Yilun Fu
Electric Power Research Institute
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yilun Fu.
international conference on information science and control engineering | 2017
Wei Cen; Feng Zhai; Yilun Fu; Tao-Yong Li; Xiao-Bing Liang
In order to enhance the security protection level of power information system, this paper has analyzed the logic structure of power information system, further studied the DL/T 1527-2016 technology specification of electric power utilization information security protection. On the basis of interpretation standards, it has researched the overall security strategy for the power information system, developed such security encryption devices as cipher machine, security encryption module, special encryption isolation gateway, etc, designed the double-deck security communication protocol which can applied for the power information system. The security performance of the security strategy, security encryption devices and the double-deck security communication protocol can meet the requirements of DL/T 1527-2016, and also can meet the security protection requirements for the current power information system.
international conference on software engineering | 2016
Yingjie Lv; Wei Cen; Yilun Fu; Chao Lu; Bin Li
In this paper, we have studied the application of P-cycle in OpenADR communication network. The notions of OpenADR and P-cycle are presented in section I . Then section II put forward a set of algorithms to create P-cycles to protect specific tree network, and simulation results of the algorithm is illustrated in section III. Results show that the algorithm is efficient to calculate P-cycle of high quality for OpenADR communication network.
innovative mobile and internet services in ubiquitous computing | 2015
Xiaobing Liang; Baojiang Cui; Yingjie Lv; Yilun Fu
The security defect detection technology based on source code usually makes use of static analysis methods to detect security vulnerabilities in the test software, which does not consider the runtime information of program execution and the interaction information with the program runtime surrounding environment, so the security defect detection technology based on source code usually results in higher false positive rate. The binary program vulnerability detection methods based upon dynamic analysis usually have lower false positive rate, but their effectiveness depends entirely on test case generation, the detection efficiency of dynamic analysis based on binary program is lower. Moreover, the research of source code vulnerability detection technique and binary executable vulnerability detection technique are essentially fragmented, without considering the relationship between the two classes of methods. In order to improve the efficiency for source code and binary executables vulnerability detection, we presents a collaborative analysis method for vulnerability detection of source code and binary executables based upon the unified defect mode set, meanwhile, we verify the effectiveness of our method using a concrete example in this paper.
2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) | 2015
Pengpeng Yang; Baojiang Cui; Ziyue Wang; Xiaobing Liang; Yilun Fu
In recent years, with the gradual rise of Internet of things, its applications gradually integrate into every corner of peoples daily lives. RFID (Radio Frequency Identification) is the core of the Internet of things technology, which plays a vital role in the development of the Internet of things. Unfortunately, the security risks of RFID are also accompanied by a growing number of. This paper will focus on the security of LLRP released by EPCglobal and design an enhanced secure protocol of LLRP which is consisted of handshake protocol of authentication and integrity verification of the protocol interaction content. Additionally, the encryption will be added to the communication of the whole LLRP protocol for security. The performance evaluation of the enhanced protocol is carried out in the end.
Archive | 2012
Ying Liu; Bing Zhao; Baofeng Li; Feng Zhai; Yingjie Lv; Yilun Fu; Zhancheng Feng; Chunliang Wu
Archive | 2011
Yingjie Lv; Bing Zhao; Ying Liu; Feng Zhai; Yilun Fu; Zhancheng Feng; Chunliang Wu
Low Voltage Apparatus | 2012
Feng Zhai; Bing Zhao; Ying Liu; Yingjie Lv; Yilun Fu; Baofeng Li; Wei Cen; Hua Li
Archive | 2012
Bing Zhao; Ying Liu; Baofeng Li; Feng Zhai; Yingjie Lv; Yilun Fu; Zhancheng Feng; Chunliang Wu; Wei Cen; Quan Yuan
Archive | 2011
Bing Zhao; Feng Zhai; Ying Liu; Yingjie Lv; Yilun Fu; Zhancheng Feng; Chunliang Wu
IEEE Conference Proceedings | 2016
Yingjie Lv; Wei Cen; Yilun Fu; Chao Lu; Bin Li