Limin Sun

ORCID: 0000-0002-6578-0680
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Malware Detection Techniques
  • Mobile Ad Hoc Networks
  • Anomaly Detection Techniques and Applications
  • Topic Modeling
  • Caching and Content Delivery
  • Energy Efficient Wireless Sensor Networks
  • Smart Grid Security and Resilience
  • Natural Language Processing Techniques
  • Privacy-Preserving Technologies in Data
  • Cooperative Communication and Network Coding
  • IoT and Edge/Fog Computing
  • Wireless Networks and Protocols
  • Privacy, Security, and Data Protection
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Text Analysis Techniques
  • Network Packet Processing and Optimization
  • Mobile Crowdsensing and Crowdsourcing
  • Energy Harvesting in Wireless Networks
  • Cryptography and Data Security
  • Network Time Synchronization Technologies
  • Software Testing and Debugging Techniques
  • Blockchain Technology Applications and Security

Institute of Information Engineering
2016-2025

University of Chinese Academy of Sciences
2008-2025

Chinese Academy of Sciences
2015-2024

Nanyang Technological University
2023

Institute of Electronics
2017-2022

Tongji University
2022

Xidian University
2014

Institute of Software
2003-2012

With smart devices, particular smartphones, becoming our everyday companions, the ubiquitous mobile Internet and computing applications pervade people daily lives. surge demand on high-quality services at anywhere, how to address user accommodate explosive growth of traffics is key issue next generation networks. The Fog a promising solution towards this goal. extends cloud by providing virtualized resources engaged location-based edge networks so as better serve traffics. Therefore,...

10.48550/arxiv.1502.01815 preprint EN other-oa arXiv (Cornell University) 2015-01-01

Extracting entities and relations from unstructured text has attracted increasing attention in recent years but remains challenging, due to the intrinsic difficulty identifying overlapping with shared entities. Prior works show that joint learning can result a noticeable performance gain. However, they usually involve sequential interrelated steps suffer problem of exposure bias. At training time, predict ground truth conditions while at inference it make extraction scratch. This discrepancy...

10.18653/v1/2020.coling-main.138 article EN Proceedings of the 17th international conference on Computational linguistics - 2020-01-01

With the dramatically increasing deployment of IoT devices, storing and protecting large volume data has become a significant issue. Traditional cloud-based structures impose extremely high computation storage demands on cloud servers. Meanwhile, strong dependencies centralized servers bring trust issues. To mitigate these problems, we propose distributed scheme employing blockchain cetrificateless cryptography. Our eliminates traditional by leveraging miners who perform "transaction"...

10.1109/tsc.2018.2853167 article EN IEEE Transactions on Services Computing 2018-07-05

WiFi networks have enjoyed an unprecedent penetration rate in recent years. However, due to the limited coverage, existing infrastructure only provides intermittent connectivity for mobile users. Once leaving current network clients must actively discover new access points (APs), which wastes precious energy of devices. Although several solutions been proposed address this issue, they either require significant modifications infrastructures or rely on context information that is not...

10.1145/1859995.1860002 article EN 2010-09-20

This paper proposes LATTE, the first static binary taint analysis that is powered by a large language model (LLM). LATTE superior to state of art (e.g., Emtaint, Arbiter, Karonte) in three aspects. First, fully automated while prior analyzers need rely on human expertise manually customize propagation rules and vulnerability inspection rules. Second, significantly effective detection, demonstrated our comprehensive evaluations. For example, has found 37 new bugs real-world firmware, which...

10.1145/3711816 article EN ACM Transactions on Software Engineering and Methodology 2025-01-08

Travelers in vehicles often have a strong willingness to share their travel experience and exchange information each other through social networks, such as Facebook Twitter. This, however, can be costly due the limited connections on road Internet. In this paper, we develop Verse facilitate communications among vehicle travelers highways. enables passengers onboard content information, blogs with pictures, using impromptu wireless intervehicle communications. Unlike traditional online which...

10.1109/tvt.2014.2329481 article EN IEEE Transactions on Vehicular Technology 2014-06-30

Industrial control system (ICS) devices with IP addresses are accessible on the Internet and play a crucial role for critical infrastructures like power grid. However, there is lack of deep understanding these devices' characteristics in cyberspace. In this paper, we take first step direction by investigating industrial Internet. Because nature systems, detection online ICS should be done real-time non-intrusive manner. Thus, analyze 17 protocols widely used train probability model through...

10.1109/icnp.2016.7784407 article EN 2016-11-01

Yucheng Wang, Bowen Yu, Hongsong Zhu, Tingwen Liu, Nan Limin Sun. Proceedings of the 59th Annual Meeting Association for Computational Linguistics and 11th International Joint Conference on Natural Language Processing (Volume 1: Long Papers). 2021.

10.18653/v1/2021.acl-long.63 article EN cc-by 2021-01-01

Clock synchronization is critical for Wireless Sensor Networks (WSNs) due to the need of inter-node coordination and collaborative information processing. Although many message passing protocols can achieve satisfactory clock accuracy, they incur prohibitively high overhead when network scales more than tens nodes. An alternative approach take advantage global time reference induced by existing infrastructures including GPS, timekeeping radio stations, or power grid. However, consumption...

10.1145/1999995.2000012 article EN 2011-06-28

In wireless sensor networks (WSNs), due to the limited energy of nodes, discovering neighbors needs be achieved in an energy-efficient way. This means that, at a given consumption, we need reduce worst-case neighbor discovery latency as far possible. this letter, propose novel deterministic method, called Lightning. Lightning employs two kinds active slots different lengths (we call A slot and C slot, respectively). The time is much shorter than that order consumption. addition, maximize...

10.1109/lcomm.2016.2536018 article EN IEEE Communications Letters 2016-02-29

Existing static defenses for online service systems can be fragile and costly due to the continuity of ubiquitous cyber attacks. LAD has become a promising technology tackle this problem. However, security defense mechanism itself is often neglected as mainly focuses on fortifying protected target. This would allow new deductive attack encroach LADs by inferring undermining strategy, then whole completely invalidated once all. Such problem leads urgent need develop technologies with...

10.1109/mcom.001.1900367 article EN IEEE Communications Magazine 2020-06-01

In the field of Cyber Physical Systems and Pervasive Computing, physical resources web can be easily handled seamlessly integrated into our life. However, due to heterogeneity devices tight coupling individual information systems, developers cannot create their specific applications by combining with resources. this paper, we proposed Rest Thing which is a restful service infrastructure based on REST principles in order hide provide seamless way integrate embedded existing applications....

10.1109/euc.2011.59 article EN 2011-10-01

In recent years, the capacity of cellular networks has hardly kept pace with dramatic explosion traffic from emerging mobile applications. To address this issue, a number studies have been proposed to offload using delay-tolerant (DTNs) opportunistically formed by devices. These off-loading schemes rely on assumption small-size content, which can be entirely transmitted over single DTN contact. However, such an assumption, was probably valid in past, no longer hold increasing popularity...

10.1109/tvt.2014.2381220 article EN IEEE Transactions on Vehicular Technology 2014-12-19

LLM-based (Large Language Model) fuzz driver generation is a promising research area. Unlike traditional program analysis-based method, this text-based approach more general and capable of harnessing variety API usage information, resulting in code that friendly for human readers. However, there still lack understanding regarding the fundamental issues on direction, such as its effectiveness potential challenges. To bridge gap, we conducted first in-depth study targeting important using LLMs...

10.48550/arxiv.2307.12469 preprint EN cc-by arXiv (Cornell University) 2023-01-01

Radio spectrum underutilization and energy inefficiency become urgent bottleneck problems to the sustainable development of wireless technologies. The research philosophies communications have been shifted from balancing reliability-efficiency tradeoff in link level seeking spectrum-energy efficiency network level. Global efficient designs attract significant attention improving utilization efficiency, wherein cognitive radio networks scavenging related techniques are particular interests....

10.1109/mwc.2013.6590058 article EN IEEE Wireless Communications 2013-08-01

Industrial control system (ICS) devices play a crucial role in critical infrastructures, such as power grid. In recent years, numerous ICS are accessible on the Internet, resulting potential security issues. However, there is lack of deep understanding these devices' characteristics cyberspace. this paper, we take first step direction by investigating visible Internet. Because nature ICSs, detection online should be done nonintrusive and timely manner. We analyze 17 industrial protocols...

10.1109/jiot.2018.2826558 article EN IEEE Internet of Things Journal 2018-04-13

Protocol reverse engineering can be applied to various security applications, including fuzzing, malware analysis, and intrusion detection. It aims acquire an unknown protocol's format, semantic, behavior specifications, where format extraction is the primary task. One subset of mainstream research utilizes network traffic for analysis. These approaches leverage algorithms, such as multiple sequence alignment, frequent itemset mining, information entropy extract from messages. However, they...

10.1109/icnp55882.2022.9940264 article EN 2022-10-30

Vehicular Ad Hoc Network (VANET) is a special application of Mobile Networks in road traffic, which can autonomously organize networks without infrastructure. VANET that consists many community nodes characterized by lack guaranteed connectivity. The right operation such network requires to cooperate on the level packet forwarding. When node wants transmit message another node, be opportunistically routed through relay under hypothesis each willing participate forward. However, belonging...

10.4304/jnw.7.7.1106-1115 article EN Journal of Networks 2012-07-01
Coming Soon ...