A new intrusion detection system based on KNN classification algorithm in wireless sensor network W Li, P Yi, Y Wu, L Pan, J Li Journal of Electrical and Computer Engineering 2014 (1), 240217, 2014 | 362 | 2014 |
Security framework for wireless communications in smart distribution grid X Wang, P Yi IEEE Transactions on Smart Grid 2 (4), 809-818, 2011 | 239 | 2011 |
Resisting flooding attacks in ad hoc networks P Yi, Z Dai, Y Zhong, S Zhang International Conference on Information Technology: Coding and Computing …, 2005 | 193 | 2005 |
A new routing attack in mobile ad hoc networks P Yi, Z Dai, S Zhang, Y Zhong International Journal of Information Technology 11 (2), 83-94, 2005 | 161 | 2005 |
An adaptive approach to detecting black and gray hole attacks in ad hoc network J Cai, P Yi, J Chen, Z Wang, N Liu 2010 24th IEEE international conference on advanced information networking …, 2010 | 149 | 2010 |
Web phishing detection using a deep learning framework P Yi, Y Guan, F Zou, Y Yao, W Wang, T Zhu Wireless Communications and Mobile Computing 2018 (1), 4678746, 2018 | 145 | 2018 |
Deploying energy routers in an energy internet based on electric vehicles P Yi, T Zhu, B Jiang, R Jin, B Wang IEEE Transactions on Vehicular Technology 65 (6), 4714-4725, 2016 | 126 | 2016 |
Distributed intrusion detection for mobile ad hoc networks Y Ping, J Xinghao, W Yue, L Ning Journal of systems engineering and electronics 19 (4), 851-859, 2008 | 126 | 2008 |
A denial of service attack in advanced metering infrastructure network P Yi, T Zhu, Q Zhang, Y Wu, J Li 2014 IEEE International Conference on Communications (ICC), 1029-1034, 2014 | 120 | 2014 |
A secure energy routing mechanism for sharing renewable energy in smart microgrid T Zhu, S Xiao, Y Ping, D Towsley, W Gong 2011 IEEE international conference on smart grid communications …, 2011 | 98 | 2011 |
Security and trust management in opportunistic networks: a survey Y Wu, Y Zhao, M Riguidel, G Wang, P Yi Security and Communication Networks 8 (9), 1812-1827, 2015 | 81 | 2015 |
DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks T Zhu, A Mohaisen, Y Ping, D Towsley 2012 Proceedings IEEE INFOCOM, 2363-2371, 2012 | 81 | 2012 |
Survey of security for mobile ad hoc networks. P Yi, YC Jiang, SY Zhang, YP Zhong Dianzi Xuebao(Acta Electronica Sinica) 33 (5), 893-899, 2005 | 79* | 2005 |
A survey on security in wireless mesh networks P Yi, Y Wu, F Zou, N Liu IETE Technical Review 27 (1), 6-14, 2010 | 75 | 2010 |
Puppet attack: A denial of service attack in advanced metering infrastructure network P Yi, T Zhu, Q Zhang, Y Wu, L Pan Journal of Network and Computer Applications 59, 325-332, 2016 | 72 | 2016 |
Flooding attack and defence in ad hoc networks P Yi, Y fei Hou, Y Zhong, S Zhang, Z Dai Journal of Systems Engineering and Electronics 17 (2), 410-416, 2006 | 72 | 2006 |
An energy transmission and distribution network using electric vehicles P Yi, T Zhu, B Jiang, B Wang, D Towsley 2012 IEEE International Conference on Communications (ICC), 3335-3339, 2012 | 63 | 2012 |
GENPass: A general deep learning model for password guessing with PCFG rules and adversarial generation Y Liu, Z Xia, P Yi, Y Yao, T Xie, W Wang, T Zhu 2018 IEEE International Conference on Communications (ICC), 1-6, 2018 | 57 | 2018 |
Emergent technologies in big data sensing: a survey T Zhu, S Xiao, Q Zhang, Y Gu, P Yi, Y Li International Journal of Distributed Sensor Networks 11 (10), 902982, 2015 | 47 | 2015 |
Routing renewable energy using electric vehicles in mobile electrical grid P Yi, T Zhu, G Lin, Q Zhang 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems …, 2013 | 41 | 2013 |