2023, 10(6): 4688-4697, http://dx.doi.org/10.1109/JIOT.2022.3219233.[22] 孙越, 李志, 吕世超, 孙利民. Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2023, https://ieeexplore.ieee.org/abstract/document/9978697/metrics#metrics.[23] Cheng, Yiran, Yang, Shouguo, Lang, Zhe, Shi, Zhiqiang, Sun, Limin. VERI: A Large-scale Open-Source Components Vulnerability Detection in IoT Firmware. COMPUTERS & SECURITY[J]. 2023, 126: http://dx.doi.org/10.1016/j.cose.2022.103068.[24] 邓立廷, 文辉, 辛明峰, 李红, 潘志文, 孙利民. ENIMANAL: Augmented Cross-Architecture IoT Malware Analysis using Graph Neural Networks. Computers & Security[J]. 2023, [25] 刘培培, 李红, 刘洁, 朱红松, 孙利民. Improving the Modality Representation with Multi-View Contrastive Learning for Multimodal Sentiment Analysis. Proceedings of the International Conference on Acoustics, Speech and Signal Processing(ICASSP 2023).null. 2023, [26] 任一墨, 王进法, 李红, 朱红松, 孙利民. User Recognition of Devices on the Internet based on Heterogeneous Graph Transformer with Partial Label. International Joint Conference on Neural Networksnull. 2023, https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10192043.[27] Ke Li, Zhi Li, Zhimin Gu, Ziying Wang, Limin Sun. Compromised IoT Devices Detection in Smart Home via Semantic Information. IEEE International Conference on Communications(ICC)null. 2022, [28] Mengjie Sun, limin sun, Ke Li, Yaowen Zheng, Weidong Zhang, Hong Li, Limin Sun. Inferring Device Interactions for Attack Path Discovery in Smart Home IoT. International Conference on Wireless Algorithms, Systems, and Applications(WASA)null. 2022, [29] Yang, Kai, Haining Wang, Limin Sun. An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks. COMPUTERS IN INDUSTRY[J]. 2022, 138: http://dx.doi.org/10.1016/j.compind.2022.103613.[30] Liu, Puzhuo, Zheng, Yaowen, Song, Zhanwei, Fang, Dongliang, Lv, Shichao, Sun, Limin. Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control. JOURNAL OF SYSTEMS ARCHITECTURE[J]. 2022, 127: http://dx.doi.org/10.1016/j.sysarc.2022.102483.[31] 方栋梁, 刘圃卓, 秦川, 宋站威, 孙玉砚, 石志强, 孙利民. 工业控制系统协议安全综述. 计算机研究与发展[J]. 2022, 59(5): 978-993, http://lib.cqvip.com/Qikan/Article/Detail?id=7107098515.[32] Yimo Ren, Hong Li, Ruinian Li, Hongsong Zhu, Limin Sun. Understanding User-Level IP Blocks on the Internet. SECURITY AND COMMUNICATION NETWORKS[J]. 2022, https://doaj.org/article/c8c42716667d4f8da07ab482a5a4c977.[33] 周明, 吕世超, 游建舟, 朱红松, 石志强, 孙利民. 工业控制系统安全态势感知技术研究. 信息安全学报[J]. 2022, 7(2): 101-119, http://lib.cqvip.com/Qikan/Article/Detail?id=7106868449.[34] Zhihui Zhao, , Yicheng Zeng, Jinfa Wang, Hong Li, Hongsong Zhu, Limin Sun. Detection and Incentive: An tampering detection mechanism for object detection in edge computing. IEEE International Symposium on Reliable Distributed Systems(SRDS 2022)null. 2022, [35] Puzhuo Liu, Dongliang Fang, Chuan Qin, Kai Cheng, Shichao Lv,, Hongsong Zhu, Limin Sun. Finding Vulnerabilities in Internal-binary of Firmware with Clues. ICC 2022null. 2022, [36] Shijie Li, Junjiao Liu, Zhiwen Pan, Shichao Lv,, Shuaizong Si, Limin Sun. Anomaly Detection based on Robust Spatial-temporal Modeling for Industrial Control Systems. IEEE International Conference on Mobile Ad-Hoc and Sensor Systems(MASS)null. 2022, [37] Yicheng Zeng, Jiaqian Peng, Zhihui Zhao, Zhanwei Song, Hongsong Zhu, Limin Sun. SIFOL: Solving Implicit Flows in Loops for Concolic Execution. IEEE International Performance Computing and Communications Conference(IPCCC 2022)null. 2022, [38] Jiapeng Zhao, Zhongjin Liu, Xiaoling Zhang, Jintao Huang, Zhiqiang Shi, Shichao Lv, Hong Li, Limin Sun. Gradient-based Adversarial Attacks against Malware Detection by Instruction Replacement. 17th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2022)null. 2022, [39] Jingfei Bian, Nan Yu, Hong Li, Hongsong Zhu, Qiang Wang, Limin Sun. An Evolutionary Learning Approach towards the Open Challenge of IoT Device Identification. International Conference on Security and Privacy in Communication Networks(SecureComm 2022)null. 2022, [40] 孙越, 吕世超, 游建舟, 孙玉砚, 陈新, 郑尧文, 孙利民. IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol. ACNS 2022: Applied Cryptography and Network Securitynull. 2022, doi.org/10.1007/978-3-031-09234-3_1.[41] Jie Liu, Jinfa Wang, Peipei Liu, Hongsong Zhu, Limin Sun. Discover the ICS Landmarks based on multi-stage clue mining. International Conference on Wireless Algorithms, Systems, and Applications(WASA 2022)null. 2022, [42] Sen Zhao, Jinfa Wang, yang shouguo, Yicheng Zeng, Zhihui Zhao, Hongsong Zhu, Limin Sun. ProsegDL: Binary Protocol Format Extraction by Deep Learning-based Field Boundary Identification. 30th IEEE International Conference on Network Protocols(ICNP 2022)null. 2022, [43] Yimo Ren, Hong Li, Min Xu, Gang Xiong, ,Shuqin Zhang, Hongsong Zhu, Limin Sun. Joint Classification of IoT Devices and Relations In the Internet with Network Traffic. IEEE Wireless Communications and Networking Conference(WCNC2022)null. 2022, [44] Yaowen Zheng, Yuekang Li, Cen Zhang, Hongsong Zhu, Yang Liu, Limin Sun. Efficient Greybox Fuzzing of Applications in Linux-based IoT Devices via Enhanced User-mode Emulation. 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2022)null. 2022, [45] Xiaoling Zhang, Shouguo Yang, Luqian Duan, Zhe Lang, Zhiqiang Shi, Limin Sun. Transformer XL With Graph Neural Network for Source Code Summarization. IEEE International Conference on Systems, Man, and Cybernetics[J]. 2021, [46] 杨锴, 张悦阳, 林晓东, 李志, 孙利民. Characterizing Heterogeneous Internet of Things Devices at Internet Scale Using Semantic Extraction. IEEE INTERNET OF THINGS JOURNAL[J]. 2021, https://ieeexplore.ieee.org/document/9530590.[47] Li, Qiang, Wang, Zhihao, Tan, Dawei, Song, Jinke, Wang, Haining, Sun, Limin, Liu, Jiqiang. GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks. IEEE-ACM TRANSACTIONS ON NETWORKING[J]. 2021, 29(4): 1798-1812, http://dx.doi.org/10.1109/TNET.2021.3073926.[48] Junjiao Liu, Xiaodong Lin, Xin Chen, Hui Wen, Hong Li, Yan Hu, Jiawei Sun, Zhiqiang Shi, Limin Sun. SHADOWPLCS: A Novel Scheme for Remote Detection of Industrial Process Control Attacks. IEEE Transactions on Dependable and Secure Computing[J]. 2021, 19(3): 2054-2069, [49] Zhou, Wei, Cao, Chen, Huo, Dongdong, Cheng, Kai, Zhang, Lan, Guan, Le, Liu, Tao, Jia, Yan, Zheng, Yaowen, Zhang, Yuqing, Sun, Limin, Wang, Yazhe, Liu, Peng. Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems. IEEE INTERNET OF THINGS JOURNAL[J]. 2021, 8(14): 11621-11639, http://dx.doi.org/10.1109/JIOT.2021.3059457.[50] Wang, Zuoguang, Zhu, Hongsong, Liu, Peipei, Sun, Limin. Social Engineering in Cybersecurity: A Domain Ontology and Knowledge Graph Application Examples. CYBERSECURITY[J]. 2021, 4(1): 1-21, http://arxiv.org/abs/2106.01157.[51] Shuangpeng Bai, Hui Wen, Dongliang Fang, Yue Sun, Puzhuo liu, Limin Sun. DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing. Proceedings of the 19th International Conference on Applied Cryptography and Network Security[J]. 2021, [52] Kai Cheng, Dongliang Fang, Chuan Qin, Huizhao Wang, Yaowen Zheng, Nan Yu, Limin Sun. Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware. ICT systems security and privacy protection :null. 2021, 83-99, [53] Li, Jitong, Wang, Chao, Seo, Daehee, Cheng, Xiaoman, He, Yunhua, Sun, Limin, Xiao, Ke. Deep Learning-Based Service Scheduling Mechanism for GreenRSUs in the IoVs. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2021, 2021: https://doaj.org/article/6daa528180744d84bd5d66961f8e9dcc.[54] 游建舟, 吕世超, 孙越, 文辉, 孙利民. HoneyVP: A Cost-Effective Hybrid Honeypot Architecture for Industrial Control Systems. IEEE International Conference on Communications (ICC 2021)null. 2021, https://ieeexplore.ieee.org/document/9500567.[55] 孙利民, 潘志文, 吕世超, 石志强, 朱红松. 智能制造场景下工业互联网安全风险与对策. 信息通信技术与政策[J]. 2021, 24-29, http://lib.cqvip.com/Qikan/Article/Detail?id=7105457933.[56] 王作广, 朱红松, 孙利民. 社工概念演化分析. 信息安全学报[J]. 2021, 6(2): 12-29, http://lib.cqvip.com/Qikan/Article/Detail?id=7104256771.[57] Zhe Lang, Shouguo Yang, Yiran Cheng, Xiaoling Zhang, Zhiqiang Shi, Limin Sun. PMatch: Semantic-based Patch Detection for Binary Programs. IEEE International Performance Computing and Communications Conference[J]. 2021, [58] Xiao Hu, Hong Li, Zhiqiang Shi, Nan Yu, Hongsong Zhu, Limin Sun. A Robust IoT Device Identification Method with Unknown Traffic Detection. Proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications(WASA 2021)[J]. 2021, [59] 闫兆腾, 李志, 白稳平, 朱红松, 孙利民. Detecting Internet-scale Surveillance Devices using RTSP Recessive Features. International Conference on Science of Cyber Securitynull. 2021, https://link.springer.com/chapter/10.1007/978-3-030-89137-4_2.[60] Bowen Yu, Yucheng Wang, Tingwen Liu, Hongsong Zhu, Limin Sun, Bin Wang. Maximal Clique Based Non-Autoregressive Open Information Extraction. EMNLPnull. 2021, [61] Dongliang Fang, Zhanwei Song, Yue Guan, Puzhuo Liu, Anni Peng, Kai Cheng, Yaowen Zheng, Peng Liu, Hongsong Zhu, Limin Sun*. ICS3Fuzzer: A Fuzzing Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software. Proceedings of the Annual Computer Security Applications Conference[J]. 2021, [62] 何云华, 黄伟, 王伟忠, 张翠, 李红, 孙利民. 基于区块链的分布式激励架构研究. 工程科学与技术[J]. 2021, 53(1): 178-187, http://lib.cqvip.com/Qikan/Article/Detail?id=7103756524.[63] He, Yunhua, Shen, Jialong, Xiao, Ke, Sood, Keshav, Wang, Chao, Sun, Limin, IEEE. A Sparse Protocol Parsing Method for IIoT Protocols Based on HMM hybrid model. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2020, [64] Limin Sun. Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks. Proceedings of the the Web Conference (WWW)). 2020, [65] You, Jianzhou, Lv, Shichao, Zhao, Lian, Niu, Mengyao, Shi, Zhiqiang, Sun, Limin, IEEE. A Scalable High-interaction Physical Honeypot Framework for Programmable Logic Controller. 2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL)null. 2020, [66] Yucheng Wang, Bowen Yu, Yueyang Zhang, Tingwen Liu,, Hongsong Zhu, Limin Sun. TPLinker: Single-stage Joint Extraction of Entities and Relations Through Token Pair Linking. COLINGnull. 2020, http://arxiv.org/abs/2010.13415.[67] Yang, Kai, Li, Qiang, Lin, Xiaodong, Chen, Xin, Sun, Limin. iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS[J]. 2020, 38(5): 955-967, http://dx.doi.org/10.1109/JSAC.2020.2980921.[68] 游建舟, 吕世超, 孙玉砚, 石志强, 孙利民. 物联网蜜罐综述. 信息安全学报[J]. 2020, 5(4): 138-156, http://lib.cqvip.com/Qikan/Article/Detail?id=7102488259.[69] Hu, Yan, Li, Hong, Luan, Tom H, Yang, An, Sun, Limin, Wang, Zhiliang, Wang, Rui. Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE[J]. 2020, 108: 1230-1240, http://dx.doi.org/10.1016/j.future.2018.07.027.[70] Limin Sun. Malware Classification using Attention-based Transductive Learning Network. Proceedings of the International Conference on Security and Privacy in Communication Networks (SecureComm 2020). 2020, [71] You, Jianzhou, Lv, Shichao, Hao, Yichen, Feng, Xuan, Zhou, Ming, Sun, Limin, Zhou, J, Luo, X, Shen, Q, Xu, Z. Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019)null. 2020, 11999: 71-88, [72] Liting deng, Hui Wen, Yue Sun, MingFeng Xin, Limin Sun, Hongsong Zhu. Attention Based Transductive Network for Malware Classification. 16th EAI International Conference on Security and Privacy in Communication Networksnull. 2020, [73] 陈千, 程凯, 郑尧文, 朱红松, 孙利民. 函数级数据依赖图及其在静态脆弱性分析中的应用. 软件学报[J]. 2020, 31(11): 3421-3435, http://lib.cqvip.com/Qikan/Article/Detail?id=7103363893.[74] 赵国新, 丁若凡, 游建舟, 吕世超, 彭锋, 李菲, 孙利民. 基于工控业务仿真的高交互可编程逻辑控制器蜜罐系统设计实现. 计算机应用[J]. 2020, 40(9): 2650-2656, http://lib.cqvip.com/Qikan/Article/Detail?id=7102860244.[75] Zhou, Zan, Kuang, Xiaohui, Sun, Limin, Zhong, Lujie, Xu, Changqiao. Endogenous Security Defense against Deductive Attack: When Artificial Intelligence Meets Active Defense for Online Service. IEEE COMMUNICATIONS MAGAZINE[J]. 2020, 58(6): 58-64, http://dx.doi.org/10.1109/MCOM.001.1900367.[76] 闫兆腾, 于楠, 文辉, 李志, 朱红松, 孙利民. Detecting Internet-Scale NATs for Devices Based on Tri-Net IoT. Wireless Algorithms, Systems, and Applications[J]. 2020, https://link.springer.com/chapter/10.1007/978-3-030-59016-1_50.[77] Yan Hu, Hong Li, Hong Yang, Yuyan Sun, Limin Sun, Zhiliang Wang. Detecting stealthy attacks against industrial control systems based on residual skewness analysis. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING[J]. 2019, 1-14, https://doaj.org/article/2ae3f76953494545bfe90dfa314735ae.[78] 孙利民. 工业互联网安全首要任务是建立安全检查和风险识别能力. 中国战略新兴产业[J]. 2019, 94-96, http://lib.cqvip.com/Qikan/Article/Detail?id=7003117691.[79] Li Ke, You Jianzhou, Wen Hui, Li Hong, Sun Limin, Arai K, Bhatia R, Kapoor S. Collaborative Intelligence Analysis for Industrial Control Systems Threat Profiling. PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2null. 2019, 881: 94-106, [80] 王志豪, 张卫东, 文辉, 朱红松, 尹丽波, 孙利民. IP定位技术研究. 信息安全学报[J]. 2019, 4(3): 34-47, http://lib.cqvip.com/Qikan/Article/Detail?id=7002369083.[81] Yang, Kai, Li, Qiang, Sun, Limin. Towards automatic fingerprinting of IoT devices in the cyberspace. COMPUTER NETWORKS[J]. 2019, 148: 318-327, http://dx.doi.org/10.1016/j.comnet.2018.11.013.[82] Wang, Yucheng, Wang, Xu, Zhu, Hongsong, Zhao, Hai, Li, Hong, Sun, Limin, Biagioni, ES, Zheng, Y, Cheng, S. ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2019null. 2019, 11604: 346-357, [83] 刘烃, 田决, 王稼舟, 吴宏宇, 孙利民, 周亚东, 沈超, 管晓宏. 信息物理融合系统综合安全威胁与防御研究. 自动化学报[J]. 2019, 45(1): 5-24, http://lib.cqvip.com/Qikan/Article/Detail?id=7001387698.[84] 何云华, 李梦茹, 李红, 孙利民, 肖珂, 杨超. 群智感知应用中基于区块链的激励机制. 计算机研究与发展[J]. 2019, 56(3): 544-554, http://lib.cqvip.com/Qikan/Article/Detail?id=7001418111.[85] Zheng Yaowen, Davanian Ali, Yin Heng, Song Chengyu, Zhu Hongsong, Su Limin, USENIX Assoc. FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUMnull. 2019, 1099-1114, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000509775000063.[86] Zhou, Ming, Lv, Shichao, Yin, Libo, Chen, Xin, Li, Hong, Sun, Limin, IEEE. SCTM: A Multi-view Detecting Approach Against Industrial Control Systems Attacks. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2019, [87] Wang Xu, Wang Yucheng, Feng Xuan, Zhu Hongsong, Sun Limin, Zou Yuchi, IEEE. IoTTracker: An Enhanced Engine for Discovering Internet-of-Thing Devices. 2019 IEEE 20TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM)null. 2019, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000494803500042.[88] Feng Xuan, Liao Xiaojing, Wang XiaoFeng, Wang Haining, Li Qiang, Yang Kai, Zhu Hongsong, Sun Limin, USENIX Assoc. Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUMnull. 2019, 887-903, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000509775000051.[89] Li, Ruinian, Song, Tianyi, Mei, Bo, Li, Hong, Cheng, Xiuzhen, Sun, Limin. Blockchain for Large-Scale Internet of Things Data Storage and Protection. IEEE TRANSACTIONS ON SERVICES COMPUTING[J]. 2019, 12(5): 762-771, https://www.webofscience.com/wos/woscc/full-record/WOS:000492430500009.[90] Mi, Xianghang, Feng, Xuan, Liao, Xiaojing, Liu, Baojun, Wang, XiaoFeng, Qian, Feng, Li, Zhou, Alrwais, Sumayah, Sun, Limin, Liu, Ying, IEEE. Resident Evil: Understanding Residential IP Proxy as a Dark Service. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019)null. 2019, 1185-1201, [91] Yang, Shouguo, Shi, Zhiqiang, Zhang, Guodong, Li, Mingxuan, Ma, Yuan, Sun, Limin, IEEE. Understand Code Style: Efficient CNN-based Compiler Optimization Recognition System. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2019, [92] 肖珂, 戴舜, 何云华, 孙利民. 基于城市监控的自然场景图像的中文文本提取方法. 计算机研究与发展[J]. 2019, 56(7): 1525-1533, http://lib.cqvip.com/Qikan/Article/Detail?id=7002364320.[93] Li, Ke, Li, Hong, Zhu, Hongsong, Sun, Limin, Wen, Hui, IEEE. Side-Channel Information Leakage of Traffic Data in Instant Messaging. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2019, [94] Sun Yuyan, Sun Limin, Shi Zhiqiang, Yu Wenhao, Ying Huan, Urien P, Piramuthu S. Vulnerability Finding and Firmware Association in Power Grid. PROCEEDINGS OF THE 2019 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)null. 2019, [95] Zheng, Yaowen, Song, Zhanwei, Sun, Yuyan, Cheng, Kai, Zhu, Hongsong, Sun, Limin, IEEE. An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2019, [96] Wen, Hui, Zhang, Weidong, Hu, Yan, Hu, Qing, Zhu, Hongsong, Sun, Limin, Biagioni, ES, Zheng, Y, Cheng, S. Lightweight IoT Malware Visualization Analysis via Two-Bits Networks. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2019null. 2019, 11604: 613-621, [97] 游建舟, 张悦阳, 吕世超, 陈新, 尹丽波, 孙利民. 基于数据包分片的工控蜜罐识别方法. 信息安全学报[J]. 2019, 4(3): 83-92, http://lib.cqvip.com/Qikan/Article/Detail?id=7002369086.[98] 郑尧文, 文辉, 程凯, 宋站威, 朱红松, 孙利民. 物联网设备漏洞挖掘技术研究综述. 信息安全学报[J]. 2019, 4(5): 61-75, http://lib.cqvip.com/Qikan/Article/Detail?id=7100187215.[99] 徐顺超, 陈永乐, 李志, 孙利民. 物联网设备Web弱口令自动化探测. 计算机工程与设计[J]. 2019, 40(1): 8-13, http://lib.cqvip.com/Qikan/Article/Detail?id=7001132765.[100] Yang An, Wang Xiaoshan, Sun Yuyan, Hu Yan, Shi Zhiqiang, Sun Limin, IEEE. Multi-dimensional Data Fusion Intrusion Detection for Stealthy Attacks on Industrial Control Systems. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)[J]. 2018, [101] Li Qiang, Feng Xuan, Wang Haining, Sun Limin, IEEE. Discovery of Internet of Thing Devices based on Rules. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS)null. 2018, [102] 杨安, 胡堰, 周亮, 郑为民, 石志强, 孙利民. 基于信息流和状态流融合的工控系统异常检测算法. 计算机研究与发展[J]. 2018, 55(11): 2532-2542, http://lib.cqvip.com/Qikan/Article/Detail?id=7000898773.[103] 李强, 贾煜璇, 宋金珂, 李红, 朱红松, 孙利民. 网络空间物联网信息搜索. 信息安全学报[J]. 2018, 3(5): 38-53, http://lib.cqvip.com/Qikan/Article/Detail?id=676689801.[104] Li, Qiang, Feng, Xuan, Wang, Haining, Li, Zhi, Sun, Limin, IEEE. Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018)null. 2018, 2537-2545, [105] Chen, Yu, Li, Hong, Ma, Yuan, Shi, Zhiqiang, Sun, Limin, Chellappan, S, Cheng, W, Li, W. Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File Retrieval. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2018)null. 2018, 10874: 53-65, [106] Limin Sun. Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices. USENIX Security '18. 2018, [107] Limin Sun. Mining Human Periodic Behaviors using Mobility Internation and Relative Entropy. Proceedings of the 22nd Pacific-Asia Conference on Knowledge Discovery and Date Mining(PAKDD 2018). 2018, [108] Li, Qiang, Feng, Xuan, Wang, Haining, Sun, Limin. Understanding the Usage of Industrial Control System Devices on the Internet. IEEE INTERNET OF THINGS JOURNAL[J]. 2018, 5(3): 2178-2189, http://dx.doi.org/10.1109/JIOT.2018.2826558.[109] 王迁, 杨明祥, 雷晓辉, 舒坚, 孙利民, 黄雪姝. 基于PSO-SVR的丹江口年径流预报. 南水北调与水利科技[J]. 2018, 16(3): 65-71, http://lib.cqvip.com/Qikan/Article/Detail?id=675818962.[110] 舒坚, 蒋善东, 孙利民. 表征机会传感网络连通性的方法. 北京邮电大学学报[J]. 2018, 41(1): 59-64, http://lib.cqvip.com/Qikan/Article/Detail?id=675222784.[111] Wang, Hongtao, Wang, Hongmei, Yi, Feng, Wen, Hui, Li, Gang, Sun, Limin. Context-aware personalized path inference from large-scale GPS snippets. EXPERT SYSTEMS WITH APPLICATIONS[J]. 2018, 91: 78-88, http://dx.doi.org/10.1016/j.eswa.2017.08.027.[112] Du, Suguo, Li, Xiaolong, Zhong, Jinli, Zhou, Lu, Xue, Minhui, Zhu, Haojin, Sun, Limin. Modeling Privacy Leakage Risks in Large-Scale Social Networks. IEEE ACCESS[J]. 2018, 6: 17653-17665, https://doaj.org/article/0fefefca21664f72a4852ca6b71cafff.[113] Hu, Yan, Yang, An, Li, Hong, Sun, Yuyan, Sun, Limin. A survey of intrusion detection on industrial control systems. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2018, 14(8): [114] Zhang Weidong, Chen Yu, Li Hong, Li Zhi, Sun Limin, IEEE. PANDORA: A Scalable and Efficient Scheme to Extract Version of Binaries in IoT Firmwares. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2018, [115] Liu Junjiao, Yin Libo, Hu Yan, Lv Shichao, Sun Limin, IEEE. A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition. 2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2018, [116] Liu Qi, Li Hong, Hu Yan, Sun Limin, IEEE. A Check-in System Leveraging Face Recognition. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGYnull. 2018, 412-418, http://dx.doi.org/10.1109/Cybermatics_2018.2018.00095.[117] Hu, Chunqiang, Yu, Jiguo, Cheng, Xiuzhen, Tian, Zhi, Akkaya, Kemal, Sun, Limin. CP_ABSC: AN ATTRIBUTE-BASED SIGNCRYPTION SCHEME TO SECURE MULTICAST COMMUNICATIONS IN SMART GRIDS. MATHEMATICAL FOUNDATIONS OF COMPUTING[J]. 2018, 1(1): 77-100, [118] Cheng, Kai, Li, Qiang, Wang, Lei, Chen, Qian, Zheng, Yaowen, Sun, Limin, Liang, Zhenkai, IEEE. DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware. 2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN)null. 2018, 430-441, [119] Yang An, Sun Limin, Shi Zhiqiang, Zheng Weimin, Sun Yuyan, Hu Yan, IEEE. SBSD: Detecting the Sequence Attack through Sensor Data in ICSs. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2018, [120] 陈昱, 刘中金, 赵威威, 马原, 石志强, 孙利民. 一种大规模的跨平台同源二进制文件检索方法. 计算机研究与发展[J]. 2018, 55(7): 1498-1507, http://lib.cqvip.com/Qikan/Article/Detail?id=676015048.[121] Jia, Yuxuan, Han, Bing, Li, Qiang, Li, Hong, Sun, Limin. Who owns Internet of Thing devices?. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2018, 14(11): [122] Zhang Weidong, Li Hong, Wen Hui, Zhu Hongsong, Sun Limin, IEEE. A graph neural network based efficient firmware information extraction method for IoT devices. 2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2018, [123] Li Qizhen, Gao Jie, Wen Jinming, Tang Xiaohu, Zhao Lian, Sun Limin, IEEE. SMDP-based Downlink Packet Scheduling Scheme for Solar Energy Assisted Heterogeneous Networks. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGYnull. 2018, 268-273, http://dx.doi.org/10.1109/Cybermatics_2018.2018.00074.[124] 张光华, 庞少博, 张玉清, 孙利民. 云环境下基于静态博弈的信任等级模型研究. 北京理工大学学报[J]. 2018, 38(1): 96-101, http://lib.cqvip.com/Qikan/Article/Detail?id=674636135.[125] Feng, Xuan, Li, Qiang, Wang, Haining, Sun, Limin, USENIX Assoc. Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices. PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUMnull. 2018, 327-341, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000485139900020.[126] He, Yunhua, Li, Hong, Cheng, Xiuzhen, Liu, Yan, Yang, Chao, Sun, Limin. A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications. IEEE ACCESS[J]. 2018, 6: 27324-27335, https://doaj.org/article/95bfd085d9b44e0b8cff8df1a490d768.[127] Wang, Hao, Chen, Liangyin, Liu, Shijia, Fu, Songtao, Luo, Qian, Yin, Feng, Sun, Limin, Li, Zhanghua. Trajectory-Based Hierarchical Adaptive Forwarding in Vehicular Ad Hoc Networks. JOURNAL OF SENSORS[J]. 2017, 2017: https://doaj.org/article/748d48fc27924491b131dda6409247eb.[128] Wang, Xiaoshan, Liu, Yao, Lu, Xiang, Lv, Shichao, Shi, Zhiqiang, Sun, Limin, IEEE. CovertMIMO: A Covert Uplink Transmission Scheme for MIMO Systems. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2017, [129] Xiao, Liang, Chen, Tianhua, Han, Guoan, Zhuang, Weihua, Sun, Limin. Game Theoretic Study on Channel-Based Authentication in MIMO Systems. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2017, 66(8): 7474-7484, https://www.webofscience.com/wos/woscc/full-record/WOS:000407686300068.[130] 张书钦, 李凯江, 郭倩倩, 孙利民, 石志强. 工业控制网络安全脆弱性分析技术研究. 中原工学院学报[J]. 2017, 28(6): 63-69, http://lib.cqvip.com/Qikan/Article/Detail?id=674230076.[131] Li, Qiang, Feng, Xuan, Wang, Haining, Sun, Limin, ACM. Automatically Discovering Surveillance Devices in the Cyberspace. PROCEEDINGS OF THE 8TH ACM MULTIMEDIA SYSTEMS CONFERENCE (MMSYS'17)null. 2017, 331-342, http://dx.doi.org/10.1145/3083187.3084020.[132] Zhang, Lin, Li, Hong, Sun, Limin, Shi, Zhiqiang, He, Yunhua, IEEE. POSTER: Towards Fully Distributed User Authentication with Blockchain. 2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC)null. 2017, 202-203, http://dx.doi.org/10.1109/PAC.2017.28.[133] Lv, Shichao, Xiao, Liang, Hu, Qing, Wang, Xiaoshan, Hu, Changzhen, Sun, Limin, IEEE. Anti-jamming Power Control Game in Unmanned Aerial Vehicle Networks. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCEnull. 2017, [134] Nan, Yuhong, Yang, Zhemin, Yang, Min, Zhou, Shunfan, Zhang, Yuan, Gu, Guofei, Wang, Xiaofeng, Sun, Limin. Identifying User-Input Privacy in Mobile Applications at a Large Scale. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2017, 12(3): 647-661, https://www.webofscience.com/wos/woscc/full-record/WOS:000394666300007.[135] Wang, Hongtao, Wen, Hui, Yi, Feng, Zhu, Hongsong, Sun, Limin. Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets. SENSORS[J]. 2017, 17(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000398818700123.[136] Lu, Xiang, Tu, Linlin, Zhou, Xinyun, Xiong, Naixue, Sun, Limin. ViMediaNet: an emulation system for interactive multimedia based telepresence services. JOURNAL OF SUPERCOMPUTING[J]. 2017, 73(8): 3562-3578, https://www.webofscience.com/wos/woscc/full-record/WOS:000406215500014.[137] Yi, Feng, Gu, Yu, Wang, Hongtao, Sun, Yuyan, Sun, Limin, IEEE. Mobility Pattern based Relationship Inference from Spatiotemporal Data. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCEnull. 2017, [138] Yi Feng, Li Hong, Wang Hongtao, Wen Hui, Sun Limin, Ma L, Khreishah A, Zhang Y, Yan M. Mobility Intention-Based Relationship Inference from Spatiotemporal Data. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017null. 2017, 10251: 871-876, [139] 程冬梅, 严彪, 文辉, 孙利民. 基于规则匹配的分布式工控入侵检测系统设计与实现. 信息网络安全[J]. 2017, 45-51, http://lib.cqvip.com/Qikan/Article/Detail?id=672608923.[140] Wang, Zhihao, Chen, Yongle, Wen, Hui, Zhao, Lian, Sun, Limin, IEEE. Discovering Routers as Secondary Landmarks for Accurate IP Geolocation. 2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL)null. 2017, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000428141601091.[141] 任春林, 谷雨, 崔杰, 刘松, 朱红松, 孙利民. 基于WEB信息的特定类型物联网终端识别方法. 通信技术[J]. 2017, 50(5): 1003-1009, http://lib.cqvip.com/Qikan/Article/Detail?id=672259108.[142] He Yunhua, Li Hong, Cheng Xiuzhen, Liu Yan, Sun Limin, Ma L, Khreishah A, Zhang Y, Yan M. A Bitcoin Based Incentive Mechanism for Distributed P2P Applications. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017null. 2017, 10251: 457-468, [143] Hu Qing, Lv Shichao, Shi Zhiqiang, Sun Limin, Xiao Liang, Ma L, Khreishah A, Zhang Y, Yan M. Defense Against Advanced Persistent Threats with Expert System for Internet of Things. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017null. 2017, 10251: 326-337, [144] Wang, Xiaoshan, Liu, Yao, Lu, Xiang, Lv, Shichao, Shi, Zhiqiang, Sun, Limin, IEEE. On Eavesdropping Attacks and Countermeasures for MU-MIMO Systems. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM)null. 2017, 40-45, [145] Li, Qiang, Feng, Xuan, Zhao, Lian, Sun, Limin. A Framework for Searching Internet-Wide Devices. IEEE NETWORK[J]. 2017, 31(6): 101-107, http://dx.doi.org/10.1109/MNET.2017.1700034.[146] Yi Feng, Li Zhi, Wang Hongtao, Zheng Weimin, Sun Limin, Li G, Ge Y, Zhang Z, Jin Z, Blumenstein M. MIAC: A Mobility Intention Auto-Completion Model for Location Prediction. KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2017)null. 2017, 10412: 432-444, [147] Yi, Feng, Li, Hong, Wang, Hongtao, Sun, Limin. Why You Go Reveals Who You Know: Disclosing Social Relationship by Cooccurrence. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2017, https://doaj.org/article/8f12121d6fbf4daabb0bed8bf92d3269.[148] Wang, Hongtao, Li, Qiang, Yi, Feng, Li, Zhi, Sun, Limin. Influential spatial facility prediction over large scale cyber-physical vehicles in smart city. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING[J]. 2016, http://dx.doi.org/10.1186/s13638-016-0606-4.[149] Lv, Shichao, Lu, Xiang, Lu, Zhu, Wang, Xiaoshan, Wang, Ning, Sun, Limin, IEEE. Zero Reconciliation Secret Key Extraction in MIMO Backscatter Wireless Systems. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2016, http://dx.doi.org/10.1109/ICC.2016.7510987.[150] Li, Qiang, Han, Qi, Sun, Limin. Collaborative Recognition of Queuing Behavior on Mobile Phones. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2016, 15(1): 60-73, https://www.webofscience.com/wos/woscc/full-record/WOS:000365990700005.[151] 常青, 刘中金, 王猛涛, 陈昱, 石志强, 孙利民. VDNS:—种跨平台的固件漏洞关联算法. 计算机研究与发展[J]. 2016, 53(10): 2288-2298, http://lib.cqvip.com/Qikan/Article/Detail?id=7000068576.[152] Hong Li, Limin Sun, Haojin Zhu, Xiang Lu, Xiuzhen Cheng. Achieving Privacy Preservation in WiFi Fingerprint-Based Localization. IEEE INFOCOM 2014 - IEEE Conference on Computer Communications : Volume 3 of 3 Pages 1905-2866.. 2016, 2337-2345, [153] Feng, Xuan, Li, Qiang, Han, Qi, Zhu, Hongsong, Liu, Yan, Sun, Limin, IEEE. Identification of Visible Industrial Control Devices at Internet Scale. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2016, http://dx.doi.org/10.1109/ICC.2016.7511426.[154] Li, Yi, Zhou, Lu, Zhu, Haojin, Sun, Limin. Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks. IEEE INTERNET OF THINGS JOURNAL[J]. 2016, 3(4): 563-571, https://www.webofscience.com/wos/woscc/full-record/WOS:000381470400013.[155] Yang, Weidong, He, Yunhua, Sun, Limin, Lu, Xiang, Li, Xinghua. An optimal query strategy for protecting location privacy in location-based services. PEER-TO-PEER NETWORKING AND APPLICATIONS[J]. 2016, 9(4): 752-761, https://www.webofscience.com/wos/woscc/full-record/WOS:000377468100012.[156] Li Hong, Zhang Cheng, He Yunhua, Cheng Xiuzhen, Liu Yan, Sun Limin, Yang Q, Yu W, Challal Y. An Enhanced Structure-Based De-anonymization of Online Social Networks. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016null. 2016, 9798: 331-342, [157] Feng, Xuan, Li, Qiang, Wang, Haining, Sun, Limin, IEEE. Characterizing Industrial Control System Devices on the Internet. 2016 IEEE 24TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP)null. 2016, [158] Zhao, Qinglin, Sakurai, Taka, Yu, Jiguo, Sun, Limin. Maximizing the stable throughput of high-priority traffic for wireless cyber-physical systems. EURASIPJOURNALONWIRELESSCOMMUNICATIONSANDNETWORKING[J]. 2016, https://www.webofscience.com/wos/woscc/full-record/WOS:000391597400001.[159] Li, Shujun, Li, Hong, Sun, Limin. Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING[J]. 2016, http://dx.doi.org/10.1186/s13638-016-0624-2.[160] 杨安, 孙利民, 王小山, 石志强. 工业控制系统入侵检测技术综述. 计算机研究与发展[J]. 2016, 53(9): 2039-2054, http://lib.cqvip.com/Qikan/Article/Detail?id=669858996.[161] 黄伟武, 闫兆腾, 朱红松, 孙利民. 网络扫描发包速率学习算法. 信息安全与通信保密[J]. 2016, 110-114, http://lib.cqvip.com/Qikan/Article/Detail?id=668364925.[162] Wei, Liangxiong, Zhou, Beisi, Ma, Xichu, Chen, Dexin, Zhang, Jingyu, Peng, Jian, Luo, Qian, Sun, Limin, Li, Dingcheng, Chen, Liangyin. Lightning: A High-Efficient Neighbor Discovery Protocol for Low Duty Cycle WSNs. IEEE COMMUNICATIONS LETTERS[J]. 2016, 20(5): 966-969, https://www.webofscience.com/wos/woscc/full-record/WOS:000376516000033.[163] Zheng Yaowen, Cheng Kai, Li Zhi, Pan Shiran, Zhu Hongsong, Sun Limin, Lam KY, Chi CH, Qing S. A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016null. 2016, 9977: 27-36, [164] 常青, 刘中金, 王猛涛, 陈昱, 石志强, 孙利民. VDNS: 一种跨平台的固件漏洞关联算法. 计算机研究与发展[J]. 2016, 53(10): 2287-2297, https://crad.ict.ac.cn/cn/article/doi/10.7544/issn1000-1239.2016.20160442.[165] Feng, Xuan, Li, Qiang, Wang, Haining, Sun, Limin, IEEE. ASCEND: A Search Engine for Online Industrial Control Devices. 2016 IEEE 24TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP)null. 2016, [166] He, Zaobo, Cai, Zhipeng, Han, Qilong, Tong, Weitian, Sun, Limin, Li, Yingshu. An energy efficient privacy-preserving content sharing scheme in mobile social networks. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2016, 20(5): 833-846, http://dx.doi.org/10.1007/s00779-016-0952-6.[167] Li Hong, He Yunhua, Sun Limin, Cheng Xiuzhen, Yu Jiguo, IEEE. Side-Channel Information Leakage of Encrypted Video Stream in Video Surveillance Systems. IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONSnull. 2016, [168] Wen Hui, Ge Shiming, Chen Shuixian, Wang Hongtao, Sun Limin, IEEE. Abnormal Event Detection via Adaptive Cascade Dictionary Learning. 2015 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP)null. 2015, 847-851, [169] 孙玉砚, 孙利民, 朱红松, 周新运. 基于车牌识别系统车辆轨迹的行为异常检测. 计算机研究与发展[J]. 2015, 52(8): 1921-1929, http://lib.cqvip.com/Qikan/Article/Detail?id=665742497.[170] Chen Shuixian, Lu Xiang, Sun Limin, Ge Shiming, IEEE. Target Domain Adaptation for Face Detection in A Smart Camera Network with Peer-to-Peer Communications. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)null. 2015, [171] Jin Yongming, Zhu Hongsong, Shi Zhiqiang, Lu Xiang, Sun Limin, IEEE. Cryptanalysis and Improvement of two RFID-OT Protocols Based on Quadratic Residues. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2015, 7234-7239, [172] 蔡青松, 刘燕, 牛建伟, 孙利民. 一种关注消息时效性的机会社会网络中节点传播能力分析模型. 电子学报[J]. 2015, 43(9): 1705-1713, http://lib.cqvip.com/Qikan/Article/Detail?id=666434163.[173] Wen, Hong, Tang, Jie, Wu, Jinsong, Song, Huanhuan, Wu, Tingyong, Wu, Bin, Ho, PinHan, Lv, ShiChao, Sun, LiMin. A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT). IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING[J]. 2015, 3(1): 119-126, https://www.webofscience.com/wos/woscc/full-record/WOS:000209844700012.[174] Luan, Tom H, Shen, Xuemin Sherman, Bai, Fan, Sun, Limin. Feel Bored? Join Verse! Engineering Vehicular Proximity Social Networks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2015, 64(3): 1120-1131, https://www.webofscience.com/wos/woscc/full-record/WOS:000351459600022.[175] Xie Kaixuan, Ge Shiming, Yang Rui, Lu Xiang, Sun Limin, Zha H, Chen X, Wang L, Miao Q. Negative-Supervised Cascaded Deep Learning for Traffic Sign Classification. COMPUTER VISION, CCCV 2015, PT Inull. 2015, 546: 249-257, [176] Li, Zhi, Liu, Yan, Zhu, Hongsong, Sun, Limin. Coff: Contact- Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2015, 64(11): 5257-5268, https://www.webofscience.com/wos/woscc/full-record/WOS:000365016700030.[177] Li, Liqun, Sun, Limin, Xing, Guoliang, Huangfu, Wei, Zhou, Ruogu, Zhu, Hongsong. ROCS: Exploiting FM Radio Data System for Clock Calibration in Sensor Networks. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2015, 14(10): https://www.webofscience.com/wos/woscc/full-record/WOS:000360744700012.[178] 王小山, 杨安, 石志强, 孙利民. 工业控制系统信息安全新趋势. 信息网络安全[J]. 2015, 6-11, http://lib.cqvip.com/Qikan/Article/Detail?id=663556222.[179] Gao Shanyan, Zhu Hongsong, Zhou Xinyun, Liu Yan, Sun Limin, Sun L, Ma H, Fang D, Niu J, Wang W. Design and Implementation of Smart Home Linkage System Based on OSGI and REST Architecture. ADVANCES IN WIRELESS SENSOR NETWORKSnull. 2015, 501: 568-582, [180] Li, Hong, He, Yunhua, Cheng, Xiuzhen, Zhu, Hongsong, Sun, Limin. Security and Privacy in Localization for Underwater Sensor Networks. IEEE COMMUNICATIONS MAGAZINE[J]. 2015, 53(11): 56-62, https://www.webofscience.com/wos/woscc/full-record/WOS:000364972000010.[181] 杨红, 朱红松, 孙利民. B-RPL:低存储开销的RPL路由协议. 计算机科学[J]. 2015, 42(1): 96-100, http://lib.cqvip.com/Qikan/Article/Detail?id=663510087.[182] Wei, Yu, Yan, Hongli, Bie, Rongfang, Wang, Shenling, Sun, Limin. Performance monitoring and evaluation in dance teaching with mobile sensing technology. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2014, 18(8): 1929-1939, https://www.webofscience.com/wos/woscc/full-record/WOS:000344812200013.[183] 吴子珺, 于重重, 孙利民, 孙玉砚. 一种针对特定车辆潜在群体的行驶轨迹预测方法. 计算机应用研究[J]. 2014, 31(7): 1951-1955, http://lib.cqvip.com/Qikan/Article/Detail?id=50158715.[184] 何鹏, 阎保平, 李志, 孙利民. CM-MAC:一种基于分簇的多信道车载网MAC协议. 计算机研究与发展[J]. 2014, 51(3): 502-510, http://lib.cqvip.com/Qikan/Article/Detail?id=48799053.[185] Yang, Weidong, Liu, Wei, Li, Pan, Sun, Limin. TDMA-Based Control Channel Access for IEEE 802.11p in VANETs. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2014, 10: https://doaj.org/article/4d8815e01316407a8d05406a20352ef6.[186] Han, Yibo, Tang, Jine, Zhou, ZhangBing, Xiao, Mingzhong, Sun, Limin, Wang, Qun. Novel itinerary-based KNN query algorithm leveraging grid division routing in wireless sensor networks of skewness distribution. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2014, 18(8): 1989-2001, https://www.webofscience.com/wos/woscc/full-record/WOS:000344812200018.[187] Li, Liqun, Xing, Guoliang, Sun, Limin, Liu, Yan. A Quality-Aware Voice Streaming System for Wireless Sensor Networks. ACM TRANSACTIONS ON SENSOR NETWORKS[J]. 2014, 10(4): https://www.webofscience.com/wos/woscc/full-record/WOS:000339008000008.[188] Cai, Qingsong, Bai, Yuqing, Sun, Limin, Niu, Jianwei, Niu, J, Shu, L, Zhou, Z. Quantifying Individual Communication Capability in Opportunistic Mobile Social Networks. 2014 IEEE COMPUTING, COMMUNICATIONS AND IT APPLICATIONS CONFERENCE (COMCOMAP)null. 2014, 1-6, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000380447700001.[189] Liu, Wei, Li, Hong, Chen, Yongle, Zhu, Hongsong, Sun, Limin. LARES: latency-reduced neighbour discovery for contagious diseases prevention. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING[J]. 2014, 16(1): 3-13, https://www.webofscience.com/wos/woscc/full-record/WOS:000338418800002.[190] Guo, Junqi, Xie, Xiaobo, Bie, Rongfang, Sun, Limin. Structural health monitoring by using a sparse coding-based deep learning algorithm with wireless sensor networks. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2014, 18(8): 1977-1987, https://www.webofscience.com/wos/woscc/full-record/WOS:000344812200017.[191] Di Wu, Xiaojing Wang, Limin Sun, Yan Ling, Dongxia Zhang. Identity privacy-based reliable routing method in VANETs. PEER-TO-PEER NETWORKING AND APPLICATIONS[J]. 2014, 7(3): 285-294, http://dx.doi.org/10.1007/s12083-012-0143-9.[192] He, Yunhua, Sun, Limin, Yang, Weidong, Li, Hong. A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2014, 10: https://doaj.org/article/9d96d4d0a63b45138968bd5897a29609.[193] Wen Hui, Ge Shiming, Yang Rui, Chen Shuixian, Sun Limin, IEEE. Robust Visual Tracking via Discriminative Sparse Point Matching. PROCEEDINGS OF THE 2014 9TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA)null. 2014, 1243-1246, [194] Wu, Di, Wang, Xiaojing, Sun, Limin, Ling, Yan, Zhang, Dongxia. Identity privacy-based reliable routing method in VANETs. PEER-TO-PEER NETWORKING AND APPLICATIONS[J]. 2014, 7(3): 285-294, http://dx.doi.org/10.1007/s12083-012-0143-9.[195] Zhang, Yuan, Sun, Limin, Song, Houbing, Cao, Xiaojun. Ubiquitous WSN for Healthcare: Recent Advances and Future Prospects. IEEE INTERNET OF THINGS JOURNAL[J]. 2014, 1(4): 311-318, https://www.webofscience.com/wos/woscc/full-record/WOS:000209672500003.[196] Xiong, Yongping, Zhou, Ruogu, Li, Minming, Xing, Guoliang, Sun, Limin, Ma, Jian. ZiFi: Exploiting Cross-Technology Interference Signatures for Wireless LAN Discovery. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2014, 13(11): 2675-2688, https://www.webofscience.com/wos/woscc/full-record/WOS:000343317500018.[197] 金永明, 吴棋滢, 石志强, 芦翔, 孙利民. 基于PRF的RFID轻量级认证协议研究. 计算机研究与发展[J]. 2014, 51(7): 1506-1514, http://lib.cqvip.com/Qikan/Article/Detail?id=50300270.[198] 李平, 孙利民, 吴佳英, 方庆, 谢晋阳, 周博翔. 基于可离散处理的RFID防碰撞混杂算法研究. 通信学报[J]. 2013, 34(8): 10-17, http://lib.cqvip.com/Qikan/Article/Detail?id=46897700.[199] Li Qiang, Han Qi, Sun Limin, IEEE. Context-aware Handoff on Smartphones. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013)null. 2013, 470-478, [200] Chen, Yongle, Chen, Ci, Zhu, Hongsong, Sun, Limin. Efficient Deterministic Anchor Deployment for Sensor Network Positioning. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 9: https://doaj.org/article/950537e1f14e4f2bbd9cab7aad3893bf.[201] Zhang, Qinyu, Cao, Bin, Wang, Ye, Zhang, Naitong, Lin, Xiaodong, Sun, Limin. ON EXPLOITING POLARIZATION FOR ENERGY-HARVESTING ENABLED COOPERATIVE COGNITIVE RADIO NETWORKING. IEEE WIRELESS COMMUNICATIONS[J]. 2013, 20(4): https://www.webofscience.com/wos/woscc/full-record/WOS:000324598600017.[202] Wu, Di, Zhang, Dongxia, Tan, Guozhen, Sun, Limin, Li, Juanjuan, Liu, Jiangchuan. Improvement and Performance Evaluation for Multimedia Files Transmission in Vehicle-Based DTNs. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 9: https://doaj.org/article/7095cec7979b4b048eb79e68e72ffc90.[203] Xiao, Fu, Wang, Ruchuan, Sun, Limin, Li, Qun, Zhang, Hongwei, Huang, Liusheng. Selected Papers from "The 6th China Conference of Wireless Sensor Networks". INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 9: https://doaj.org/article/fa832fa3372940518646454436502e11.[204] Qin, Weijun, Zhang, Jiadi, Li, Bo, Sun, Limin. Discovering Human Presence Activities with Smartphones Using Nonintrusive Wi-Fi Sniffer Sensors: The Big Data Prospective. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 9: https://doaj.org/article/ae665d8df86749ca9c4d28e40ded8724.[205] Li, Zhi, Sun, Limin, Zhou, Xinyun. Amortized Fairness for Drive-Thru Internet. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 9: https://doaj.org/article/b770bcc6afad4346aa3274506317a5be.[206] 孙利民, 刘伟. 对大规模传感器网络应用面临问题的思考. 中兴通讯技术[J]. 2012, 18(2): 10-14, http://lib.cqvip.com/Qikan/Article/Detail?id=41345877.[207] 周新运, 李志, 李立群, 孙利民. 一种移动容迟网络体系结构及其应用. 计算机研究与发展[J]. 2012, 49(3): 518-528, http://lib.cqvip.com/Qikan/Article/Detail?id=41043886.[208] 蒋文涛, 孙利民, 吕俊伟, 朱红松. 传感器网络中基于局部信号重建的目标计数算法. 通信学报[J]. 2012, 33(9): 44-52, http://lib.cqvip.com/Qikan/Article/Detail?id=43269893.[209] 周新运, 李志, 李立群, 孙利民. 一种移动容迟网络体系结构及其应用. 计算机研究与发展[J]. 2012, 49(3): 518-528, http://lib.cqvip.com/Qikan/Article/Detail?id=41043886.[210] 蒋文涛, 孙利民, 吕俊伟, 朱红松. 传感器网络中基于局部信号重建的目标计数算法. 通信学报[J]. 2012, 33(9): 44-52, http://lib.cqvip.com/Qikan/Article/Detail?id=43269893.[211] Limin Sun. Exploiting Ephemeral Link Correlation for Mobile Wireless Networks. 2012, [212] Li, Liqun, Xing, Guoliang, Han, Qi, Sun, Limin. ASM: Adaptive Voice Stream Multicast over Low-Power Wireless Networks. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2012, 23(4): 626-633, https://www.webofscience.com/wos/woscc/full-record/WOS:000300981100007.[213] Chen Yongle, Sun Limin, Wang Feng, Zhou Xinyun. Congestion-aware indoor emergency navigation algorithm for wireless sensor networks. GLOBECOM - IEEE GLOBAL TELECOMMUNICATIONS CONFERENCEnull. 2011, http://ir.iscas.ac.cn/handle/311060/16297.[214] Xiong Yongping, He Wenbo, Chen Canfeng, Ma Jian, Sun Limin. Phoenix: peer-to-peer location based notification in mobile networks. PROCEEDINGS - 8TH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, MASS 2011null. 2011, 691-696, http://ir.iscas.ac.cn/handle/311060/16247.[215] Li Liqun, Xing Guoliang, Sun Limin, Huangfu Wei, Zhou Ruogu, Zhu Hongsong. Exploiting fm radio data system for adaptive clock calibration in sensor networks. MOBISYS'11 - COMPILATION PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS AND SERVICES AND CO-LOCATED WORKSHOPSnull. 2011, 169-181, http://124.16.136.157/handle/311060/14309.[216] Ma Li, Liu Jiangchuan, Sun Limin, Karimi Ouldooz Baghban. The trajectory exposure problem in location-aware mobile networking. PROCEEDINGS - 8TH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, MASS 2011null. 2011, 7-12, http://ir.iscas.ac.cn/handle/311060/16270.[217] Xing, Guoliang, Wang, Jianping, Yuan, Zhaohui, Tan, Rui, Sun, Limin, Huang, Qingfeng, Jia, Xiaohua, So, Hing Cheung. Mobile Scheduling for Spatiotemporal Detection in Wireless Sensor Networks. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2010, 21(12): 1851-1866, https://www.webofscience.com/wos/woscc/full-record/WOS:000283559800011.[218] Zhou, Ruogu, Xiong, Yongping, Xing, Guoliang, Sun, Limin, Ma, Jian, ACM. ZiFi: Wireless LAN Discovery via ZigBee Interference Signatures. MOBICOM 10 & MOBIHOC 10: PROCEEDINGS OF THE 16TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING AND THE 11TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTINGnull. 2010, 49-60, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000332847500005.[219] Li Liqun, 孙利民. Seer: trend-prediction-based geographic message forwarding in sparse vehicular networks. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONSnull. 2010, http://124.16.136.157/handle/311060/8896.[220] Li Liqun, Xing Guoliang, Sun Limin, Liu Yan. QVS: Quality-aware Voice Streaming for Wireless Sensor Networks. 2009 29TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMSnull. 2009, 450-+, [221] 熊永平, 孙利民, 牛建伟, 刘燕. 机会网络. 软件学报[J]. 2009, 124-137, http://lib.cqvip.com/Qikan/Article/Detail?id=29337262.[222] Huangfu Wei, Duan Bin, Sun Limin, Chen Canfeng, Ma Jian. Thta: triangle-shaped hierarchy aggregation time allocation algorithm for wireless sensor network. IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNCnull. 2008, 2397-2402, http://124.16.136.157/handle/311060/10498.[223] Bi, Yanzhong, Li, Na, Sun, Limin. DAR: An energy-balanced data-gathering scheme for wireless sensor networks. COMPUTER COMMUNICATIONS[J]. 2007, 30(14-15): 2812-2825, http://dx.doi.org/10.1016/j.comcom.2007.05.021.[224] Kai Yang, Xiaodong Lin, Limin Sun. CShield: Enabling code privacy for Cyber-Pysical systems. FUTURE GENERATION COMPUTER SYSTEMS. http://dx.doi.org/10.1016/j.future.2021.06.051.[225] Yan Hu, Hong Li, Tom H Luan, An Yang, Limin Sun, Zhiliang Wang, Rui Wang. Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. FUTURE GENERATION COMPUTER SYSTEMS. http://dx.doi.org/10.1016/j.future.2018.07.027.