L
Lihua Yin
Researcher at Guangzhou University
Publications - 87
Citations - 764
Lihua Yin is an academic researcher from Guangzhou University. The author has contributed to research in topics: Computer science & Network security. The author has an hindex of 10, co-authored 75 publications receiving 430 citations. Previous affiliations of Lihua Yin include Chinese Academy of Sciences.
Papers
More filters
Journal ArticleDOI
Trust architecture and reputation evaluation for internet of things
TL;DR: IoTrust is presented, a trust architecture that integrates Soft Defined Network (SDN) in IoT, and a cross-layer authorization protocol based on IoTrust, and the protocol together provide a new insight for research on trust management in the IoT.
Journal ArticleDOI
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus
TL;DR: C2RS implements out-of-band data capturing for greater attack resistance with virtual machine introspection technique and proposes an object-dependent method to analyze the evidence of illegal activity.
Journal ArticleDOI
A Privacy-Preserving Federated Learning for Multiparty Data Sharing in Social IoTs
TL;DR: This paper proposes a new hybrid privacy-preserving method for federal learning that not only protects the characteristics of the data uploaded by each client, but also protects the weight of each participant in the weighted summation procedure.
Journal ArticleDOI
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries
TL;DR: ConnSpoiler is proposed, a lightweight system that detects IoT-based botnets by identifying the stream of algorithmically generated domains (AGDs) in a fast way and has a high probability of detecting infection before the compromised devices connect C&C servers, which can help to prevent the succeeding attacks.
Proceedings ArticleDOI
Cyber Attacks Prediction Model Based on Bayesian Network
Jinyu Wu,Lihua Yin,Yunchuan Guo +2 more
TL;DR: A cyber attacks prediction model based on Bayesian network is proposed, which uses attack graphs to represent all the vulnerabilities and possible attack paths and captures the using environment factors using Bayesiannetwork model.