Ying SUN


Cross-Project Defect Prediction via Semi-Supervised Discriminative Feature Learning
Danlei XING Fei WU Ying SUN Xiao-Yuan JING 
Publication:   
Publication Date: 2020/10/01
Vol. E103-D  No. 10  pp. 2237-2240
Type of Manuscript:  LETTER
Category: Software Engineering
Keyword: 
cross-project defection predictionsemi-supervised learningdiscriminative feature learning
 Summary | Full Text:PDF

Selective Pseudo-Labeling Based Subspace Learning for Cross-Project Defect Prediction
Ying SUN Xiao-Yuan JING Fei WU Yanfei SUN 
Publication:   
Publication Date: 2020/09/01
Vol. E103-D  No. 9  pp. 2003-2006
Type of Manuscript:  LETTER
Category: Software Engineering
Keyword: 
cross-project defect predictionpseudo-labelingsubspace learning
 Summary | Full Text:PDF

Fronthaul Constrained Coordinated Transmission in Cloud-Based 5G Radio Access Network: Energy Efficiency Perspective
Ying SUN Yang WANG Yuqing ZHONG 
Publication:   
Publication Date: 2017/08/01
Vol. E100-B  No. 8  pp. 1343-1351
Type of Manuscript:  Special Section PAPER (Special Section on Radio Access Technologies for 5G Mobile Communications System)
Category: Network
Keyword: 
mobile systemcloud radio access networkcoordinated multi-pointspectral efficiencyenergy efficiency
 Summary | Full Text:PDF

Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks
Yong YU Jianbing NI Ying SUN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/08/01
Vol. E96-D  No. 8  pp. 1875-1877
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
security analysiswireless sensor networksreprogrammingauthentication
 Summary | Full Text:PDF

On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
Ying SUN Yong YU Xiaosong ZHANG Jiwen CHAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/03/01
Vol. E96-A  No. 3  pp. 721-723
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
proxy signatureidentity-based cryptographystandard model
 Summary | Full Text:PDF

Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme
Ying SUN Yong YU Yi MU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/06/01
Vol. E95-D  No. 6  pp. 1690-1693
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
cryptanalysisencryptionhierarchical identity-based cryptography
 Summary | Full Text:PDF