关注
Prof Shui Yu
Prof Shui Yu
FIEEE, BoG of IEEE ComSoc and VTS, School of Computer Science, University of Technology Sydney
在 uts.edu.au 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system
D Zeng, L Gu, S Guo, Z Cheng, S Yu
IEEE Transactions on Computers 65 (12), 3702-3712, 2016
4292016
A parallel random forest algorithm for big data in a spark cloud computing environment
J Chen, K Li, Z Tang, K Bilal, S Yu, C Weng, K Li
IEEE Transactions on Parallel and Distributed Systems 28 (4), 919-933, 2016
3842016
A survey on security threats and defensive techniques of machine learning: A data driven view
Q Liu, P Li, W Zhao, W Cai, S Yu, VCM Leung
IEEE access 6, 12103-12117, 2018
3512018
Scoring users’ privacy disclosure across multiple online social networks
E Aghasian, S Garg, L Gao, S Yu, J Montgomery
IEEE access 5, 13118-13130, 2017
3352017
Computing the numerical scale of the linguistic term set for the 2-tuple fuzzy linguistic representation model
Y Dong, Y Xu, S Yu
IEEE Transactions on Fuzzy Systems 17 (6), 1366-1378, 2009
3032009
Big privacy: Challenges and opportunities of privacy study in the age of big data
S Yu
IEEE access 4, 2751-2763, 2016
3022016
Discriminating DDoS attacks from flash crowds using flow correlation coefficient
S Yu, W Zhou, W Jia, S Guo, Y Xiang, F Tang
IEEE transactions on parallel and distributed systems 23 (6), 1073-1080, 2011
2862011
Can we beat DDoS attacks in clouds?
S Yu, Y Tian, S Guo, DO Wu
IEEE Transactions on Parallel and Distributed Systems 25 (9), 2245-2254, 2013
2762013
Traceback of DDoS attacks using entropy variations
S Yu, W Zhou, R Doss, W Jia
IEEE transactions on parallel and distributed systems 22 (3), 412-425, 2010
2572010
Predicted packet padding for anonymous web browsing against traffic analysis attacks
S Yu, G Zhao, W Dou, S James
IEEE Transactions on Information Forensics and Security 7 (4), 1381-1393, 2012
2552012
Influence analysis in social networks: A survey
S Peng, Y Zhou, L Cao, S Yu, J Niu, W Jia
Journal of Network and Computer Applications 106, 17-32, 2018
2352018
Software-defined wireless networking opportunities and challenges for Internet-of-Things: A review
K Sood, S Yu, Y Xiang
IEEE Internet of Things Journal 3 (4), 453-463, 2015
2352015
Decentralized privacy using blockchain-enabled federated learning in fog computing
Y Qu, L Gao, TH Luan, Y Xiang, S Yu, B Li, G Zheng
IEEE Internet of Things Journal 7 (6), 5171-5183, 2020
2322020
Networking for big data: A survey
S Yu, M Liu, W Dou, X Liu, S Zhou
IEEE Communications Surveys & Tutorials 19 (1), 531-549, 2016
2102016
Consensus efficiency in group decision making: A comprehensive comparative study and its optimal design
H Zhang, Y Dong, F Chiclana, S Yu
European Journal of Operational Research 275 (2), 580-598, 2019
2072019
Smartphone malware and its propagation modeling: A survey
S Peng, S Yu, A Yang
IEEE Communications Surveys & Tutorials 16 (2), 925-941, 2013
2012013
CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding
P Li, S Guo, S Yu, AV Vasilakos
2012 Proceedings IEEE INFOCOM, 100-108, 2012
1982012
Identifying propagation sources in networks: State-of-the-art and comparative studies
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016
1942016
Blockchain meets cloud computing: A survey
K Gai, J Guo, L Zhu, S Yu
IEEE Communications Surveys & Tutorials 22 (3), 2009-2030, 2020
1852020
Reliable multicast with pipelined network coding using opportunistic feeding and routing
P Li, S Guo, S Yu, AV Vasilakos
IEEE Transactions on Parallel and Distributed Systems 25 (12), 3264-3273, 2014
1852014
系统目前无法执行此操作,请稍后再试。
文章 1–20