Yunchuan Sun

ORCID: 0000-0001-6064-3380
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Semantic Web and Ontologies
  • Cognitive Computing and Networks
  • IoT and Edge/Fog Computing
  • Service-Oriented Architecture and Web Services
  • Big Data and Business Intelligence
  • Blockchain Technology Applications and Security
  • Data Management and Algorithms
  • Complex Network Analysis Techniques
  • Financial Markets and Investment Strategies
  • Data Mining Algorithms and Applications
  • Context-Aware Activity Recognition Systems
  • Market Dynamics and Volatility
  • Network Security and Intrusion Detection
  • Topic Modeling
  • Web Data Mining and Analysis
  • Energy Efficient Wireless Sensor Networks
  • Rough Sets and Fuzzy Logic
  • Privacy-Preserving Technologies in Data
  • Advanced Text Analysis Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • Stock Market Forecasting Methods
  • Advanced MIMO Systems Optimization
  • Human Mobility and Location-Based Analysis
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Database Systems and Queries

Beijing Normal University
2016-2025

Cangzhou Central Hospital
2025

Beijing Institute of Big Data Research
2017-2022

ORCID
2018

Wuhan University
2014-2017

China Information Technology Security Evaluation Center
2015-2016

State Key Laboratory of Software Engineering
2014

Institute of Computing Technology
2008-2012

Chinese Academy of Sciences
2005-2012

Jilin Province Science and Technology Department
2011

This paper promotes the concept of smart and connected communities SCC, which is evolving from cities. SCC are envisioned to address synergistically needs remembering past (preservation revitalization), living in present (livability), planning for future (attainability). Therefore, vision improve livability, preservation, revitalization, attainability a community. The goal building community live present, plan future, remember past. We argue that Internet Things (IoT) has potential provide...

10.1109/access.2016.2529723 article EN cc-by-nc-nd IEEE Access 2016-01-01

Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because data is located different places even all globe. and privacy protection are two main factors of user's concerns about Though many techniques on topics have investigated both academics industries, becoming more important for future development technology government, industry, business. issues relevant to hardware software architecture. This...

10.1155/2014/190903 article EN cc-by International Journal of Distributed Sensor Networks 2014-07-01

With the popularity of mobile devices, social networks (MSNs) have become an important platform for information dissemination. However, spread rumors in MSNs present a massive threat. Currently, there are two kinds methods to address this: blocking at influential users and spreading truth clarify rumors. most existing works either overlook cost various or only consider different individually. This paper proposes heterogeneous-network-based epidemic model that incorporates describe rumor...

10.1109/tvt.2016.2585591 article EN publisher-specific-oa IEEE Transactions on Vehicular Technology 2016-06-28

Abstract The Internet of Things (IoT) promises huge potential economic benefits. However, current IoT applications are in their infancy and the full possible business opportunities is yet to be discovered. To help realize these benefits, workable models required that show where exist. In this article we describe Business DNA Model - a representation model terms Design , Needs Aspirations which greatly simplifies presentation, analysis, design models. This can used by stakeholders generate...

10.1186/2192-1121-1-4 article EN cc-by Communications in Mobile Computing 2012-09-13

Internet of Vehicles (IoV) is a typical application things in the field transportation, which aims at achieving an integrated intelligent transportation system to enhance traffics, avoid accidents, ensure road safety, and improve driving experiences. Due its characteristics dynamic topological structures, huge network scale, non-uniform distribution nodes, mobile limitation, IoV systems face various types attacks, such as authentication identification availability confidentiality routing...

10.1109/iiki.2015.33 article EN 2015-10-01

Different from big cities, small towns call for culture preservation in addition to revitalization. IoT technologies could potentially serve this need. This article develops an architecture, and choose best enabling technologies, services, applications, standards, towards goal. In article, we focus on the opportunities challenges of applying revitalization smart towns. We expect that intelligent use breathe new life into traditional, close-knit

10.1109/waina.2015.169 article EN 2015-03-01

Big Data is an emerging paradigm in almost all industries. Finance big data (FBD) becoming one of the most promising areas management and governance financial sector. It significant...

10.1080/10864415.2018.1512270 article EN International Journal of Electronic Commerce 2019-01-02

Explosive growth of applications in hyperspectral image (HSI) has made HSI classification a hot topic the remote sensing community. The key to improve accuracy is how make full use spectral and spatial information. We combine k-nearest neighbor (KNN) algorithm with guided filter which can extract context information denoise results by edge-preserving filtering. To solve problem dimension disaster, we also take dimensionality reduction into account for classification. verify feasibility our...

10.1109/access.2018.2820043 article EN cc-by-nc-nd IEEE Access 2018-01-01

Massive sensing data are generated continuously in the Internet of Things. How to organize and how query big challenges for intelligent applications. This paper studies organization with event-linked network ( ELN) model, where events regarded as primary units organizing links used represent semantic associations among events. Several different types queries on also explored, which from traditional relational database. We use an instance smart home show effectiveness efficiency approaches...

10.1155/2014/218521 article EN International Journal of Distributed Sensor Networks 2014-08-01

10.1007/s00779-018-1121-x article EN Personal and Ubiquitous Computing 2018-03-05

Nowadays, the applications of blockchain technology spring up rapidly, providing opportunities for solving weaknesses in online education field, such as complexity e-learning assessment, lack a unified assessment standard and insecurity digital certificates. In this paper, we propose system certification, which includes an entirely new network structure on basis combination public private blockchains, well four specific smart contract schemes realization credit exchange, certificate issuance...

10.1109/smartiot.2019.00040 article EN 2019-08-01

After the visions of Industry 5.0 and Society were presented, a proliferation artificial intelligence technologies have been applied to financial field because AI develops fast, especially intelligent analysis methods for alternative data. However, organic integration industry Internet Things lacks relevant standards, there is no appropriate work summary coordinate formulation these standards. This aims effectively improve reliability information acquisition accuracy data processing in...

10.1016/j.jik.2022.100229 article EN cc-by Journal of Innovation & Knowledge 2022-07-21

This paper constructs a daily DeFi Resilience Index (DRI) to assess the market's capability withstand risks and rebound from shocks. The DRI is developed through principal component analysis on four DeFi-related indicators, including Total Value Locked, Number of Active Addresses, Volume Fiat-backed Stablecoins, Trading. trend aligns with real state market. Empirical results support that market easier recover external shocks when higher. Moreover, performance cryptocurrencies exerts positive...

10.2139/ssrn.5096020 preprint EN 2025-01-01

The most direct and prompt influences of monetary policies are on financial markets. Investigating how policy shocks impact stock returns is important for understanding the transmission mechanism. In this work, we explore market's responses to different in China. Empirical results indicate that 1% unanticipated increase expansionary shock yields next-day rising by over 17 basis points average. Channel tests show investor sentiment plays a partial mediating role short-term from returns....

10.1080/1540496x.2025.2467819 article EN Emerging Markets Finance and Trade 2025-03-07

<title>Abstract</title> Extensive-stage small cell lung cancer (ES-SCLC) is a highly aggressive subtype of with limited treatment options and poor prognosis. In recent years, immune checkpoint inhibitors (ICIs) combined chemotherapy have demonstrated significant efficacy in several clinical trials. This study aims to evaluate the first-line immunotherapy ES-SCLC patients identify prognostic factors based on real-world data. retrospective analyzed data 349 treated at Cangzhou Hospital...

10.21203/rs.3.rs-5209773/v1 preprint EN cc-by Research Square (Research Square) 2025-03-24
Coming Soon ...