Yanbin Sun

1.7k total citations · 1 hit paper
65 papers, 1.2k citations indexed

About

Yanbin Sun is a scholar working on Computer Networks and Communications, Artificial Intelligence and Control and Systems Engineering. According to data from OpenAlex, Yanbin Sun has authored 65 papers receiving a total of 1.2k indexed citations (citations by other indexed papers that have themselves been cited), including 35 papers in Computer Networks and Communications, 26 papers in Artificial Intelligence and 14 papers in Control and Systems Engineering. Recurrent topics in Yanbin Sun's work include Network Security and Intrusion Detection (16 papers), Smart Grid Security and Resilience (11 papers) and Advanced Malware Detection Techniques (11 papers). Yanbin Sun is often cited by papers focused on Network Security and Intrusion Detection (16 papers), Smart Grid Security and Resilience (11 papers) and Advanced Malware Detection Techniques (11 papers). Yanbin Sun collaborates with scholars based in China, United States and Australia. Yanbin Sun's co-authors include Zhihong Tian, Mohan Li, Shen Su, Yuhang Wang, Nadra Guizani, Xiaojiang Du, Meikang Qiu, Chunsheng Zhu, Hui Lu and Wei Shi and has published in prestigious journals such as IEEE Access, Sensors and Information Sciences.

In The Last Decade

Yanbin Sun

55 papers receiving 1.1k citations

Hit Papers

Block-DEF: A secure digital evidence framework using bloc... 2019 2026 2021 2023 2019 50 100 150 200

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yanbin Sun China 16 557 461 376 211 186 65 1.2k
Weixian Liao United States 19 454 0.8× 674 1.5× 300 0.8× 152 0.7× 213 1.1× 46 1.2k
Limin Sun China 17 708 1.3× 553 1.2× 352 0.9× 134 0.6× 335 1.8× 77 1.3k
Joaquín García-Alfaro France 16 430 0.8× 282 0.6× 376 1.0× 107 0.5× 115 0.6× 103 975
Nawab Muhammad Faseeh Qureshi South Korea 22 545 1.0× 382 0.8× 343 0.9× 91 0.4× 295 1.6× 68 1.2k
Norziana Jamil Malaysia 16 325 0.6× 296 0.6× 239 0.6× 180 0.9× 211 1.1× 104 958
Kewei Sha United States 20 938 1.7× 316 0.7× 324 0.9× 148 0.7× 474 2.5× 70 1.3k
Ana Lucila Sandoval Orozco Spain 19 635 1.1× 272 0.6× 311 0.8× 220 1.0× 249 1.3× 97 1.2k
Sipra Das Bit India 18 1.1k 1.9× 226 0.5× 441 1.2× 137 0.6× 324 1.7× 83 1.4k
Guanggang Geng China 17 400 0.7× 415 0.9× 297 0.8× 177 0.8× 139 0.7× 61 852

Countries citing papers authored by Yanbin Sun

Since Specialization
Citations

This map shows the geographic impact of Yanbin Sun's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yanbin Sun with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yanbin Sun more than expected).

Fields of papers citing papers by Yanbin Sun

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yanbin Sun. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yanbin Sun. The network helps show where Yanbin Sun may publish in the future.

Co-authorship network of co-authors of Yanbin Sun

This figure shows the co-authorship network connecting the top 25 collaborators of Yanbin Sun. A scholar is included among the top collaborators of Yanbin Sun based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yanbin Sun. Yanbin Sun is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Li, Mohan, et al.. (2025). Invisible trigger image: A dynamic neural backdoor attack based on hidden feature. Neurocomputing. 639. 130296–130296.
2.
Liu, Yuan, et al.. (2025). H$^{4}$4: A Software-Defined Deception Defense System in Safeguard Defense Mode. IEEE Transactions on Dependable and Secure Computing. 23(1). 507–524.
3.
Yao, Wenjun, Yanbin Sun, Guodong Wu, et al.. (2024). AOIFF: A Precise Attack Method for PLCs Based on Awareness of Industrial Field Information. IEEE Transactions on Sustainable Computing. 10(2). 232–243.
4.
Li, Mohan, et al.. (2024). Security analysis of a reversible data hiding scheme in encrypted images by redundant space transfer. Journal of King Saud University - Computer and Information Sciences. 36(1). 101914–101914. 5 indexed citations
6.
Wang, Jingpei, Ming Zhu, Mohan Li, Yanbin Sun, & Zhihong Tian. (2023). An Access Control Method Against Unauthorized and Noncompliant Behaviors of Real-Time Data in Industrial IoT. IEEE Internet of Things Journal. 11(1). 708–727. 6 indexed citations
7.
Zhou, Haifeng, et al.. (2022). Digital Twin-Based Cyber Range for Industrial Internet of Things. IEEE Consumer Electronics Magazine. 12(6). 66–77. 10 indexed citations
8.
Hu, Ning, Zhihong Tian, Yanbin Sun, et al.. (2021). Building Agile and Resilient UAV Networks Based on SDN and Blockchain. IEEE Network. 35(1). 57–63. 41 indexed citations
9.
Sun, Yanbin, Zhihong Tian, Mohan Li, et al.. (2020). Honeypot Identification in Softwarized Industrial Cyber–Physical Systems. IEEE Transactions on Industrial Informatics. 17(8). 5542–5551. 43 indexed citations
10.
Tian, Zhihong, Wei Shi, Zhiyuan Tan, et al.. (2020). Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications. 29(5). 1680–1689. 13 indexed citations
11.
Chen, Weixiang, et al.. (2020). Advanced persistent threat organization identification based on software gene of malware. Transactions on Emerging Telecommunications Technologies. 31(12). 14 indexed citations
12.
Tian, Zhihong, Chaochao Luo, Hui Lu, et al.. (2020). User and Entity Behavior Analysis under Urban Big Data. 1(3). 1–19. 26 indexed citations
13.
Lu, Hui, et al.. (2020). Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis. Mobile Networks and Applications. 26(4). 1723–1732. 20 indexed citations
14.
Li, Mohan, Yanbin Sun, Hui Lu, Sabita Maharjan, & Zhihong Tian. (2019). Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems. IEEE Internet of Things Journal. 7(7). 6266–6278. 115 indexed citations
15.
Li, Mohan, Yanbin Sun, Shen Su, et al.. (2019). DPIF: A Framework for Distinguishing Unintentional Quality Problems From Potential Shilling Attacks. Computers, materials & continua/Computers, materials & continua (Print). 59(1). 331–344. 3 indexed citations
16.
Li, Mohan, Yanbin Sun, Yu Jiang, & Zhihong Tian. (2018). Answering the Min-Cost Quality-Aware Query on Multi-Sources in Sensor-Cloud Systems. Sensors. 18(12). 4486–4486. 8 indexed citations
17.
Li, Mohan & Yanbin Sun. (2018). Currency Preserving Query: Selecting the Newest Values from Multiple Tables. IEICE Transactions on Information and Systems. E101.D(12). 3059–3072. 1 indexed citations
18.
Sun, Yanbin, Yu Zhang, Binxing Fang, & Hongli Zhang. (2017). Succinct and practical greedy embedding for geometric routing. Computer Communications. 114. 51–61. 3 indexed citations
19.
Sun, Yanbin, et al.. (2013). UDP flow detection and analysis using dynamical timeout strategy based on sliding-window. 17. 1–4. 1 indexed citations
20.
Le, Hieu Khac, Jeff Pasternack, Manish Gupta, et al.. (2011). Apollo: Towards factfinding in participatory sensing. Information Processing in Sensor Networks. 129–130. 12 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026