scispace - formally typeset
L

Lihua Yin

Researcher at Guangzhou University

Publications -  87
Citations -  764

Lihua Yin is an academic researcher from Guangzhou University. The author has contributed to research in topics: Computer science & Network security. The author has an hindex of 10, co-authored 75 publications receiving 430 citations. Previous affiliations of Lihua Yin include Chinese Academy of Sciences.

Papers
More filters
Journal ArticleDOI

Trust architecture and reputation evaluation for internet of things

TL;DR: IoTrust is presented, a trust architecture that integrates Soft Defined Network (SDN) in IoT, and a cross-layer authorization protocol based on IoTrust, and the protocol together provide a new insight for research on trust management in the IoT.
Journal ArticleDOI

A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus

TL;DR: C2RS implements out-of-band data capturing for greater attack resistance with virtual machine introspection technique and proposes an object-dependent method to analyze the evidence of illegal activity.
Journal ArticleDOI

A Privacy-Preserving Federated Learning for Multiparty Data Sharing in Social IoTs

TL;DR: This paper proposes a new hybrid privacy-preserving method for federal learning that not only protects the characteristics of the data uploaded by each client, but also protects the weight of each participant in the weighted summation procedure.
Journal ArticleDOI

ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries

TL;DR: ConnSpoiler is proposed, a lightweight system that detects IoT-based botnets by identifying the stream of algorithmically generated domains (AGDs) in a fast way and has a high probability of detecting infection before the compromised devices connect C&C servers, which can help to prevent the succeeding attacks.
Proceedings ArticleDOI

Cyber Attacks Prediction Model Based on Bayesian Network

TL;DR: A cyber attacks prediction model based on Bayesian network is proposed, which uses attack graphs to represent all the vulnerabilities and possible attack paths and captures the using environment factors using Bayesiannetwork model.