Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yilun Fu is active.

Publication


Featured researches published by Yilun Fu.


international conference on information science and control engineering | 2017

Research on the Cryptographic Application Technology for Power Information System Based on DL/T 1527-2016 Technology Standard

Wei Cen; Feng Zhai; Yilun Fu; Tao-Yong Li; Xiao-Bing Liang

In order to enhance the security protection level of power information system, this paper has analyzed the logic structure of power information system, further studied the DL/T 1527-2016 technology specification of electric power utilization information security protection. On the basis of interpretation standards, it has researched the overall security strategy for the power information system, developed such security encryption devices as cipher machine, security encryption module, special encryption isolation gateway, etc, designed the double-deck security communication protocol which can applied for the power information system. The security performance of the security strategy, security encryption devices and the double-deck security communication protocol can meet the requirements of DL/T 1527-2016, and also can meet the security protection requirements for the current power information system.


international conference on software engineering | 2016

Application of P-cycle in OpenADR communication network protection

Yingjie Lv; Wei Cen; Yilun Fu; Chao Lu; Bin Li

In this paper, we have studied the application of P-cycle in OpenADR communication network. The notions of OpenADR and P-cycle are presented in section I . Then section II put forward a set of algorithms to create P-cycles to protect specific tree network, and simulation results of the algorithm is illustrated in section III. Results show that the algorithm is efficient to calculate P-cycle of high quality for OpenADR communication network.


innovative mobile and internet services in ubiquitous computing | 2015

Research on the Collaborative Analysis Technology for Source Code and Binary Executable Based upon the Unified Defect Mode Set

Xiaobing Liang; Baojiang Cui; Yingjie Lv; Yilun Fu

The security defect detection technology based on source code usually makes use of static analysis methods to detect security vulnerabilities in the test software, which does not consider the runtime information of program execution and the interaction information with the program runtime surrounding environment, so the security defect detection technology based on source code usually results in higher false positive rate. The binary program vulnerability detection methods based upon dynamic analysis usually have lower false positive rate, but their effectiveness depends entirely on test case generation, the detection efficiency of dynamic analysis based on binary program is lower. Moreover, the research of source code vulnerability detection technique and binary executable vulnerability detection technique are essentially fragmented, without considering the relationship between the two classes of methods. In order to improve the efficiency for source code and binary executables vulnerability detection, we presents a collaborative analysis method for vulnerability detection of source code and binary executables based upon the unified defect mode set, meanwhile, we verify the effectiveness of our method using a concrete example in this paper.


2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) | 2015

Study on Security Protocol Analysis and Design Technology for RFID System

Pengpeng Yang; Baojiang Cui; Ziyue Wang; Xiaobing Liang; Yilun Fu

In recent years, with the gradual rise of Internet of things, its applications gradually integrate into every corner of peoples daily lives. RFID (Radio Frequency Identification) is the core of the Internet of things technology, which plays a vital role in the development of the Internet of things. Unfortunately, the security risks of RFID are also accompanied by a growing number of. This paper will focus on the security of LLRP released by EPCglobal and design an enhanced secure protocol of LLRP which is consisted of handshake protocol of authentication and integrity verification of the protocol interaction content. Additionally, the encryption will be added to the communication of the whole LLRP protocol for security. The performance evaluation of the enhanced protocol is carried out in the end.


Archive | 2012

Encryption and decryption functions based field service terminal and application method thereof

Ying Liu; Bing Zhao; Baofeng Li; Feng Zhai; Yingjie Lv; Yilun Fu; Zhancheng Feng; Chunliang Wu


Archive | 2011

Method for encrypting embedded secure access module (ESAM) of power system acquisition terminal

Yingjie Lv; Bing Zhao; Ying Liu; Feng Zhai; Yilun Fu; Zhancheng Feng; Chunliang Wu


Low Voltage Apparatus | 2012

Electric automobile charging pile control device with safety protection function

Feng Zhai; Bing Zhao; Ying Liu; Yingjie Lv; Yilun Fu; Baofeng Li; Wei Cen; Hua Li


Archive | 2012

Hand-held device used for on-site maintenance for intelligent electric energy meter

Bing Zhao; Ying Liu; Baofeng Li; Feng Zhai; Yingjie Lv; Yilun Fu; Zhancheng Feng; Chunliang Wu; Wei Cen; Quan Yuan


Archive | 2011

Root key generating method

Bing Zhao; Feng Zhai; Ying Liu; Yingjie Lv; Yilun Fu; Zhancheng Feng; Chunliang Wu


IEEE Conference Proceedings | 2016

OpenADR通信網保護におけるPサイクルの適用【Powered by NICT】

Yingjie Lv; Wei Cen; Yilun Fu; Chao Lu; Bin Li

Collaboration


Dive into the Yilun Fu's collaboration.

Top Co-Authors

Avatar

Yingjie Lv

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Feng Zhai

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Bing Zhao

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Wei Cen

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bin Li

North China Electric Power University

View shared research outputs
Top Co-Authors

Avatar

Chao Lu

North China Electric Power University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge