


default search action
Shui Yu 0001
Person information
- affiliation: University of Technology Sydney, School of Computer Science, Faculty of Engineering and Information Technology, Ultimo, NSW, Australia
- affiliation (PhD 2004): Deakin University, Australia
Other persons with the same name
- Shui Yu — disambiguation page
- Shui Yu 0002
— Dongguan University of Technology, Dongguan, China (and 1 more)
- Shui Yu 0003 — Shanghai Jiaotong University, Shanghai, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j461]Shanshan Wang, Chuan Xu, Guofeng Zhao, Zhenzhen Han, Rui Hu, Shui Yu:
APQA: An anonymous post quantum access authentication scheme based on lattice for space ground integrated network. Comput. Networks 257: 110979 (2025) - [j460]Weiqi Wang
, Zhiyi Tian
, Chenhan Zhang
, Shui Yu
:
SCU: An Efficient Machine Unlearning Scheme for Deep Learning Enabled Semantic Communications. IEEE Trans. Inf. Forensics Secur. 20: 547-558 (2025) - [j459]Shanshan Wang, Guofeng Zhao, Chuan Xu, Zhenzhen Han, Shui Yu:
LPQAA: a lightweight post-quantum access authentication scheme for satellite network. J. Supercomput. 81(1): 233 (2025) - [j458]Ruidong Wang
, Liang Xi
, Fengbin Zhang
, Haoyi Fan
, Xu Yu
, Lei Liu
, Shui Yu
, Victor C. M. Leung
:
Context Correlation Discrepancy Analysis for Graph Anomaly Detection. IEEE Trans. Knowl. Data Eng. 37(1): 174-187 (2025) - [j457]Huibin Xu
, Long Fang
, Huanhuan Lv
, Shiluo Xu
, Shigen Shen
, Shui Yu
:
Maximizing VANETs Secrecy Data Rate Using Dueling Double Deep Q-Networks. IEEE Trans. Veh. Technol. 74(1): 1267-1279 (2025) - 2024
- [j456]Guowen Wu, Yanchun Zhang, Hong Zhang, Shoujian Yu, Shui Yu
, Shigen Shen
:
SIHQR model with time delay for worm spread analysis in IIoT-enabled PLC network. Ad Hoc Networks 160: 103504 (2024) - [j455]Shigen Shen
, Chenpeng Cai, Zhenwei Li, Yizhou Shen
, Guowen Wu
, Shui Yu
:
Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks. Appl. Soft Comput. 150: 111080 (2024) - [j454]Xueli Nie, Aiqing Zhang
, Yong Wang, Weiqi Wang, Shui Yu:
VPRQ: Verifiable and privacy-preserving range query over encrypted cloud data. Comput. Electr. Eng. 118: 109367 (2024) - [j453]Yanchao Li, Fu Xiao, Hao Li, Qun Li, Shui Yu
:
Meta label associated loss for fine-grained visual recognition. Sci. China Inf. Sci. 67(6) (2024) - [j452]Yuxian Huang
, Geng Yang, Hao Zhou, Hua Dai
, Dong Yuan, Shui Yu
:
VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks. Comput. Secur. 136: 103562 (2024) - [j451]Chenhan Zhang
, Shui Yu
, Zhiyi Tian
, James J. Q. Yu
:
Generative Adversarial Networks: A Survey on Attack and Defense Perspective. ACM Comput. Surv. 56(4): 91:1-91:35 (2024) - [j450]Jingxue Chen
, Hang Yan
, Zhiyuan Liu
, Min Zhang
, Hu Xiong
, Shui Yu
:
When Federated Learning Meets Privacy-Preserving Computation. ACM Comput. Surv. 56(12): 319:1-319:36 (2024) - [j449]Yizhou Shen
, Carlton Shepherd, Chuadhry Mujeeb Ahmed, Shigen Shen
, Xiaoping Wu, Wenlong Ke
, Shui Yu
:
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey. Eng. Appl. Artif. Intell. 133: 108449 (2024) - [j448]Liang Ke
, Peng Xiao, Xinyu Chen, Shui Yu
, Xingshu Chen
, Haizhou Wang
:
A novel cross-domain adaptation framework for unsupervised criminal jargon detection via pre-trained contextual embedding of darknet corpus. Expert Syst. Appl. 242: 122715 (2024) - [j447]Yongkai Fan
, Kaile Ma
, Linlin Zhang, Jiqiang Liu, Naixue Xiong, Shui Yu:
VeriCNN: Integrity verification of large-scale CNN training process based on zk-SNARK. Expert Syst. Appl. 255: 124531 (2024) - [j446]Binh Minh Nguyen
, Thieu Nguyen
, Quoc-Hien Vu
, Tran Huy Hung
, Hiep Khac Vo, Do Bao Son
, Huynh Thi Thanh Binh
, Shui Yu
, Zongda Wu
:
A Novel Nature-Inspired Algorithm for Optimal Task Scheduling in Fog-Cloud Blockchain System. IEEE Internet Things J. 11(2): 2043-2057 (2024) - [j445]Jie Dou
, Gang Xie
, Zhiyi Tian
, Lei Cui
, Shui Yu
:
Modeling and Analyzing the Spatial-Temporal Propagation of Malware in Mobile Wearable IoT Networks. IEEE Internet Things J. 11(2): 2438-2452 (2024) - [j444]Cong Wang
, Tianye Yao
, Tingshan Fan
, Sancheng Peng
, Changming Xu
, Shui Yu
:
Modeling on Resource Allocation for Age-Sensitive Mobile-Edge Computing Using Federated Multiagent Reinforcement Learning. IEEE Internet Things J. 11(2): 3121-3131 (2024) - [j443]Zhisheng Yin
, Nan Cheng
, Yunchao Song
, Yilong Hui
, Yunhan Li, Tom H. Luan
, Shui Yu
:
UAV-Assisted Secure Uplink Communications in Satellite-Supported IoT: Secrecy Fairness Approach. IEEE Internet Things J. 11(4): 6904-6915 (2024) - [j442]Minghao Wang
, Tianqing Zhu
, Xuhan Zuo
, Dayong Ye
, Shui Yu
, Wanlei Zhou
:
Blockchain-Empowered Multiagent Systems: Advancing IoT Security and Transaction Efficiency. IEEE Internet Things J. 11(7): 11217-11231 (2024) - [j441]Shoujian Yu, Rong Zhai, Yizhou Shen
, Guowen Wu
, Hong Zhang
, Shui Yu
, Shigen Shen
:
Deep Q-Network-Based Open-Set Intrusion Detection Solution for Industrial Internet of Things. IEEE Internet Things J. 11(7): 12536-12550 (2024) - [j440]Minghao Wang
, Tianqing Zhu
, Xuhan Zuo
, Dayong Ye
, Shui Yu
, Wanlei Zhou
:
Blockchain-Based Gradient Inversion and Poisoning Defense for Federated Learning. IEEE Internet Things J. 11(9): 15667-15681 (2024) - [j439]Guowen Wu
, Xihang Chen
, Yizhou Shen
, Zhiqi Xu, Hong Zhang
, Shigen Shen
, Shui Yu
:
Combining Lyapunov Optimization With Actor-Critic Networks for Privacy-Aware IIoT Computation Offloading. IEEE Internet Things J. 11(10): 17437-17452 (2024) - [j438]Minghao Wang
, Tianqing Zhu
, Xuhan Zuo
, Dayong Ye
, Shui Yu
, Wanlei Zhou
:
Public and Private Blockchain Infusion: A Novel Approach to Federated Learning. IEEE Internet Things J. 11(10): 17525-17537 (2024) - [j437]Tiantian Zhang
, Dongyang Xu
, Amr Tolba
, Keping Yu
, Houbing Song
, Shui Yu
:
Reinforcement-Learning-Based Offloading for RIS-Aided Cloud-Edge Computing in IoT Networks: Modeling, Analysis, and Optimization. IEEE Internet Things J. 11(11): 19421-19439 (2024) - [j436]Wanning He
, Xin-Lin Huang
, Zhongwei Xu
, Fei Hu
, Shui Yu
:
Robust Localization for Mobile Targets Along a Narrow Path With LoS/NLoS Interference. IEEE Internet Things J. 11(11): 20853-20866 (2024) - [j435]Yizhou Shen
, Carlton Shepherd
, Chuadhry Mujeeb Ahmed
, Shui Yu
, Tingting Li
:
Comparative DQN-Improved Algorithms for Stochastic Games-Based Automated Edge Intelligence-Enabled IoT Malware Spread-Suppression Strategies. IEEE Internet Things J. 11(12): 22550-22561 (2024) - [j434]Shigen Shen
, Chenpeng Cai, Yizhou Shen
, Xiaoping Wu
, Wenlong Ke
, Shui Yu
:
MFGD3QN: Enhancing Edge Intelligence Defense Against DDoS With Mean-Field Games and Dueling Double Deep Q-Network. IEEE Internet Things J. 11(13): 23931-23945 (2024) - [j433]Shoujian Yu
, Xuan Wang
, Yizhou Shen
, Guowen Wu
, Shui Yu
, Shigen Shen
:
Novel Intrusion Detection Strategies With Optimal Hyper Parameters for Industrial Internet of Things Based on Stochastic Games and Double Deep Q-Networks. IEEE Internet Things J. 11(17): 29132-29145 (2024) - [j432]Yueqin Ge
, Yali Gao
, Xiaoyong Li
, Binsi Cai, Jinwen Xi
, Shui Yu
:
EMTD-SSC: An Enhanced Malicious Traffic Detection Model Using Transfer Learning Under Small Sample Conditions in IoT. IEEE Internet Things J. 11(19): 30725-30741 (2024) - [j431]Hanwen Zhang, Supeng Leng
, Hongbo Yin
, Shui Yu
:
Intelligent Consensus Enhanced Spectrum Sharing in Heterogeneous Wireless Networks. IEEE Internet Things J. 11(19): 30939-30952 (2024) - [j430]Ming Zhou
, Zhen Yang, Haiyang Yu, Shui Yu
:
VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain. J. Netw. Comput. Appl. 223: 103814 (2024) - [j429]Guowen Wu
, Xihang Chen, Zhengjun Gao, Hong Zhang, Shui Yu
, Shigen Shen
:
Privacy-preserving offloading scheme in multi-access mobile edge computing based on MADRL. J. Parallel Distributed Comput. 183: 104775 (2024) - [j428]Peiying Zhang
, Ning Chen
, Shigen Shen
, Shui Yu
, Neeraj Kumar
, Ching-Hsien Hsu
:
AI-Enabled Space-Air-Ground Integrated Networks: Management and Optimization. IEEE Netw. 38(2): 186-192 (2024) - [j427]Zhiyi Tian
, Hiep Khac Vo
, Chenhan Zhang
, Geyong Min
, Shui Yu
:
An Asynchronous Multi-Task Semantic Communication Method. IEEE Netw. 38(4): 275-283 (2024) - [j426]Haomiao Yang
, Kunlan Xiang
, Mengyu Ge, Hongwei Li
, Rongxing Lu
, Shui Yu
:
A Comprehensive Overview of Backdoor Attacks in Large Language Models Within Communication Networks. IEEE Netw. 38(6): 211-218 (2024) - [j425]Lihong Cao, Rong Zeng, Sancheng Peng
, Aimin Yang, Jianwei Niu, Shui Yu:
Textual emotion classification using MPNet and cascading broad learning. Neural Networks 179: 106582 (2024) - [j424]Yinzhi Lu
, Guofeng Zhao
, Chuan Xu
, Shui Yu
:
An Efficient Hypergraph-Based Routing Algorithm in Time-Sensitive Networks. IEEE Signal Process. Lett. 31: 835-839 (2024) - [j423]Weibei Fan
, Fu Xiao
, Mengjie Lv
, Lei Han
, Shui Yu
:
Efficient Fault-Tolerant Path Embedding for 3D Torus Network Using Locally Faulty Blocks. IEEE Trans. Computers 73(9): 2305-2319 (2024) - [j422]Yongkai Fan
, Binyuan Xu
, Linlin Zhang
, Gang Tan
, Shui Yu
, Kuan-Ching Li
, Albert Y. Zomaya
:
psvCNN: A Zero-Knowledge CNN Prediction Integrity Verification Strategy. IEEE Trans. Cloud Comput. 12(2): 359-369 (2024) - [j421]Lang Fan
, Xiaoning Zhang
, Yangming Zhao
, Keshav Sood
, Shui Yu
:
Online Training Flow Scheduling for Geo-Distributed Machine Learning Jobs Over Heterogeneous and Dynamic Networks. IEEE Trans. Cogn. Commun. Netw. 10(1): 277-291 (2024) - [j420]Yutao Liu
, Xiaoning Zhang
, Zhihao Zeng
, Shui Yu
:
FedEco: Achieving Energy-Efficient Federated Learning by Hyperparameter Adaptive Tuning. IEEE Trans. Cogn. Commun. Netw. 10(6): 2311-2324 (2024) - [j419]Haiming Liang
, Weijun Xu, Francisco Chiclana
, Shui Yu
, Yucheng Dong
, Enrique Herrera-Viedma
:
Evolution of Credit Scores of Enterprises in a Social Network: A Perspective Based on Opinion Dynamics. IEEE Trans. Comput. Soc. Syst. 11(3): 3637-3651 (2024) - [j418]Caiqin Dong
, Jian Weng
, Ming Li
, Jia-Nan Liu
, Zhiquan Liu
, Yudan Cheng
, Shui Yu
:
Privacy-Preserving and Byzantine-Robust Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(2): 889-904 (2024) - [j417]Shuaishuai Tan
, Shui Yu
, Wenyin Liu
, Daojing He
, Sammy Chan
:
You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted. IEEE Trans. Dependable Secur. Comput. 21(3): 1210-1223 (2024) - [j416]Yuan Gao
, Liquan Chen
, Jinguang Han
, Shui Yu
, Huiyu Fang
:
Similarity-Based Secure Deduplication for IIoT Cloud Management System. IEEE Trans. Dependable Secur. Comput. 21(4): 2242-2256 (2024) - [j415]Zhiyi Tian
, Lei Cui
, Chenhan Zhang
, Shuaishuai Tan
, Shui Yu
, Yonghong Tian
:
The Role of Class Information in Model Inversion Attacks Against Image Deep Learning Classifiers. IEEE Trans. Dependable Secur. Comput. 21(4): 2407-2420 (2024) - [j414]Yipeng Zhou
, Runze Wang
, Jiahao Liu
, Di Wu
, Shui Yu
, Yonggang Wen
:
Exploring the Practicality of Differentially Private Federated Learning: A Local Iteration Tuning Approach. IEEE Trans. Dependable Secur. Comput. 21(4): 3280-3294 (2024) - [j413]Dinh Duc Nha Nguyen
, Keshav Sood
, Yong Xiang
, Longxiang Gao
, Lianhua Chi
, Gurpreet Singh
, Shui Yu
:
Design and Robust Evaluation of Next Generation Node Authentication Approach. IEEE Trans. Dependable Secur. Comput. 21(6): 5311-5323 (2024) - [j412]Song Gao
, Xiaoxuan Wang
, Bingbing Song
, Renyang Liu
, Shaowen Yao
, Wei Zhou
, Shui Yu
:
Exploiting Type I Adversarial Examples to Hide Data Information: A New Privacy-Preserving Approach. IEEE Trans. Emerg. Top. Comput. Intell. 8(3): 2518-2528 (2024) - [j411]Weiqi Wang
, Chenhan Zhang
, Zhiyi Tian
, Shui Yu
:
Machine Unlearning via Representation Forgetting With Parameter Self-Sharing. IEEE Trans. Inf. Forensics Secur. 19: 1099-1111 (2024) - [j410]Jiale Zhang
, Chengcheng Zhu, Xiaobing Sun
, Chunpeng Ge
, Bing Chen
, Willy Susilo
, Shui Yu
:
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training. IEEE Trans. Inf. Forensics Secur. 19: 4752-4766 (2024) - [j409]Wenshu Fan
, Hongwei Li
, Wenbo Jiang
, Meng Hao
, Shui Yu
, Xiao Zhang
:
Stealthy Targeted Backdoor Attacks Against Image Captioning. IEEE Trans. Inf. Forensics Secur. 19: 5655-5667 (2024) - [j408]Yuyang Zhou
, Guang Cheng
, Shui Yu
, Zongyao Chen
, Yujia Hu
:
MTDroid: A Moving Target Defense-Based Android Malware Detector Against Evasion Attacks. IEEE Trans. Inf. Forensics Secur. 19: 6377-6392 (2024) - [j407]Chenhan Zhang
, Weiqi Wang
, Zhiyi Tian
, Shui Yu
:
Forgetting and Remembering Are Both You Need: Balanced Graph Structure Unlearning. IEEE Trans. Inf. Forensics Secur. 19: 6751-6763 (2024) - [j406]Haiyang Yu
, Hui Zhang, Zhen Yang
, Shui Yu
:
Edasvic: Enabling Efficient and Dynamic Storage Verification for Clouds of Industrial Internet Platforms. IEEE Trans. Inf. Forensics Secur. 19: 6896-6909 (2024) - [j405]Yizhou Shen
, Carlton Shepherd
, Chuadhry Mujeeb Ahmed
, Shigen Shen
, Shui Yu
:
SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-Networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of Things. IEEE Trans. Inf. Forensics Secur. 19: 6978-6990 (2024) - [j404]Ximing Li
, Linghui Li
, Xiaoyong Li
, Binsi Cai
, Jia Jia
, Yali Gao
, Shui Yu
:
GMFITD: Graph Meta-Learning for Effective Few-Shot Insider Threat Detection. IEEE Trans. Inf. Forensics Secur. 19: 7161-7175 (2024) - [j403]Tao Peng
, Wentao Zhong
, Guojun Wang, Entao Luo
, Shui Yu
, Yi-Ning Liu
, Yi Yang, Xuyun Zhang
:
Privacy-Preserving Truth Discovery Based on Secure Multi-Party Computation in Vehicle-Based Mobile Crowdsensing. IEEE Trans. Intell. Transp. Syst. 25(7): 7767-7779 (2024) - [j402]Chunlin Li
, Yong Zhang, Jianyang Wu, Youlong Luo, Shui Yu
:
Smart Contract-Based Decentralized Data Sharing and Content Delivery for Intelligent Connected Vehicles in Edge Computing. IEEE Trans. Intell. Transp. Syst. 25(10): 14535-14545 (2024) - [j401]Guorui Li
, Pengfei Xu
, Sancheng Peng
, Cong Wang
, Yi Cai
, Shui Yu
:
TTSR: Tensor-Train Subspace Representation Method for Visual Domain Adaptation. IEEE Trans. Knowl. Data Eng. 36(11): 7229-7241 (2024) - [j400]Yingkun Wen
, Lei Liu
, Junhuai Li
, Yilan Li, Kan Wang
, Shui Yu
, Mohsen Guizani
:
Covert Communications Aided by Cooperative Jamming in Overlay Cognitive Radio Networks. IEEE Trans. Mob. Comput. 23(12): 12878-12891 (2024) - [j399]Guowen Wu
, Hui Wang
, Hong Zhang
, Yizhou Shen
, Shigen Shen
, Shui Yu
:
Mean-Field Game-Based Task-Offloaded Load Balance for Industrial Mobile Edge Computing Systems Using Software-Defined Networking. IEEE Trans. Mob. Comput. 23(12): 13773-13786 (2024) - [j398]Yunxue Huang
, Bohao Feng
, Aleteng Tian
, Ping Dong
, Shui Yu
, Hongke Zhang
:
An Efficient Differentiated Routing Scheme for MEO/LEO-Based Multi-Layer Satellite Networks. IEEE Trans. Netw. Sci. Eng. 11(1): 1026-1041 (2024) - [j397]Ruijie Zhu
, Wenchao Zhang
, Peisen Wang
, Jianrui Chen
, Jingjing Wang
, Shui Yu
:
Energy-Efficient Graph Reinforced vNFC Deployment in Elastic Optical Inter-DC Networks. IEEE Trans. Netw. Sci. Eng. 11(2): 1591-1604 (2024) - [j396]Yuming Zhang, Bohao Feng
, Aleteng Tian, Shui Yu
, Hongke Zhang
:
Task Offloading Control and Customized Workload Scheduling in Multi-Layer Cloud Networks. IEEE Trans. Netw. Serv. Manag. 21(1): 714-728 (2024) - [j395]Zhenzhen Han
, Guofeng Zhao
, Yu Hu, Chuan Xu
, Kefei Cheng
, Shui Yu
:
Dynamic Bond Percolation-Based Reliable Topology Evolution Model for Dynamic Networks. IEEE Trans. Netw. Serv. Manag. 21(4): 4197-4212 (2024) - [j394]Shigen Shen
, Xuanbin Hao, Zhengjun Gao, Guowen Wu
, Yizhou Shen
, Hong Zhang
, Qiying Cao
, Shui Yu
:
SAC-PP: Jointly Optimizing Privacy Protection and Computation Offloading for Mobile Edge Computing. IEEE Trans. Netw. Serv. Manag. 21(6): 6190-6203 (2024) - [j393]Yuntao Wang
, Zhou Su
, Yanghe Pan
, Tom H. Luan
, Ruidong Li
, Shui Yu
:
Social-Aware Clustered Federated Learning With Customized Privacy Preservation. IEEE/ACM Trans. Netw. 32(5): 3654-3668 (2024) - [j392]Youyang Qu
, Shui Yu
, Longxiang Gao
, Keshav Sood
, Yong Xiang
:
Blockchained Dual-Asynchronous Federated Learning Services for Digital Twin Empowered Edge-Cloud Continuum. IEEE Trans. Serv. Comput. 17(3): 836-849 (2024) - [j391]Youshui Lu
, Bowen Cai
, Xiaojun Tang, Lei Liu
, Jun Du
, Shui Yu
, Mohammed Atiquzzaman
, Schahram Dustdar
:
Tree-ORAP: A Tree-Based Oblivious Random-Access Protocol for Privacy-Protected Blockchain. IEEE Trans. Serv. Comput. 17(3): 1252-1264 (2024) - [j390]Huajie Chen
, Tianqing Zhu
, Chi Liu
, Shui Yu
, Wanlei Zhou
:
High-Frequency Matters: Attack and Defense for Image-Processing Model Watermarking. IEEE Trans. Serv. Comput. 17(4): 1565-1579 (2024) - [j389]Haiyang Yu
, Yurun Chen, Zhen Yang
, Yuwen Chen
, Shui Yu
:
EDCOMA: Enabling Efficient Double Compressed Auditing for Blockchain-Based Decentralized Storage. IEEE Trans. Serv. Comput. 17(5): 2273-2286 (2024) - [j388]Linchang Xiao
, Xianzhi Zhang
, Di Wu
, Miao Hu
, Yipeng Zhou
, Shui Yu
:
History-Aware Privacy Budget Allocation for Model Training on Evolving Data-Sharing Platforms. IEEE Trans. Serv. Comput. 17(6): 3773-3788 (2024) - [j387]Kangkang Sun
, Jun Wu
, Qianqian Pan
, Xi Zheng
, Jianhua Li
, Shui Yu
:
Leveraging Digital Twin and DRL for Collaborative Context Offloading in C-V2X Autonomous Driving. IEEE Trans. Veh. Technol. 73(4): 5020-5035 (2024) - [j386]Yunxue Huang
, Dong Yang
, Bohao Feng
, Aleteng Tian
, Ping Dong
, Shui Yu
, Hongke Zhang
:
A GNN-Enabled Multipath Routing Algorithm for Spatial-Temporal Varying LEO Satellite Networks. IEEE Trans. Veh. Technol. 73(4): 5454-5468 (2024) - [j385]Wanning He
, Xin-Lin Huang
, Zhongwei Xu
, Fei Hu
, Shui Yu
:
Adaptive Anchor Deployment for Diverse Demands on Localization Precision. IEEE Trans. Veh. Technol. 73(12): 19480-19494 (2024) - [j384]Jianfeng Liu
, Xin-Lin Huang
, Shui Yu
:
Constant Wideband Compressive Spectrum Sensing With Cascade Forward-Backward Propagating and Prior Knowledge Refining. IEEE Trans. Wirel. Commun. 23(3): 1855-1870 (2024) - [j383]Jing Wang, Chenhao Qi
, Shui Yu
, Shiwen Mao
:
Joint Beamforming and Illumination Pattern Design for Beam-Hopping LEO Satellite Communications. IEEE Trans. Wirel. Commun. 23(12): 18940-18950 (2024) - [j382]Peiying Zhang, Ning Chen
, Shigen Shen
, Shui Yu
, Sheng Wu, Neeraj Kumar:
Future Quantum Communications and Networking: A Review and Vision. IEEE Wirel. Commun. 31(1): 141-148 (2024) - [j381]Chenhan Zhang, Zhiyi Tian, Weiqi Wang, Shui Yu:
Semantic Communications Toward Graph Data. IEEE Wirel. Commun. 31(6): 178-185 (2024) - [c207]Mingjian Tang
, Weiqi Wang
, Shui Yu
:
OPMUS: A Win-Win Pricing Strategy for Machine Unlearning Service. ADMA (1) 2024: 386-400 - [c206]Ye Li, Jiale Zhang, Yanchao Zhao, Bing Chen, Shui Yu:
Fairness-Aware Federated Learning Framework on Heterogeneous Data Distributions. ICC 2024: 728-733 - [c205]Jiabin Pei, Xiaoming Wu, Xiangzhi Liu, Longxiang Gao, Shui Yu, Xi Zheng:
SGD-YOLOv5: A Small Object Detection Model for Complex Industrial Environments. IJCNN 2024: 1-10 - [c204]Aleteng Tian, Bohao Feng, Yunxue Huang, Huachun Zhou, Shui Yu, Hongke Zhang:
DRL-Based Two-Stage SFC Deployment Approach Under Latency Constraints. INFOCOM (Workshops) 2024: 1-6 - [c203]Ahmed Asiri, Weiqi Wang, Feng Wu, Hiep Vo, Shui Yu:
FedXAI for Detecting DDoS on IoT Edge Networks in Federated Learning. ITNAC 2024: 1-6 - [i35]Yakun Chen, Kaize Shi, Zhangkai Wu, Juan Chen, Xianzhi Wang, Julian J. McAuley, Guandong Xu, Shui Yu:
A Temporally Disentangled Contrastive Diffusion Model for Spatiotemporal Imputation. CoRR abs/2402.11558 (2024) - [i34]Weiqi Wang, Zhiyi Tian, Shui Yu:
Machine Unlearning: A Comprehensive Survey. CoRR abs/2405.07406 (2024) - [i33]Xuhan Zuo, Minghao Wang, Tianqing Zhu, Lefeng Zhang, Shui Yu, Wanlei Zhou:
Federated Learning with Blockchain-Enhanced Machine Unlearning: A Trustworthy Approach. CoRR abs/2405.20776 (2024) - [i32]Feng Wu, Lei Cui, Shaowen Yao, Shui Yu:
Inference Attacks: A Taxonomy, Survey, and Promising Directions. CoRR abs/2406.02027 (2024) - [i31]Xuhan Zuo, Minghao Wang, Tianqing Zhu, Lefeng Zhang, Dayong Ye, Shui Yu, Wanlei Zhou:
Federated TrustChain: Blockchain-Enhanced LLM Training and Unlearning. CoRR abs/2406.04076 (2024) - [i30]Wenshu Fan, Hongwei Li, Wenbo Jiang, Meng Hao, Shui Yu, Xiao Zhang:
Stealthy Targeted Backdoor Attacks against Image Captioning. CoRR abs/2406.05874 (2024) - [i29]Tao Wu, Canyixing Cui, Xingping Xian, Shaojie Qiao, Chao Wang, Lin Yuan, Shui Yu:
Explainable AI Security: Exploring Robustness of Graph Neural Networks to Adversarial Attacks. CoRR abs/2406.13920 (2024) - [i28]Wenbo Jiang, Rui Zhang, Hongwei Li, Xiaoyuan Liu, Haomiao Yang, Shui Yu:
DDFAD: Dataset Distillation Framework for Audio Data. CoRR abs/2407.10446 (2024) - [i27]Jing Wang, Chenhao Qi, Shui Yu, Shiwen Mao:
Joint Beamforming and Illumination Pattern Design for Beam-Hopping LEO Satellite Communications. CoRR abs/2409.10127 (2024) - [i26]Chenhan Zhang, Weiqi Wang, Zhiyi Tian, James Jianqiao Yu, Mohamed Ali Kâafar, An Liu, Shui Yu:
Can Self Supervision Rejuvenate Similarity-Based Link Prediction? CoRR abs/2410.19183 (2024) - [i25]Mengmeng Yang, Tianqing Zhu, Chi Liu, Wanlei Zhou, Shui Yu, Philip S. Yu:
New Emerged Security and Privacy of Pre-trained Model: a Survey and Outlook. CoRR abs/2411.07691 (2024) - [i24]Xuhan Zuo, Minghao Wang, Tianqing Zhu, Shui Yu, Wanlei Zhou:
Large Language Model Federated Learning with Blockchain and Unlearning for Cross-Organizational Collaboration. CoRR abs/2412.13551 (2024) - [i23]Yichen Li, Haozhao Wang, Wenchao Xu, Tianzhe Xiao, Hong Liu, Minzhu Tu, Yuying Wang, Xin Yang, Rui Zhang, Shui Yu, Song Guo, Ruixuan Li:
Unleashing the Power of Continual Learning on Non-Centralized Devices: A Survey. CoRR abs/2412.13840 (2024) - 2023
- [b7]Shui Yu
, Lei Cui:
Security and Privacy in Federated Learning. Springer 2023, ISBN 978-981-19-8691-8, pp. 1-122 - [b6]Ting Wang
, Bo Li
, Mingsong Chen, Shui Yu
:
Machine Learning Empowered Intelligent Data Center Networking - Evolution, Challenges and Opportunities. Springer Briefs in Computer Science, Springer 2023, ISBN 978-981-19-7394-9, pp. 1-109 - [j380]Youyang Qu, Lichuan Ma, Wenjie Ye, Xuemeng Zhai, Shui Yu
, Yunfeng Li, David B. Smith:
Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence. Big Data Min. Anal. 6(4): 443-464 (2023) - [j379]Xiaozhen Lu
, Liang Xiao
, Pengmin Li
, Xiangyang Ji
, Chenren Xu
, Shui Yu
, Weihua Zhuang
:
Reinforcement Learning-Based Physical Cross-Layer Security and Privacy in 6G. IEEE Commun. Surv. Tutorials 25(1): 425-466 (2023) - [j378]Meng Shen
, Ke Ye, Xingtong Liu, Liehuang Zhu
, Jiawen Kang
, Shui Yu
, Qi Li
, Ke Xu
:
Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 25(1): 791-824 (2023) - [j377]Qiang Duan
, Jun Huang
, Shijing Hu, Ruijun Deng, Zhihui Lu
, Shui Yu
:
Combining Federated Learning and Edge Computing Toward Ubiquitous Intelligence in 6G Network: Challenges, Recent Advances, and Future Directions. IEEE Commun. Surv. Tutorials 25(4): 2892-2950 (2023) - [j376]Zhiyi Tian
, Lei Cui
, Jie Liang
, Shui Yu
:
A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning. ACM Comput. Surv. 55(8): 166:1-166:35 (2023) - [j375]Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi
, Lina Lan, Shui Yu
, Jinqiao Shi, Zhaofeng Ma:
An efficient confidentiality protection solution for pub/sub system. Cybersecur. 6(1): 34 (2023) - [j374]Jiale Zhang
, Yue Liu
, Di Wu
, Shuai Lou, Bing Chen
, Shui Yu
:
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems. Digit. Commun. Networks 9(4): 981-989 (2023) - [j373]Shigen Shen
, Xiaoping Wu, Pan Jun Sun
, Haiping Zhou, Zongda Wu, Shui Yu
:
Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems. Expert Syst. Appl. 225: 120192 (2023) - [j372]Guorui Li
, Yajun Wu
, Cong Wang
, Sancheng Peng
, Jianwei Niu
, Shui Yu
:
The SRVM: A Similarity-Based Relevance Vector Machine for Remaining Useful Lifetime Prediction in the Industrial Internet of Things. IEEE Intell. Syst. 38(5): 45-55 (2023) - [j371]Xiaowei Tang
, Yi Huang
, Yunmei Shi, Xin-Lin Huang
, Shui Yu
:
UAV Placement for VR Reconstruction: A Tradeoff Between Resolution and Delay. IEEE Commun. Lett. 27(5): 1382-1386 (2023) - [j370]Lei Song, Hongbin Wang, Guoyin Zhang, Shui Yu
:
FedInf: Social influence prediction with federated learning. Neurocomputing 548: 126407 (2023) - [j369]Chenhan Zhang
, Shuyu Zhang
, Xiexin Zou
, Shui Yu
, James J. Q. Yu
:
Toward Large-Scale Graph-Based Traffic Forecasting: A Data-Driven Network Partitioning Approach. IEEE Internet Things J. 10(5): 4506-4519 (2023) - [j368]Kaiyue Zhang
, Zipei Fan
, Xuan Song
, Shui Yu
:
Enhancing Trajectory Recovery From Gradients via Mobility Prior Knowledge. IEEE Internet Things J. 10(6, March 15): 5583-5594 (2023) - [j367]Tian Liu
, Jun Xia
, Zhiwei Ling, Xin Fu, Shui Yu
, Mingsong Chen
:
Efficient Federated Learning for AIoT Applications Using Knowledge Distillation. IEEE Internet Things J. 10(8, April 15): 7229-7243 (2023) - [j366]Minghao Wang, Tianqing Zhu
, Xuhan Zuo
, Mengmeng Yang, Shui Yu
, Wanlei Zhou:
Differentially Private Crowdsourcing With the Public and Private Blockchain. IEEE Internet Things J. 10(10): 8918-8930 (2023) - [j365]Dinh Duc Nha Nguyen
, Keshav Sood
, Yong Xiang
, Longxiang Gao
, Lianhua Chi
, Shui Yu
:
Toward IoT Node Authentication Mechanism in Next Generation Networks. IEEE Internet Things J. 10(15): 13333-13341 (2023) - [j364]Qihao Dong
, Xu Zheng, Anmin Fu
, Mang Su
, Lei Zhou
, Shui Yu
:
DMRA: Model Usability Detection Scheme Against Model-Reuse Attacks in the Internet of Things. IEEE Internet Things J. 10(19): 16907-16916 (2023) - [j363]Jiwei Guan
, Lei Pan
, Chen Wang
, Shui Yu
, Longxiang Gao
, Xi Zheng
:
Trustworthy Sensor Fusion Against Inaudible Command Attacks in Advanced Driver-Assistance Systems. IEEE Internet Things J. 10(19): 17254-17264 (2023) - [j362]Guowen Wu
, Hui Wang, Hong Zhang, Yuhan Zhao, Shui Yu
, Shigen Shen
:
Computation Offloading Method Using Stochastic Games for Software-Defined-Network-Based Multiagent Mobile Edge Computing. IEEE Internet Things J. 10(20): 17620-17634 (2023) - [j361]Shuaishuai Tan
, Wenyin Liu
, Qingkuan Dong, Sammy Chan
, Shui Yu
, Xiaoxiong Zhong
, Daojing He
:
Hitting Moving Targets: Intelligent Prevention of IoT Intrusions on the Fly. IEEE Internet Things J. 10(23): 21000-21012 (2023) - [j360]Leilei Wang
, Xiaoheng Deng
, Jinsong Gui
, Honggang Zhang, Shui Yu
:
Computation Placement Orchestrator for Mobile-Edge Computing in Heterogeneous Vehicular Networks. IEEE Internet Things J. 10(24): 22686-22702 (2023) - [j359]Keshav Sood, Dinh Duc Nha Nguyen, Youyang Qu, Lei Cui, Kallol Krishna Karmakar, Shui Yu
:
Security Challenges and Potential Solutions in Aerial-Terrestrial Wireless Networking. IEEE Internet Things Mag. 6(4): 118-123 (2023) - [j358]Guowen Wu, Lanlan Xie
, Hong Zhang, Jianhua Wang, Shigen Shen
, Shui Yu
:
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things. J. Netw. Comput. Appl. 214: 103608 (2023) - [j357]Guowen Wu
, Zhiqi Xu, Hong Zhang, Shigen Shen
, Shui Yu
:
Multi-agent DRL for joint completion delay and energy consumption with queuing theory in MEC-based IIoT. J. Parallel Distributed Comput. 176: 80-94 (2023) - [j356]Shuiqiao Yang
, Sunny Verma, Borui Cai
, Jiaojiao Jiang, Kun Yu, Fang Chen, Shui Yu
:
Variational co-embedding learning for attributed network clustering. Knowl. Based Syst. 270: 110530 (2023) - [j355]Zhe Ye
, Diqun Yan
, Li Dong
, Jiacheng Deng
, Shui Yu
:
Stealthy Backdoor Attack Against Speaker Recognition Using Phase-Injection Hidden Trigger. IEEE Signal Process. Lett. 30: 1057-1061 (2023) - [j354]Tongke Cui, Ruopeng Yang, Chao Fang
, Shui Yu
:
Deep Reinforcement Learning-Based Resource Allocation for Content Distribution in IoT-Edge-Cloud Computing Environments. Symmetry 15(1): 217 (2023) - [j353]Weibei Fan
, Fu Xiao
, Hui Cai
, Xiaobai Chen
, Shui Yu
:
Disjoint Paths Construction and Fault-Tolerant Routing in BCube of Data Center Networks. IEEE Trans. Computers 72(9): 2467-2481 (2023) - [j352]Chenyu Fan
, Xiaoning Zhang
, Yangming Zhao
, Yutao Liu
, Shui Yu
:
Self-Adaptive Gradient Quantization for Geo-Distributed Machine Learning Over Heterogeneous and Dynamic Networks. IEEE Trans. Cloud Comput. 11(4): 3483-3496 (2023) - [j351]Zhaogang Ding
, Xia Chen
, Yucheng Dong
, Shui Yu
, Francisco Herrera
:
Consensus Convergence Speed in Social Network DeGroot Model: The Effects of the Agents With High Self-Confidence Levels. IEEE Trans. Comput. Soc. Syst. 10(5): 2882-2892 (2023) - [j350]Mohammad Reza Nosouhi
, Shui Yu
, Keshav Sood
, Marthie Grobler
, Raja Jurdak
, Ali Dorri
, Shigen Shen
:
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies. IEEE Trans. Dependable Secur. Comput. 20(1): 242-255 (2023) - [j349]Keshav Sood
, Mohammad Reza Nosouhi
, Neeraj Kumar
, Anuroop Gaddam, Bohao Feng
, Shui Yu
:
Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios. IEEE Trans. Dependable Secur. Comput. 20(1): 288-300 (2023) - [j348]Yong Wang
, Aiqing Zhang
, Shu Wu, Shui Yu
:
VOSA: Verifiable and Oblivious Secure Aggregation for Privacy-Preserving Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(5): 3601-3616 (2023) - [j347]Zan Zhou
, Changqiao Xu
, Ming-Ze Wang, Xiaohui Kuang, Yirong Zhuang, Shui Yu
:
A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(5): 4230-4244 (2023) - [j346]Lei Zhou
, Anmin Fu
, Guomin Yang
, Yansong Gao
, Shui Yu
, Robert H. Deng
:
Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices. IEEE Trans. Dependable Secur. Comput. 20(5): 4325-4342 (2023) - [j345]Yipeng Zhou
, Xuezheng Liu
, Yao Fu, Di Wu
, Jessie Hui Wang
, Shui Yu
:
Optimizing the Numbers of Queries and Replies in Convex Federated Learning With Differential Privacy. IEEE Trans. Dependable Secur. Comput. 20(6): 4823-4837 (2023) - [j344]Song Gao
, Ruxin Wang
, Xiaoxuan Wang, Shui Yu
, Yunyun Dong, Shaowen Yao
, Wei Zhou
:
Detecting Adversarial Examples on Deep Neural Networks With Mutual Information Neural Estimation. IEEE Trans. Dependable Secur. Comput. 20(6): 5168-5181 (2023) - [j343]Zhuangzhuang Zhang
, Libing Wu, Chuanguo Ma, Jianxin Li
, Jing Wang, Qian Wang
, Shui Yu
:
LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing. IEEE Trans. Inf. Forensics Secur. 18: 365-379 (2023) - [j342]Ximing Li
, Xiaoyong Li
, Jia Jia
, Linghui Li, Jie Yuan
, Yali Gao, Shui Yu
:
A High Accuracy and Adaptive Anomaly Detection Model With Dual-Domain Graph Convolutional Network for Insider Threat Detection. IEEE Trans. Inf. Forensics Secur. 18: 1638-1652 (2023) - [j341]Shigen Shen
, Lanlan Xie, Yanchun Zhang, Guowen Wu
, Hong Zhang, Shui Yu
:
Joint Differential Game and Double Deep Q-Networks for Suppressing Malware Spread in Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 18: 5302-5315 (2023) - [j340]Zixuan Wang
, Jiliang Li
, Yuntao Wang, Zhou Su
, Shui Yu
, Weizhi Meng
:
Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks. IEEE Trans. Inf. Forensics Secur. 18: 5964-5979 (2023) - [j339]Laizhong Cui
, Jiating Ma
, Yipeng Zhou
, Shui Yu
:
Boosting Accuracy of Differentially Private Federated Learning in Industrial IoT With Sparse Responses. IEEE Trans. Ind. Informatics 19(1): 910-920 (2023) - [j338]Chenhan Zhang
, Shiyao Zhang
, James J. Q. Yu
, Shui Yu
:
SAM: Query-efficient Adversarial Attacks against Graph Neural Networks. ACM Trans. Priv. Secur. 26(4): 49:1-49:19 (2023) - [j337]Peng Guo, Qi Liu, Shui Yu
, Jianyu Xiong
, Xiang Tan, Chao Guo:
A transformer with layer-cross decoding for remaining useful life prediction. J. Supercomput. 79(10): 11558-11584 (2023) - [j336]Mingyue Zhang
, Junlong Zhou
, Gongxuan Zhang
, Lei Cui
, Tian Gao, Shui Yu
:
APDP: Attribute-Based Personalized Differential Privacy Data Publishing Scheme for Social Networks. IEEE Trans. Netw. Sci. Eng. 10(2): 922-933 (2023) - [j335]Aleteng Tian, Bohao Feng
, Huachun Zhou, Yunxue Huang, Keshav Sood
, Shui Yu
, Hongke Zhang
:
Efficient Federated DRL-Based Cooperative Caching for Mobile Edge Networks. IEEE Trans. Netw. Serv. Manag. 20(1): 246-260 (2023) - [j334]Yucheng Dong
, Qin Ran
, Xiangrui Chao
, Congcong Li
, Shui Yu
:
Personalized Individual Semantics Learning to Support a Large-Scale Linguistic Consensus Process. ACM Trans. Internet Techn. 23(2): 26:1-26:27 (2023) - [j333]Decai Li
, Mian Zhang
, Tianbo Kang, Yue Ma, Hongbiao Xiang
, Shui Yu
, Kesheng Wang
:
Frequency Energy Ratio Cell Based Operational Security Domain Analysis of Planetary Gearbox. IEEE Trans. Reliab. 72(1): 49-60 (2023) - [j332]Zhenzhen Han
, Chuan Xu
, Guofeng Zhao
, Shanshan Wang, Kefei Cheng
, Shui Yu
:
Time-Varying Topology Model for Dynamic Routing in LEO Satellite Constellation Networks. IEEE Trans. Veh. Technol. 72(3): 3440-3454 (2023) - [j331]Yutao Liu
, Xiaoning Zhang
, Yangming Zhao
, Yexiao He
, Shui Yu
, Kainan Zhu
:
Chronos: Accelerating Federated Learning With Resource Aware Training Volume Tuning at Network Edges. IEEE Trans. Veh. Technol. 72(3): 3889-3903 (2023) - [j330]Yuepeng Li
, Deze Zeng
, Lin Gu
, Andong Zhu
, Quan Chen
, Shui Yu
:
PASTO: Enabling Secure and Efficient Task Offloading in TrustZone-Enabled Edge Clouds. IEEE Trans. Veh. Technol. 72(6): 8234-8238 (2023) - [j329]Youxiang Duan
, Yuxi Lu
, Shigen Shen
, Shui Yu
, Peiying Zhang
, Wei Zhang
, Kostromitin Konstantin Igorevich
:
NFLCS: An Service Function Chain Path Optimization Strategy Based on Network-Functional Layout Clustering. IEEE Trans. Veh. Technol. 72(8): 10813-10825 (2023) - [j328]Zhenzhen Han
, Chuan Xu
, Shiwei Ma
, Yu Hu, Guofeng Zhao
, Shui Yu
:
DTE-RR: Dynamic Topology Evolution-Based Reliable Routing in VANET. IEEE Wirel. Commun. Lett. 12(6): 1061-1065 (2023) - [c202]Chenhan Zhang
, Weiqi Wang
, James J. Q. Yu
, Shui Yu
:
Extracting Privacy-Preserving Subgraphs in Federated Graph Learning using Information Bottleneck. AsiaCCS 2023: 109-121 - [c201]Weiqi Wang
, Zhiyi Tian
, Chenhan Zhang
, An Liu
, Shui Yu
:
BFU: Bayesian Federated Unlearning with Parameter Self-Sharing. AsiaCCS 2023: 567-578 - [c200]Fahao Chen, Peng Li, Shui Yu:
Efficient Giant Graph Unlearning via Push-Pull Tuning. ISPA/BDCloud/SocialCom/SustainCom 2023: 900-907 - [c199]Youxingzhu Deng, Yipeng Zhou
, Gang Liu, Jessie Hui Wang, Shui Yu:
Enhancing Federated Learning by One-Shot Transferring of Intermediate Features from Clients. DSAA 2023: 1-11 - [c198]Kaiyue Zhang, Weiqi Wang, Zipei Fan, Xuan Song, Shui Yu
:
Conditional Matching GAN Guided Reconstruction Attack in Machine Unlearning. GLOBECOM 2023: 44-49 - [c197]Jing Wang, Chenhao Qi, Shui Yu
:
Hybrid Beamforming Design for Beam-Hopping LEO Satellite Communications. GLOBECOM 2023: 3959-3964 - [c196]Weiqi Wang, Shushu Liu, Chenhan Zhang, Mingjian Tang, Feng Wu, Shui Yu
:
CP-FL: Practical Gradient Leakage Defense in Federated Learning with Compressive Privacy. GLOBECOM 2023: 5165-5170 - [c195]Chenhan Zhang, Zhiyi Tian, James J. Q. Yu, Shui Yu
:
Construct New Graphs Using Information Bottleneck Against Property Inference Attacks. ICC 2023: 765-770 - [c194]Hao Wu, Guofeng Zhao, Shanshan Wang, Chuan Xu, Shui Yu
:
A Location Privacy and Query Privacy Joint Protection Scheme for POI Query in Vehicular Networks. ICC 2023: 2294-2299 - [c193]Weiqi Wang
, Chenhan Zhang, Shushu Liu, Mingjian Tang, An Liu, Shui Yu
:
FedMC: Federated Learning with Mode Connectivity Against Distributed Backdoor Attacks. ICC 2023: 4873-4878 - [c192]Sicheng Zhang, Jie Liu, Zliida Bao, Shui Yu
, Yun Lin:
Adversarial Domain Generalization Defense for Automatic Modulation Classification. ICCC 2023: 1-6 - [c191]Haoran Zha, Wenyan Wang, Shui Yu, Yun Lin:
SEI-DM: Crafting Revolutionary RF Signals in Low-Resource Settings via Diffusion Model. ICCT 2023: 890-895 - [c190]Zhiyi Tian, Chenhan Zhang, Keshav Sood, Shui Yu
:
Inferring Private Data from AI Models in Metaverse through Black-box Model Inversion Attacks. MetaCom 2023: 49-56 - [c189]Mingjian Tang, Weiqi Wang, Chenhan Zhang, Shui Yu:
RUE: Realising Unlearning from the Perspective of Economics. TrustCom 2023: 1165-1172 - [e2]Shui Yu
, Bruce Gu
, Youyang Qu
, Xiaodong Wang
:
Tools for Design, Implementation and Verification of Emerging Information Technologies - 17th EAI International Conference, TridentCom 2022, Melbourne, Australia, November 23-25, 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 489, Springer 2023, ISBN 978-3-031-33457-3 [contents] - [i22]Huajie Chen, Tianqing Zhu, Chi Liu
, Shui Yu, Wanlei Zhou:
High-frequency Matters: An Overwriting Attack and defense for Image-processing Neural Network Watermarking. CoRR abs/2302.08637 (2023) - [i21]Jiahao Tan, Yipeng Zhou, Gang Liu, Jessie Hui Wang, Shui Yu:
pFedSim: Similarity-Aware Model Aggregation Towards Personalized Federated Learning. CoRR abs/2305.15706 (2023) - [i20]Jiwei Guan, Lei Pan, Chen Wang, Shui Yu, Longxiang Gao, Xi Zheng:
Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced Driver-Assistance System. CoRR abs/2306.05358 (2023) - [i19]Youyang Qu, Lichuan Ma, Wenjie Ye, Xuemeng Zhai, Shui Yu, Yunfeng Li, David B. Smith:
Towards Blockchain-Assisted Privacy-Aware Data Sharing For Edge Intelligence: A Smart Healthcare Perspective. CoRR abs/2306.16630 (2023) - [i18]Zixuan Wang, Jiliang Li, Yuntao Wang, Zhou Su, Shui Yu, Weizhi Meng:
Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks. CoRR abs/2309.00251 (2023) - [i17]Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu:
MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks. CoRR abs/2312.06423 (2023) - [i16]Gang Xu, Shiyuan Xu, Yibo Cao, Ke Xiao, Xiu-Bo Chen, Mianxiong Dong, Shui Yu:
AAQ-PEKS: An Attribute-based Anti-Quantum Public-Key Encryption Scheme with Keyword Search for E-healthcare Scenarios. IACR Cryptol. ePrint Arch. 2023: 349 (2023) - 2022
- [b5]Youyang Qu
, Longxiang Gao
, Shui Yu
, Yong Xiang:
Privacy Preservation in IoT: Machine Learning Approaches - A Comprehensive Survey and Use Cases. Springer Briefs in Computer Science, Springer 2022, ISBN 978-981-19-1796-7, pp. 1-119 - [j327]Guangrui Liu, Weizhe Zhang, Xinjie Li, Kaisheng Fan, Shui Yu
:
VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems. Sci. China Inf. Sci. 65(7): 1-19 (2022) - [j326]Yexiao He
, Xiaoning Zhang, Zixiang Xia, Yutao Liu, Keshav Sood
, Shui Yu
:
Joint optimization of Service Chain Graph Design and Mapping in NFV-enabled networks. Comput. Networks 202: 108626 (2022) - [j325]Boyu Kuang, Anmin Fu
, Willy Susilo
, Shui Yu
, Yansong Gao:
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects. Comput. Secur. 112: 102498 (2022) - [j324]Ying Zhao, Junjun Chen
, Jiale Zhang
, Di Wu
, Michael Blumenstein, Shui Yu
:
Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j323]Changzheng Liu, Fengling Huang, Ruixuan Li, Qi Yang
, Yuhua Li, Shui Yu
:
Community detection using multitopology and attributes in social networks. Concurr. Comput. Pract. Exp. 34(12) (2022) - [j322]Sancheng Peng, Lihong Cao, Yongmei Zhou, Zhouhao Ouyang, Aimin Yang, Xinguang Li
, Weijia Jia, Shui Yu
:
A survey on deep learning for textual emotion analysis in social networks. Digit. Commun. Networks 8(5): 745-762 (2022) - [j321]Do Bao Son
, Ta Huu Binh, Hiep Khac Vo, Binh Minh Nguyen, Huynh Thi Thanh Binh
, Shui Yu
:
Value-based reinforcement learning approaches for task offloading in Delay Constrained Vehicular Edge Computing. Eng. Appl. Artif. Intell. 113: 104898 (2022) - [j320]Nguyen Thi My Binh
, Nguyen Hong Ngoc
, Huynh Thi Thanh Binh
, Nguyen Khanh Van, Shui Yu
:
A family system based evolutionary algorithm for obstacle-evasion minimal exposure path problem in Internet of Things. Expert Syst. Appl. 200: 116943 (2022) - [j319]Razaullah Khan
, Xiaofeng Tao, Adeel Anjum, Saif Ur Rehman Malik
, Shui Yu
, Abid Khan, Waheed ur Rehman, Hassan Malik:
(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility. Trans. Emerg. Telecommun. Technol. 33(6) (2022) - [j318]Kaiyue Zhang, Xuan Song, Chenhan Zhang, Shui Yu
:
Challenges and future directions of secure federated learning: a survey. Frontiers Comput. Sci. 16(5): 165817 (2022) - [j317]Song Gao
, Shui Yu
, Liwen Wu, Shaowen Yao, Xiaowei Zhou:
Detecting adversarial examples by additional evidence from noise domain. IET Image Process. 16(2): 378-392 (2022) - [j316]Hu Xiong
, Tianang Yao
, Hanxiao Wang, Jun Feng, Shui Yu
:
A Survey of Public-Key Encryption With Search Functionality for Cloud-Assisted IoT. IEEE Internet Things J. 9(1): 401-418 (2022) - [j315]Hu Xiong
, Xin Huang
, Minghao Yang, Lili Wang, Shui Yu
:
Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things. IEEE Internet Things J. 9(4): 3097-3111 (2022) - [j314]Jianhua Liu
, Xin Wang
, Shigen Shen
, Zhaoxi Fang
, Shui Yu
, Guangxue Yue, Minglu Li:
Intelligent Jamming Defense Using DNN Stackelberg Game in Sensor Edge Cloud. IEEE Internet Things J. 9(6): 4356-4370 (2022) - [j313]Hao Wang
, Shuai Ding
, Shanlin Yang
, Chenguang Liu
, Shui Yu
, Xi Zheng
:
Guided Activity Prediction for Minimally Invasive Surgery Safety Improvement in the Internet of Medical Things. IEEE Internet Things J. 9(6): 4758-4768 (2022) - [j312]Binsi Cai
, Xiaoyong Li
, Wenping Kong
, Jie Yuan
, Shui Yu
:
A Reliable and Lightweight Trust Inference Model for Service Recommendation in SIoT. IEEE Internet Things J. 9(13): 10988-11003 (2022) - [j311]Chenhan Zhang
, Yuanshao Zhu
, Christos Markos
, Shui Yu
, James J. Q. Yu
:
Toward Crowdsourced Transportation Mode Identification: A Semisupervised Federated Learning Approach. IEEE Internet Things J. 9(14): 11868-11882 (2022) - [j310]Chenhan Zhang
, Lei Cui
, Shui Yu
, James J. Q. Yu
:
A Communication-Efficient Federated Learning Scheme for IoT-Based Traffic Forecasting. IEEE Internet Things J. 9(14): 11918-11931 (2022) - [j309]Yong Wang
, Aiqing Zhang
, Peiyun Zhang, Youyang Qu
, Shui Yu
:
Security-Aware and Privacy-Preserving Personal Health Record Sharing Using Consortium Blockchain. IEEE Internet Things J. 9(14): 12014-12028 (2022) - [j308]Bohao Feng
, Aleteng Tian
, Shui Yu
, Jack Li
, Huachun Zhou, Hongke Zhang
:
Efficient Cache Consistency Management for Transient IoT Data in Content-Centric Networking. IEEE Internet Things J. 9(15): 12931-12944 (2022) - [j307]Wenping Kong
, Xiaoyong Li
, Liyang Hou
, Jie Yuan
, Yali Gao
, Shui Yu
:
A Reliable and Efficient Task Offloading Strategy Based on Multifeedback Trust Mechanism for IoT Edge Computing. IEEE Internet Things J. 9(15): 13927-13941 (2022) - [j306]Yijin Chen
, Ye Su
, Mingyue Zhang
, Haoye Chai
, Yunkai Wei
, Shui Yu
:
FedTor: An Anonymous Framework of Federated Learning in Internet of Things. IEEE Internet Things J. 9(19): 18620-18631 (2022) - [j305]Siguo Bi
, Juntao Cui, Wei Ni
, Yi Jiang
, Shui Yu
, Xin Wang
:
Three-Dimensional Cooperative Positioning for Internet of Things Provenance. IEEE Internet Things J. 9(20): 19945-19958 (2022) - [j304]Cong Wang
, Weicheng Lu
, Sancheng Peng
, Youyang Qu
, Guojun Wang
, Shui Yu
:
Modeling on Energy-Efficiency Computation Offloading Using Probabilistic Action Generating. IEEE Internet Things J. 9(20): 20681-20692 (2022) - [j303]Ruijie Zhu
, Gong Li
, Peisen Wang, Mingliang Xu
, Shui Yu
:
DRL-Based Deadline-Driven Advance Reservation Allocation in EONs for Cloud-Edge Computing. IEEE Internet Things J. 9(21): 21444-21457 (2022) - [j302]Shiyan Hu
, Shui Yu
, Hai Li, Vincenzo Piuri:
Guest Editorial Special Issue on Security, Privacy, and Trustworthiness in Intelligent Cyber-Physical Systems and Internet of Things. IEEE Internet Things J. 9(22): 22044-22047 (2022) - [j301]Youyang Qu, Chenhao Xu
, Longxiang Gao, Yong Xiang, Shui Yu
:
FL-SEC: Privacy-Preserving Decentralized Federated Learning Using SignSGD for the Internet of Artificially Intelligent Things. IEEE Internet Things Mag. 5(1): 85-90 (2022) - [j300]Li Yang, Cheng Li, Yuting Cheng, Shui Yu
, Jianfeng Ma:
Achieving privacy-preserving sensitive attributes for large universe based on private set intersection. Inf. Sci. 582: 529-546 (2022) - [j299]Yipeng Zhou
, Jun Liu, Jessie Hui Wang, Jilong Wang, Guanfeng Liu
, Di Wu, Chao Li, Shui Yu
:
USST: A two-phase privacy-preserving framework for personalized recommendation with semi-distributed training. Inf. Sci. 606: 688-701 (2022) - [j298]Cheng Li, Li Yang, Shui Yu
, Wenjing Qin, Jian Feng Ma:
SEMMI: Multi-party security decision-making scheme for linear functions in the internet of medical things. Inf. Sci. 612: 151-167 (2022) - [j297]Yizhou Shen
, Shigen Shen
, Zongda Wu, Haiping Zhou
, Shui Yu
:
Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination. J. Inf. Secur. Appl. 66: 103140 (2022) - [j296]Yang Wang, Xiong Wang, Shizhong Xu, Ci He, Yasheng Zhang, Jing Ren, Shui Yu
:
FlexMon: A flexible and fine-grained traffic monitor for programmable networks. J. Netw. Comput. Appl. 201: 103344 (2022) - [j295]Mingze Ni, Ce Wang, Tianqing Zhu, Shui Yu
, Wei Liu
:
Attacking neural machine translations via hybrid attention learning. Mach. Learn. 111(11): 3977-4002 (2022) - [j294]Zheng Yan, Laurence T. Yang, Tieyan Li, Yoan Miche, Shui Yu
, Stephen S. Yau:
Guest Editorial: Trust, Security and Privacy of 6G. IEEE Netw. 36(4): 100-102 (2022) - [j293]Daojing He
, Xin Lv, Xueqian Xu, Shui Yu
, Dawei Li, Sammy Chan, Mohsen Guizani:
An Effective Double-Layer Detection System Against Social Engineering Attacks. IEEE Netw. 36(6): 92-98 (2022) - [j292]Youyang Qu
, Longxiang Gao, Yong Xiang, Shigen Shen
, Shui Yu
:
FedTwin: Blockchain-Enabled Adaptive Asynchronous Federated Learning for Digital Twin Networks. IEEE Netw. 36(6): 183-190 (2022) - [j291]Enting Guo
, Peng Li
, Shui Yu
, Hao Wang
:
Efficient Video Privacy Protection Against Malicious Face Recognition Models. IEEE Open J. Comput. Soc. 3: 271-280 (2022) - [j290]Tao Wu
, Hongyu Ma, Chao Wang, Shaojie Qiao
, Liang Zhang, Shui Yu
:
Heterogeneous representation learning and matching for few-shot relation prediction. Pattern Recognit. 131: 108830 (2022) - [j289]Anmin Fu
, Shui Yu
, Yuqing Zhang
, Huaqun Wang
, Chanying Huang:
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users. IEEE Trans. Big Data 8(1): 14-24 (2022) - [j288]Qichao Xu
, Zhou Su
, Shui Yu
, Ying Wang
:
Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud. IEEE Trans. Big Data 8(1): 113-124 (2022) - [j287]Haipeng Yao
, Chong Liu, Peiying Zhang
, Sheng Wu
, Chunxiao Jiang
, Shui Yu
:
Identification of Encrypted Traffic Through Attention Mechanism Based Long Short Term Memory. IEEE Trans. Big Data 8(1): 241-252 (2022) - [j286]Guanglei Li
, Huachun Zhou, Bohao Feng
, Yuming Zhang
, Shui Yu
:
Efficient Provision of Service Function Chains in Overlay Networks Using Reinforcement Learning. IEEE Trans. Cloud Comput. 10(1): 383-395 (2022) - [j285]Xiaoning Zhang
, Zhichao Xu, Lang Fan, Shui Yu
, Youyang Qu
:
Near-Optimal Energy-Efficient Algorithm for Virtual Network Function Placement. IEEE Trans. Cloud Comput. 10(1): 553-567 (2022) - [j284]Longxia Huang
, Junlong Zhou
, Gongxuan Zhang, Jin Sun
, Tongquan Wei
, Shui Yu
, Shiyan Hu
:
IPANM: Incentive Public Auditing Scheme for Non-Manager Groups in Clouds. IEEE Trans. Dependable Secur. Comput. 19(2): 936-952 (2022) - [j283]Zhijian Shao
, Jian Weng
, Yue Zhang
, Yongdong Wu
, Ming Li
, Jiasi Weng
, Weiqi Luo
, Shui Yu
:
Peripheral-Free Device Pairing by Randomly Switching Power. IEEE Trans. Dependable Secur. Comput. 19(6): 4240-4254 (2022) - [j282]Meiyan Xiao
, Hongbo Li, Qiong Huang
, Shui Yu
, Willy Susilo
:
Attribute-Based Hierarchical Access Control With Extendable Policy. IEEE Trans. Inf. Forensics Secur. 17: 1868-1883 (2022) - [j281]Zhenzhu Chen
, Shang Wang, Anmin Fu
, Yansong Gao
, Shui Yu
, Robert H. Deng
:
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check. IEEE Trans. Inf. Forensics Secur. 17: 2000-2014 (2022) - [j280]Lei Cui
, Youyang Qu
, Gang Xie
, Deze Zeng
, Ruidong Li
, Shigen Shen
, Shui Yu
:
Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures. IEEE Trans. Ind. Informatics 18(5): 3492-3500 (2022) - [j279]Lei Cui
, Lei Guo
, Longxiang Gao
, Borui Cai
, Youyang Qu
, Yipeng Zhou
, Shui Yu
:
A Covert Electricity-Theft Cyberattack Against Machine Learning-Based Detection Models. IEEE Trans. Ind. Informatics 18(11): 7824-7833 (2022) - [j278]Guorui Li
, Guang Guo, Sancheng Peng
, Cong Wang
, Shui Yu
, Jianwei Niu
, Jianli Mo:
Matrix Completion via Schatten Capped $p$p Norm. IEEE Trans. Knowl. Data Eng. 34(1): 394-404 (2022) - [j277]Linqing Gui, Shuwen Xu, Fu Xiao
, Feng Shu
, Shui Yu
:
Non-Line-of-Sight Localization of Passive UHF RFID Tags in Smart Storage Systems. IEEE Trans. Mob. Comput. 21(10): 3731-3743 (2022) - [j276]Jian Shen
, Tiantian Miao, Jin-Feng Lai
, Xiaofeng Chen
, Jin Li
, Shui Yu
:
IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems. IEEE Trans. Serv. Comput. 15(3): 1707-1719 (2022) - [j275]Weizhe Zhang
, Desheng Wang
, Shui Yu
, Hui He
, Yan Wang
:
Repeatable Multi-Dimensional Virtual Network Embedding in Cloud Service Platform. IEEE Trans. Serv. Comput. 15(6): 3499-3512 (2022) - [j274]Yifan Dong, Songtao Guo
, Quyuan Wang
, Shui Yu
, Yuanyuan Yang
:
Content Caching-Enhanced Computation Offloading in Mobile Edge Service Networks. IEEE Trans. Veh. Technol. 71(1): 872-886 (2022) - [j273]Yipeng Zhou
, Yao Fu, Zhenxiao Luo
, Miao Hu, Di Wu
, Quan Z. Sheng
, Shui Yu
:
The Role of Communication Time in the Convergence of Federated Edge Learning. IEEE Trans. Veh. Technol. 71(3): 3241-3254 (2022) - [j272]Zhengxin Guo, Fu Xiao
, Biyun Sheng
, Lijuan Sun, Shui Yu
:
TWCC: A Robust Through-the-Wall Crowd Counting System Using Ambient WiFi Signals. IEEE Trans. Veh. Technol. 71(4): 4198-4211 (2022) - [j271]Youxiang Duan
, Ning Chen
, Shigen Shen
, Peiying Zhang
, Youyang Qu
, Shui Yu
:
FDSA-STG: Fully Dynamic Self-Attention Spatio-Temporal Graph Networks for Intelligent Traffic Flow Prediction. IEEE Trans. Veh. Technol. 71(9): 9250-9260 (2022) - [j270]Qichao Xu
, Zhou Su
, Rongxing Lu
, Shui Yu
:
Ubiquitous Transmission Service: Hierarchical Wireless Data Rate Provisioning in Space-Air-Ocean Integrated Networks. IEEE Trans. Wirel. Commun. 21(9): 7821-7836 (2022) - [j269]Fei Song, Letian Li, Ilsun You, Shui Yu
, Hongke Zhang:
Optimizing High-Speed Mobile Networks with Smart Collaborative Theory. IEEE Wirel. Commun. 29(3): 48-54 (2022) - [j268]Bohao Feng
, Yunxue Huang, Aleteng Tian, Hongchao Wang, Huachun Zhou, Shui Yu
, Hongke Zhang:
DR-SDSN: An Elastic Differentiated Routing Framework for Software-Defined Satellite Networks. IEEE Wirel. Commun. 29(6): 80-86 (2022) - [c188]Yanchao Sun, Yuanfeng Han, Yue Zhang, Mingsong Chen, Shui Yu
, Yimin Xu:
DDoS Attack Detection Combining Time Series-based Multi-dimensional Sketch and Machine Learning. APNOMS 2022: 1-6 - [c187]Zhiyi Tian, Chenhan Zhang, Lei Cui, Shui Yu
:
GSMI: A Gradient Sign Optimization Based Model Inversion Method. AI 2022: 67-78 - [c186]Yonghao Wang, Shui Yu, Yongxin Zhu:
Message from the Program Chairs BigDataSecurity 2022. BigDataSecurity/HPSC/IDS 2022: 1 - [c185]Chenhao Xu
, Youyang Qu
, Yong Xiang, Longxiang Gao, David Smith, Shui Yu
:
BASS: Blockchain-Based Asynchronous SignSGD for Robust Collaborative Data Mining. DSAA 2022: 1-7 - [c184]Guowen Wu
, Zhenwei Li, Yizhou Shen, Hong Zhang, Shigen Shen
, Shui Yu
:
A Deep Reinforcement Learning Approach to Edge-based IDS Packets Sampling. DSIT 2022: 1-6 - [c183]Weiqi Wang, Shushu Liu, An Liu, Christy Jie Liang, Shui Yu
:
Locally Random Sampling for Practical Privacy Protection in Federated Learning. GLOBECOM 2022: 528-533 - [c182]Shanshan Wang, Guofeng Zhao, Chuan Xu, Zhenzhen Han, Shui Yu
:
A NTRU-Based Access Authentication Scheme for Satellite Terrestrial Integrated Network. GLOBECOM 2022: 3629-3634 - [c181]Yuan Xing, Guofeng Zhao, Chuan Xu, Kefei Cheng, Shui Yu
:
The Converged Scheduling for Time Sensitive Mission in Satellite Formation Flying. GLOBECOM 2022: 4691-4696 - [c180]Sicheng Zhang, Jiangzhi Fu, Zherui Zhang, Shui Yu
, Shiwen Mao, Yun Lin:
Maximum Focal Inter-Class Angular Loss with Norm Constraint for Automatic Modulation Classification. GLOBECOM 2022: 5323-5328 - [c179]Cheng Li, Li Yang, Shui Yu
, Wenjing Qin, Jianfeng Ma:
SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things. ICC 2022: 2792-2797 - [c178]Youyang Qu
, Shiping Chen, Longxiang Gao, Lei Cui, Keshav Sood
, Shui Yu
:
Personalized Privacy-Preserving Medical Data Sharing for Blockchain-based Smart Healthcare Networks. ICC 2022: 4229-4234 - [c177]Guowen Wu
, Yuhan Zhao, Yizhou Shen, Hong Zhang, Shigen Shen
, Shui Yu
:
DRL-based Resource Allocation Optimization for Computation Offloading in Mobile Edge Computing. INFOCOM Workshops 2022: 1-6 - [c176]Hiep Khac Vo, Mingjian Tang, James Xi Zheng
, Shui Yu
:
BI-GAN: batch inversion membership inference attack on federated learning. MobiArch 2022: 31-36 - [c175]Shaolong Guo, Zhou Su, Zhiyi Tian, Shui Yu
:
Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck. TrustCom 2022: 680-686 - [c174]Yunxue Huang, Bohao Feng
, Ping Dong, Aleteng Tian, Shui Yu
:
A Multi-objective based Inter-Layer Link Allocation Scheme for MEO/LEO Satellite Networks. WCNC 2022: 1301-1306 - [c173]Chenhan Zhang, Shiyao Zhang, Shui Yu
, James J. Q. Yu:
Graph-Based Traffic Forecasting via Communication-Efficient Federated Learning. WCNC 2022: 2041-2046 - [c172]Xiaotong Wu
, Lianyong Qi, Xiaolong Xu, Shui Yu
, Wanchun Dou, Xuyun Zhang
:
Crowdsourcing-based Multi-Device Communication Cooperation for Mobile High-Quality Video Enhancement. WSDM 2022: 1140-1148 - [i15]Bo Li, Ting Wang, Peng Yang, Mingsong Chen, Shui Yu, Mounir Hamdi:
Machine Learning Empowered Intelligent Data Center Networking: A Survey. CoRR abs/2202.13549 (2022) - [i14]Yuntao Wang, Zhou Su, Yanghe Pan, Tom H. Luan, Ruidong Li
, Shui Yu:
Social-Aware Clustered Federated Learning with Customized Privacy Preservation. CoRR abs/2212.13992 (2022) - 2021
- [b4]Youyang Qu
, Mohammad Reza Nosouhi
, Lei Cui
, Shui Yu
:
Personalized Privacy Protection in Big Data. Springer 2021, ISBN 978-981-16-3749-0, pp. 1-139 - [j267]Xiaochun Cheng
, Zheli Liu, Xiaojiang Du, Shui Yu
, Leonardo Mostarda:
IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments. IEEE Access 9: 68880-68887 (2021) - [j266]Junjun Chen, Di Wu
, Ying Zhao, Nabin Sharma, Michael Blumenstein, Shui Yu
:
Fooling intrusion detection systems using adversarially autoencoder. Digit. Commun. Networks 7(3): 453-460 (2021) - [j265]Liuyang Mai, Yi Ding, Xiaoning Zhang, Lang Fan, Shui Yu
, Zhichao Xu:
Energy efficiency with service availability guarantee for Network Function Virtualization. Future Gener. Comput. Syst. 119: 140-153 (2021) - [j264]Yanxia Lv, Fangna Wei, Lihong Cao, Sancheng Peng, Jianwei Niu, Shui Yu
, Cuirong Wang:
Aspect-level sentiment analysis using context and aspect memory network. Neurocomputing 428: 195-205 (2021) - [j263]Jiale Zhang
, Bing Chen
, Xiang Cheng, Huynh Thi Thanh Binh
, Shui Yu
:
PoisonGAN: Generative Poisoning Attacks Against Federated Learning in Edge Computing Systems. IEEE Internet Things J. 8(5): 3310-3322 (2021) - [j262]Yilin Xiao
, Liang Xiao
, Xiaozhen Lu
, Hailu Zhang
, Shui Yu
, H. Vincent Poor
:
Deep-Reinforcement-Learning-Based User Profile Perturbation for Privacy-Aware Recommendation. IEEE Internet Things J. 8(6): 4560-4568 (2021) - [j261]Fan Wang
, Min Zhu, Maoli Wang
, Mohammad Reza Khosravi
, Qiang Ni
, Shui Yu
, Lianyong Qi
:
6G-Enabled Short-Term Forecasting for Large-Scale Traffic Flow in Massive IoT Based on Time-Aware Locality-Sensitive Hashing. IEEE Internet Things J. 8(7): 5321-5331 (2021) - [j260]Jianhua Liu
, Xin Wang
, Shigen Shen
, Guangxue Yue, Shui Yu
, Minglu Li:
A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud. IEEE Internet Things J. 8(9): 7546-7561 (2021) - [j259]Jin Zhang
, Bo Wei
, Fuxiang Wu
, Limeng Dong
, Wen Hu
, Salil S. Kanhere
, Chengwen Luo
, Shui Yu
, Jun Cheng
:
Gate-ID: WiFi-Based Human Identification Irrespective of Walking Directions in Smart Home. IEEE Internet Things J. 8(9): 7610-7624 (2021) - [j258]Ruijie Zhu
, Shihua Li
, Peisen Wang, Mingliang Xu
, Shui Yu
:
Energy-Efficient Deep Reinforced Traffic Grooming in Elastic Optical Networks for Cloud-Fog Computing. IEEE Internet Things J. 8(15): 12410-12421 (2021) - [j257]Changqiao Xu
, Tao Zhang
, Xiaohui Kuang, Zan Zhou, Shui Yu
:
Context-Aware Adaptive Route Mutation Scheme: A Reinforcement Learning Approach. IEEE Internet Things J. 8(17): 13528-13541 (2021) - [j256]Qichao Xu
, Zhou Su
, Kuan Zhang, Shui Yu
:
Fast Containment of Infectious Diseases With E-Healthcare Mobile Social Internet of Things. IEEE Internet Things J. 8(22): 16473-16485 (2021) - [j255]Keshav Sood
, Shui Yu
, Dinh Duc Nha Nguyen
, Yong Xiang, Bohao Feng, Xiaoning Zhang:
A Tutorial on Next Generation Heterogeneous IoT Networks and Node Authentication. IEEE Internet Things Mag. 4(4): 120-126 (2021) - [j254]Lei Zhou
, Anmin Fu
, Yi Mu
, Huaqun Wang, Shui Yu
, Yinxia Sun:
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system. Inf. Sci. 545: 254-276 (2021) - [j253]Lei Zhou, Entao Luo, Guojun Wang, Shui Yu
:
Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks. Inf. Sci. 554: 15-32 (2021) - [j252]Yingling Dai, Jian Weng
, Anjia Yang, Shui Yu
, Robert H. Deng
:
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing. KSII Trans. Internet Inf. Syst. 15(8): 2827-2848 (2021) - [j251]Ruijie Zhu
, Aretor Samuel, Peisen Wang, Shihua Li, Bounsou Kham Oun, Lulu Li, Pei Lv, Mingliang Xu, Shui Yu
:
Protected Resource Allocation in Space Division Multiplexing-Elastic Optical Networks with Fluctuating Traffic. J. Netw. Comput. Appl. 174: 102887 (2021) - [j250]Sheng Feng, Haiyan Shi, Longjun Huang, Shigen Shen
, Shui Yu
, Hua Peng
, Chengdong Wu:
Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot. J. Netw. Comput. Appl. 182: 103053 (2021) - [j249]Xiaozheng Xie, Jianwei Niu
, Xuefeng Liu
, Zhengsu Chen, Shaojie Tang, Shui Yu
:
A survey on incorporating domain knowledge into deep learning for medical image analysis. Medical Image Anal. 69: 101985 (2021) - [j248]Keshav Sood
, Kallol Krishna Karmakar
, Vijay Varadharajen, Neeraj Kumar
, Yong Xiang, Shui Yu
:
Plug-in over Plug-in Evaluation in Heterogeneous 5G Enabled Networks and Beyond. IEEE Netw. 35(2): 34-39 (2021) - [j247]Minghui Dai, Zhou Su, Ruidong Li
, Shui Yu
:
A Software-Defined-Networking-Enabled Approach for Edge-Cloud Computing in the Internet of Things. IEEE Netw. 35(5): 66-73 (2021) - [j246]Bohao Feng
, Huachun Zhou, Guanglei Li, Yuming Zhang, Keshav Sood
, Shui Yu
:
Enabling Machine Learning with Service Function Chaining for Security Enhancement at 5G Edges. IEEE Netw. 35(5): 196-201 (2021) - [j245]Si Chen
, Anmin Fu
, Shui Yu
, Haifeng Ke, Mang Su:
DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publication. Soft Comput. 25(11): 7325-7339 (2021) - [j244]Chenwang Zheng
, Dan Tao
, Jiangtao Wang
, Lei Cui
, Wenjie Ruan, Shui Yu
:
Memory Augmented Hierarchical Attention Network for Next Point-of-Interest Recommendation. IEEE Trans. Comput. Soc. Syst. 8(2): 489-499 (2021) - [j243]Chenhan Zhang
, Qingpeng Zhang
, Shui Yu
, James J. Q. Yu
, Xiaozhuang Song
:
Complicating the Social Networks for Better Storytelling: An Empirical Study of Chinese Historical Text and Novel. IEEE Trans. Comput. Soc. Syst. 8(3): 754-767 (2021) - [j242]Yuyang Zhou
, Guang Cheng
, Shui Yu
:
An SDN-Enabled Proactive Defense Framework for DDoS Mitigation in IoT Networks. IEEE Trans. Inf. Forensics Secur. 16: 5366-5380 (2021) - [j241]Chenhan Zhang
, Shuyu Zhang
, James J. Q. Yu
, Shui Yu
:
FASTGNN: A Topological Information Protected Federated Learning Approach for Traffic Speed Forecasting. IEEE Trans. Ind. Informatics 17(12): 8464-8474 (2021) - [j240]Youyang Qu
, Shui Yu
, Wanlei Zhou
, Shiping Chen
, Jun Wu:
Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks. IEEE Trans. Netw. Sci. Eng. 8(1): 269-281 (2021) - [j239]Zhenzhen Han
, Chuan Xu
, Zhengying Xiong
, Guofeng Zhao
, Shui Yu
:
On-Demand Dynamic Controller Placement in Software Defined Satellite-Terrestrial Networking. IEEE Trans. Netw. Serv. Manag. 18(3): 2915-2928 (2021) - [j238]Lianyong Qi
, Houbing Song
, Xuyun Zhang
, Gautam Srivastava
, Xiaolong Xu
, Shui Yu
:
Compatibility-Aware Web API Recommendation for Mashup Creation via Textual Description Mining. ACM Trans. Multim. Comput. Commun. Appl. 17(1s): 20:1-20:19 (2021) - [j237]Weibei Fan
, Fu Xiao
, Xiaobai Chen
, Lei Cui
, Shui Yu
:
Efficient Virtual Network Embedding of Cloud-Based Data Center Networks into Optical Networks. IEEE Trans. Parallel Distributed Syst. 32(11): 2793-2808 (2021) - [j236]Changqiao Xu
, Liang Zhu
, Yang Liu
, Jianfeng Guan
, Shui Yu
:
DP-LTOD: Differential Privacy Latent Trajectory Community Discovering Services over Location-Based Social Networks. IEEE Trans. Serv. Comput. 14(4): 1068-1083 (2021) - [j235]Binbin Jin
, Enhong Chen
, Hongke Zhao
, Zhenya Huang
, Qi Liu
, Hengshu Zhu
, Shui Yu
:
Promotion of Answer Value Measurement With Domain Effects in Community Question Answering Systems. IEEE Trans. Syst. Man Cybern. Syst. 51(5): 3068-3079 (2021) - [j234]Anqi Zhu
, Mingfang Ma, Songtao Guo
, Shui Yu
, Lin Yi:
Adaptive Multi-Access Algorithm for Multi-Service Edge Users in 5G Ultra-Dense Heterogeneous Networks. IEEE Trans. Veh. Technol. 70(3): 2807-2821 (2021) - [j233]Jianchao Lu
, Xi Zheng
, Lihong Tang
, Tianyi Zhang, Quan Z. Sheng
, Chen Wang
, Jiong Jin
, Shui Yu
, Wanlei Zhou
:
Can Steering Wheel Detect Your Driving Fatigue? IEEE Trans. Veh. Technol. 70(6): 5537-5550 (2021) - [j232]Hao Tian, Xiaolong Xu
, Lianyong Qi
, Xuyun Zhang
, Wanchun Dou
, Shui Yu
, Qiang Ni
:
CoPace: Edge Computation Offloading and Caching for Self-Driving With Deep Reinforcement Learning. IEEE Trans. Veh. Technol. 70(12): 13281-13293 (2021) - [c171]Sancheng Peng, Rong Zeng, Hongzhan Liu, Guanghao Chen, Ruihuan Wu, Aimin Yang, Shui Yu
:
Emotion Classification of Text Based on BERT and Broad Learning System. APWeb/WAIM (1) 2021: 382-396 - [c170]Zan Zhou, Changqiao Xu, Ming-Ze Wang, Tengchao Ma, Shui Yu
:
Augmented Dual-Shuffle-based Moving Target Defense to Ensure CIA-triad in Federated Learning. GLOBECOM 2021: 1-6 - [c169]Zhenzhen Han, Guofeng Zhao, Yuan Xing, Nanbin Sun, Chuan Xu, Shui Yu
:
Dynamic Routing for Software-Defined LEO Satellite Networks based on ISL Attributes. GLOBECOM 2021: 1-6 - [c168]Zhenzhen Han, Chuan Xu, Kun Liu, Le Yu, Guofeng Zhao, Shui Yu
:
A Novel Mobile Core Network Architecture for Satellite-Terrestrial Integrated Network. GLOBECOM 2021: 1-6 - [c167]Jing Lin, Chenhan Zhang, Shui Yu
:
Safeguard the Original Data in Federated Learning via Data Decomposition. GLOBECOM 2021: 1-6 - [c166]Ting Wang
, Jiawei Mao, Mingsong Chen, Gang Liu, Jieming Di, Shui Yu
:
ICE: Intelligent Caching at the Edge. GLOBECOM 2021: 1-6 - [c165]Feng Wu, Lei Cui, Jianan Feng
, Liwen Wu, Shaowen Yao, Shui Yu
:
Data Privacy Protection based on Feature Dilution in Cloud Services. GLOBECOM 2021: 1-6 - [c164]Siqi Yin, Caihong Liu, Yi Xie, Shui Yu:
A Review on the Research of Producer Services Supply Chain in China. HCI (35) 2021: 126-137 - [c163]Ziye Geng, Yunhua He, Chao Wang, Gang Xu, Ke Xiao, Shui Yu
:
A Blockchain based Privacy-Preserving Reputation Scheme for Cloud Service. ICC 2021: 1-6 - [c162]Jianhua Li
, Ximeng Liu, Jiong Jin, Shui Yu
:
Too Expensive to Attack: Enlarge the Attack Expense through Joint Defense at the Edge. TrustCom 2021: 524-531 - [c161]Shuaishuai Tan, Zhiyi Tian, Xiaoxiong Zhong, Shui Yu
, Weizhe Zhang, Guozhong Dong:
A Novel Android Malware Detection Method Based on Visible User Interface. TrustCom 2021: 659-666 - [c160]Jibo Shi, Yun Lin, Zherui Zhang, Shui Yu
:
A Hybrid Intrusion Detection System Based on Machine Learning under Differential Privacy Protection. VTC Fall 2021: 1-6 - [i13]Yao Fu, Yipeng Zhou, Di Wu, Shui Yu, Yonggang Wen, Chao Li:
On the Practicality of Differential Privacy in Federated Learning by Tuning Iteration Times. CoRR abs/2101.04163 (2021) - [i12]Jianhua Li
, Ximeng Liu, Jiong Jin, Shui Yu:
Too Expensive to Attack: A Joint Defense Framework to Mitigate Distributed Attacks for the Internet of Things Grid. CoRR abs/2104.00236 (2021) - [i11]Shuiqiao Yang, Sunny Verma, Borui Cai, Jiaojiao Jiang, Kun Yu, Fang Chen, Shui Yu:
Variational Co-embedding Learning for Attributed Network Clustering. CoRR abs/2104.07295 (2021) - [i10]Jianhua Li, Ximeng Liu, Jiong Jin, Shui Yu:
Too Expensive to Attack: Enlarge the Attack Expense through Joint Defense at the Edge. CoRR abs/2107.01382 (2021) - [i9]Yipeng Zhou, Xuezheng Liu, Yao Fu, Di Wu, Chao Li, Shui Yu:
Optimizing the Numbers of Queries and Replies in Federated Learning with Differential Privacy. CoRR abs/2107.01895 (2021) - [i8]Xiaotong Wu, Lianyong Qi, Xiaolong Xu, Shui Yu, Wanchun Dou, Xuyun Zhang:
Crowdsourcing-based Multi-Device Communication Cooperation for Mobile High-Quality Video Enhancement. CoRR abs/2111.14364 (2021) - 2020
- [j231]Yijin Chen
, Yuming Mao
, Haoyang Liang
, Shui Yu
, Yunkai Wei
, Supeng Leng
:
Data Poison Detection Schemes for Distributed Machine Learning. IEEE Access 8: 7442-7454 (2020) - [j230]Longxia Huang
, Gongxuan Zhang, Shui Yu
:
A Data Storage and Sharing Scheme for Cyber-Physical-Social Systems. IEEE Access 8: 31471-31480 (2020) - [j229]Chi-Yuan Chen
, Wei Quan, Nan Cheng, Shui Yu
, Jong-Hyouk Lee, Gregorio Martínez Pérez, Hongke Zhang, Shiuhpyng Shieh:
IEEE Access Special Section Editorial: Artificial Intelligence in Cybersecurity. IEEE Access 8: 163329-163333 (2020) - [j228]Nguyen Thi My Binh, Huynh Thi Thanh Binh, Nguyen Van Linh, Shui Yu
:
Efficient meta-heuristic approaches in solving minimal exposure path problem for heterogeneous wireless multimedia sensor networks in internet of things. Appl. Intell. 50(6): 1889-1907 (2020) - [j227]Thi Tam Nguyen, Dinh Anh Dung, Tran Huy Hung, Huynh Thi Thanh Binh, Shui Yu
:
Exploiting relay nodes for maximizing wireless underground sensor network lifetime. Appl. Intell. 50(12): 4568-4585 (2020) - [j226]Youyang Qu
, Jingwen Zhang, Ruidong Li
, Xiaoning Zhang, Xuemeng Zhai, Shui Yu
:
Generative adversarial networks enhanced location privacy in 5G networks. Sci. China Inf. Sci. 63(12) (2020) - [j225]Irena Atov, Kwang-Cheng Chen
, Ahmed E. Kamal, Shui Yu
:
Data Science and Artificial Intelligence for Communications. IEEE Commun. Mag. 58(1): 10-11 (2020) - [j224]Guanglei Li, Bohao Feng
, Huachun Zhou, Yuming Zhang, Keshav Sood
, Shui Yu
:
Adaptive service function chaining mappings in 5G using deep Q-learning. Comput. Commun. 152: 305-315 (2020) - [j223]Lanxiang Chen, Nan Zhang, Hung-Min Sun, Chin-Chen Chang, Shui Yu
, Kim-Kwang Raymond Choo
:
Secure search for encrypted personal health records from big data NoSQL databases in cloud. Computing 102(6): 1521-1545 (2020) - [j222]Keke Gai
, Jinnan Guo, Liehuang Zhu
, Shui Yu
:
Blockchain Meets Cloud Computing: A Survey. IEEE Commun. Surv. Tutorials 22(3): 2009-2030 (2020) - [j221]Minghao Wang, Tianqing Zhu, Tao Zhang, Jun Zhang
, Shui Yu
, Wanlei Zhou
:
Security and privacy in 6G networks: New areas and new challenges. Digit. Commun. Networks 6(3): 281-291 (2020) - [j220]Mahdi Dibaei
, Xi Zheng
, Kun Jiang
, Robert Abbas
, Shigang Liu, Yuexin Zhang, Yang Xiang
, Shui Yu
:
Attacks and defences on intelligent connected vehicles: a survey. Digit. Commun. Networks 6(4): 399-421 (2020) - [j219]Xiaolong Xu
, Xuyun Zhang
, Maqbool Khan
, Wanchun Dou, Shengjun Xue, Shui Yu
:
A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems. Future Gener. Comput. Syst. 105: 789-799 (2020) - [j218]Bin Yuan
, Deqing Zou, Hai Jin, Shui Yu
, Laurence T. Yang:
HostWatcher: Protecting hosts in cloud data centers through software-defined networking. Future Gener. Comput. Syst. 105: 964-972 (2020) - [j217]Lei Cui
, Gang Xie, Shui Yu
, Xuemeng Zhai
, Longxiang Gao
:
An Inherent Property-Based Rumor Dissemination Model in Online Social Networks. IEEE Netw. Lett. 2(1): 43-46 (2020) - [j216]Naimat-Ullah Khan
, Wanggen Wan, Shui Yu
:
Location-Based Social Network's Data Analysis and Spatio-Temporal Modeling for the Mega City of Shanghai, China. ISPRS Int. J. Geo Inf. 9(2): 76 (2020) - [j215]Naimat-Ullah Khan
, Wanggen Wan
, Shui Yu
, A. A. M. Muzahid, Sajid Khan
, Li Hou:
A Study of User Activity Patterns and the Effect of Venue Types on City Dynamics Using Location-Based Social Network Data. ISPRS Int. J. Geo Inf. 9(12): 733 (2020) - [j214]Kenli Li
, Alex X. Liu, Shui Yu
:
Special issue on natural computation, fuzzy systems and knowledge discovery from the ICNC&FSKD 2017. Neurocomputing 393: 112-114 (2020) - [j213]Xiaodong Wang
, Bruce Gu
, Yongli Ren
, Wenjie Ye
, Shui Yu
, Yong Xiang
, Longxiang Gao
:
A Fog-Based Recommender System. IEEE Internet Things J. 7(2): 1048-1060 (2020) - [j212]Wajid Rafique
, Xuan Zhao, Shui Yu
, Ibrar Yaqoob
, Muhammad Imran, Wanchun Dou
:
An Application Development Framework for Internet-of-Things Service Orchestration. IEEE Internet Things J. 7(5): 4543-4556 (2020) - [j211]Youyang Qu
, Longxiang Gao
, Tom H. Luan
, Yong Xiang
, Shui Yu
, Bai Li
, Gavin Zheng:
Decentralized Privacy Using Blockchain-Enabled Federated Learning in Fog Computing. IEEE Internet Things J. 7(6): 5171-5183 (2020) - [j210]Qichao Xu
, Zhou Su
, Minghui Dai, Shui Yu
:
APIS: Privacy-Preserving Incentive for Sensing Task Allocation in Cloud and Edge-Cooperation Mobile Internet of Things With SDN. IEEE Internet Things J. 7(7): 5892-5905 (2020) - [j209]Keshav Sood
, Kallol Krishna Karmakar
, Shui Yu
, Vijay Varadharajan, Shiva Raj Pokhrel
, Yong Xiang
:
Alleviating Heterogeneity in SDN-IoT Networks to Maintain QoS and Enhance Security. IEEE Internet Things J. 7(7): 5964-5975 (2020) - [j208]Pengfei Wu
, Fu Xiao
, Haiping Huang
, Chao Sha
, Shui Yu
:
Adaptive and Extensible Energy Supply Mechanism for UAVs-Aided Wireless-Powered Internet of Things. IEEE Internet Things J. 7(9): 9201-9213 (2020) - [j207]Zhengxin Guo, Fu Xiao
, Biyun Sheng
, Huan Fei, Shui Yu
:
WiReader: Adaptive Air Handwriting Recognition Based on Commercial WiFi Signal. IEEE Internet Things J. 7(10): 10483-10494 (2020) - [j206]Chunyi Zhou
, Anmin Fu
, Shui Yu
, Wei Yang, Huaqun Wang
, Yuqing Zhang
:
Privacy-Preserving Federated Learning in Fog Computing. IEEE Internet Things J. 7(11): 10782-10793 (2020) - [j205]Jianchao Lu
, Xi Zheng
, Michael Sheng
, Jiong Jin
, Shui Yu
:
Efficient Human Activity Recognition Using a Single Wearable Sensor. IEEE Internet Things J. 7(11): 11137-11146 (2020) - [j204]Bohao Feng
, Zhewei Cui
, Yunxue Huang, Huachun Zhou, Shui Yu
:
Elastic Resilience for Software-Defined Satellite Networking: Challenges, Solutions, and Open Issues. IT Prof. 22(6): 39-45 (2020) - [j203]Xiong Wang, Yukun Yang, Hanyu Liu, Jing Ren, Shizhong Xu, Sheng Wang, Shui Yu
:
Efficient measurement of round-trip link delays in software-defined networks. J. Netw. Comput. Appl. 150 (2020) - [j202]Lang Fan, Xiaoning Zhang, Keshav Sood
, Yunqing Wang, Shui Yu
:
Reliability-aware virtual network function placement in carrier networks. J. Netw. Comput. Appl. 154: 102536 (2020) - [j201]Yang Xiao, Qingqi Pei, Lina Yao, Shui Yu
, Lei Bai
, Xianzhi Wang
:
An enhanced probabilistic fairness-aware group recommendation by incorporating social activeness. J. Netw. Comput. Appl. 156: 102579 (2020) - [j200]Si Chen, Anmin Fu
, Jian Shen
, Shui Yu
, Huaqun Wang, Huaijiang Sun:
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection. J. Netw. Comput. Appl. 168: 102736 (2020) - [j199]Lei Cui, Youyang Qu
, Longxiang Gao, Gang Xie, Shui Yu
:
Detecting false data attacks using machine learning techniques in smart grid: A survey. J. Netw. Comput. Appl. 170: 102808 (2020) - [j198]Shu Yang, Lu Bai, Laizhong Cui, Zhongxing Ming, Yulei Wu, Shui Yu
, Hongfei Shen, Yi Pan
:
An efficient pipeline processing scheme for programming Protocol-independent Packet Processors. J. Netw. Comput. Appl. 171: 102806 (2020) - [j197]Fei Chen, Zhe Xiao, Laizhong Cui, Qiuzhen Lin
, Jianqiang Li, Shui Yu
:
Blockchain for Internet of things applications: A review and open issues. J. Netw. Comput. Appl. 172: 102839 (2020) - [j196]Mohammad Reza Nosouhi
, Shui Yu
, Wanlei Zhou
, Marthie Grobler
, Habiba Keshtiar:
Blockchain for secure location verification. J. Parallel Distributed Comput. 136: 40-51 (2020) - [j195]Shuiqiao Yang
, Jiaojiao Jiang, Arindam Pal, Kun Yu, Fang Chen
, Shui Yu
:
Analysis and Insights for Myths Circulating on Twitter During the COVID-19 Pandemic. IEEE Open J. Comput. Soc. 1: 209-219 (2020) - [j194]Fei Gu, Jianwei Niu
, Xin Jin, Shui Yu
:
FDFA: A fog computing assisted distributed analytics and detecting system for family activities. Peer-to-Peer Netw. Appl. 13(1): 38-52 (2020) - [j193]Peng Li
, Song Guo
, Shui Yu
, Weihua Zhuang
:
Cross-Cloud MapReduce for Big Data. IEEE Trans. Cloud Comput. 8(2): 375-386 (2020) - [j192]Hongwei Li
, Yi Yang, Yuanshun Dai, Shui Yu
, Yong Xiang
:
Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data. IEEE Trans. Cloud Comput. 8(2): 484-494 (2020) - [j191]Mohammad Reza Nosouhi
, Keshav Sood
, Shui Yu
, Marthie Grobler
, Jingwen Zhang:
PASPORT: A Secure and Private Location Proof Generation and Verification Framework. IEEE Trans. Comput. Soc. Syst. 7(2): 293-307 (2020) - [j190]Lei Wang, Jianwei Niu
, Shui Yu
:
SentiDiff: Combining Textual Information and Sentiment Diffusion Patterns for Twitter Sentiment Analysis. IEEE Trans. Knowl. Data Eng. 32(10): 2026-2039 (2020) - [j189]Honggang Wang
, Shui Yu
, Sherali Zeadally
, Danda B. Rawat
, Yue Gao
:
Introduction to the Special Section on Network Science for Internet of Things (IoT). IEEE Trans. Netw. Sci. Eng. 7(1): 237-238 (2020) - [j188]Bruce Gu
, Longxiang Gao
, Xiaodong Wang
, Youyang Qu
, Jiong Jin
, Shui Yu
:
Privacy on the Edge: Customizable Privacy-Preserving Context Sharing in Hierarchical Edge Computing. IEEE Trans. Netw. Sci. Eng. 7(4): 2298-2309 (2020) - [j187]Bin Yuan
, Huan Zhao, Chen Lin
, Deqing Zou
, Laurence Tianruo Yang
, Hai Jin
, Ligang He, Shui Yu
:
Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management. IEEE Trans. Netw. Sci. Eng. 7(4): 2541-2554 (2020) - [j186]Youyang Qu
, Shui Yu
, Wanlei Zhou
, Yonghong Tian
:
GAN-Driven Personalized Spatial-Temporal Private Data Sharing in Cyber-Physical Social Systems. IEEE Trans. Netw. Sci. Eng. 7(4): 2576-2586 (2020) - [j185]Chuan Xu
, Zhengying Xiong
, Zhenzhen Han, Guofeng Zhao
, Shui Yu
:
Link Reliability-Based Adaptive Routing for Multilevel Vehicular Networks. IEEE Trans. Veh. Technol. 69(10): 11771-11785 (2020) - [j184]Rahul Yadav
, Weizhe Zhang
, Omprakash Kaiwartya
, Houbing Song
, Shui Yu
:
Energy-Latency Tradeoff for Dynamic Computation Offloading in Vehicular Fog Computing. IEEE Trans. Veh. Technol. 69(12): 14198-14211 (2020) - [j183]Chuan Xu
, Zhengying Xiong
, Xianghui Kong
, Guofeng Zhao
, Shui Yu
:
A Packet Reception Probability-Based Reliable Routing Protocol for 3D VANET. IEEE Wirel. Commun. Lett. 9(4): 495-498 (2020) - [j182]Chuan Xu
, Li Luo, Yingyi Ding, Guofeng Zhao
, Shui Yu
:
Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks. IEEE Wirel. Commun. Lett. 9(10): 1633-1637 (2020) - [c159]Xiaotong Wu
, Genlin Ji, Wanchun Dou, Shui Yu
, Lianyong Qi:
Game Theory for Mobile Location Privacy. BSCI 2020: 106-116 - [c158]Chenhan Zhang, Shuyu Zhang
, James J. Q. Yu, Shui Yu
:
An Enhanced Motif Graph Clustering-Based Deep Learning Approach for Traffic Forecasting. GLOBECOM 2020: 1-6 - [c157]Mingyue Zhang, Junlong Zhou, Gongxuan Zhang, Longxia Huang, Tian Wang, Shui Yu
:
Scalable and Updatable Attribute-based Privacy Protection Scheme for Big Data Publishing. GLOBECOM 2020: 1-6 - [c156]Haojun Zhao, Yun Lin, Song Gao, Shui Yu
:
Evaluating and Improving Adversarial Attacks on DNN-Based Modulation Recognition. GLOBECOM 2020: 1-5 - [c155]Lingshuang Cai, Di Lin, Jiale Zhang, Shui Yu
:
Dynamic Sample Selection for Federated Learning with Heterogeneous Data in Fog Computing. ICC 2020: 1-6 - [c154]Jingwen Zhang, Jiale Zhang, Junjun Chen, Shui Yu
:
GAN Enhanced Membership Inference: A Passive Local Attack in Federated Learning. ICC 2020: 1-6 - [c153]Yufeng Xing, Lei Guo, Zongchao Xie, Lei Cui, Longxiang Gao, Shui Yu
:
Non-Technical Losses Detection in Smart Grids: An Ensemble Data-Driven Approach. ICPADS 2020: 563-568 - [c152]Hui Wen, Yue Wu, Chenming Yang, Hancong Duan, Shui Yu
:
A Unified Federated Learning Framework for Wireless Communications: towards Privacy, Efficiency, and Security. INFOCOM Workshops 2020: 653-658 - [c151]Linqing Gui, Fu Xiao, Yang Zhou, Feng Shu, Shui Yu
:
Performance analysis of indoor localization based on channel state information ranging model. MobiHoc 2020: 191-200 - [c150]Zhou Su, Tianxin Lin, Qichao Xu, Nan Chen, Shui Yu
, Song Guo:
An Online Pricing Strategy of EV Charging and Data Caching in Highway Service Stations. MSN 2020: 81-85 - [e1]Shui Yu
, Peter Mueller
, Jiangbo Qian:
Security and Privacy in Digital Economy - First International Conference, SPDE 2020, Quzhou, China, October 30 - November 1, 2020, Proceedings. Communications in Computer and Information Science 1268, Springer 2020, ISBN 978-981-15-9128-0 [contents] - [i7]Zhijian Shao, Jian Weng, Yue Zhang, Yongdong Wu, Ming Li, Jiasi Weng, Weiqi Luo, Shui Yu:
Peripheral-free Device Pairing by Randomly Switching Power. CoRR abs/2002.11288 (2020)
2010 – 2019
- 2019
- [b3]Jiaojiao Jiang, Sheng Wen, Shui Yu
, Bo Liu
, Yang Xiang, Wanlei Zhou:
Malicious Attack Propagation and Source Identification. Advances in Information Security 73, Springer 2019, ISBN 978-3-030-02178-8, pp. 1-181 - [j181]Chao Zhang
, Xiaopei Wu, Xi Zheng
, Shui Yu
:
Driver Drowsiness Detection Using Multi-Channel Second Order Blind Identifications. IEEE Access 7: 11829-11843 (2019) - [j180]Libing Wu
, Qianqian Sun, Xinpei Wang, Jing Wang, Shui Yu
, Yifei Zou, Bingyi Liu, Zike Zhu:
An Efficient Privacy-Preserving Mutual Authentication Scheme for Secure V2V Communication in Vehicular Ad Hoc Network. IEEE Access 7: 55050-55063 (2019) - [j179]Chuan Xu, Zhengying Xiong
, Guofeng Zhao
, Shui Yu
:
An Energy-Efficient Region Source Routing Protocol for Lifetime Maximization in WSN. IEEE Access 7: 135277-135289 (2019) - [j178]Guofeng Zhao
, Yong Li, Chuan Xu, Zhenzhen Han, Yuan Xing, Shui Yu
:
Joint Power Control and Channel Allocation for Interference Mitigation Based on Reinforcement Learning. IEEE Access 7: 177254-177265 (2019) - [j177]Zhitao Guan, Yue Zhang, Liehuang Zhu, Longfei Wu, Shui Yu
:
EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Sci. China Inf. Sci. 62(3): 32103:1-32103:14 (2019) - [j176]Meng Liu
, Yun Luo, Priyadarsi Nanda, Shui Yu
, Jianbing Zhang:
Efficient solution to the millionaires' problem based on asymmetric commutative encryption scheme. Comput. Intell. 35(3): 555-576 (2019) - [j175]Irena Atov, Kwang-Cheng Chen
, Shui Yu
:
Data Science and Artificial Intelligence for Communications. IEEE Commun. Mag. 57(5): 56 (2019) - [j174]Irena Atov, Kwang-Cheng Chen
, Ahmed E. Kamal, Shui Yu
:
Data Science and Artificial Intelligence for Communications. IEEE Commun. Mag. 57(11): 82-83 (2019) - [j173]Chuan Xu
, Zhenzhen Han, Qianyun Wang, Guofeng Zhao, Shui Yu
:
Modelling the impact of interference on the energy efficiency of WLANs. Concurr. Comput. Pract. Exp. 31(17) (2019) - [j172]Longxia Huang
, Gongxuan Zhang, Shui Yu
, Anmin Fu
, John Yearwood:
SeShare: Secure cloud data sharing based on blockchain and public auditing. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j171]Hengjie Zhang, Yucheng Dong, Francisco Chiclana
, Shui Yu
:
Consensus efficiency in group decision making: A comprehensive comparative study and its optimal design. Eur. J. Oper. Res. 275(2): 580-598 (2019) - [j170]Abubakar Sadiq Sani
, Dong Yuan, Jiong Jin
, Longxiang Gao, Shui Yu
, Zhao Yang Dong
:
Cyber security framework for Internet of Things-based Energy Internet. Future Gener. Comput. Syst. 93: 849-859 (2019) - [j169]Keshav Sood
, Kallol Krishna Karmakar
, Vijay Varadharajan, Udaya Kiran Tupakula
, Shui Yu
:
Analysis of Policy-Based Security Management System in Software-Defined Networks. IEEE Commun. Lett. 23(4): 612-615 (2019) - [j168]Iynkaran Natgunanathan, Abid Mehmood
, Yong Xiang
, Longxiang Gao, Shui Yu
:
Location Privacy Protection in Smart Health Care System. IEEE Internet Things J. 6(2): 3055-3069 (2019) - [j167]Xiaoning Zhang
, Shui Yu
, Ji Zhang, Zhichao Xu:
Forwarding Rule Multiplexing for Scalable SDN-Based Internet of Things. IEEE Internet Things J. 6(2): 3373-3385 (2019) - [j166]Guorui Li
, Jingsha He, Sancheng Peng
, Weijia Jia
, Cong Wang
, Jianwei Niu
, Shui Yu
:
Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading. IEEE Internet Things J. 6(3): 4176-4187 (2019) - [j165]Jiaojiao Jiang
, Longxiang Gao
, Jiong Jin
, Tom H. Luan
, Shui Yu
, Yong Xiang
, Saurabh Kumar Garg
:
Sustainability Analysis for Fog Nodes With Renewable Energy Supplies. IEEE Internet Things J. 6(4): 6725-6735 (2019) - [j164]Boyu Kuang
, Anmin Fu
, Shui Yu
, Guomin Yang
, Mang Su
, Yuqing Zhang
:
ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms. IEEE Internet Things J. 6(5): 8372-8383 (2019) - [j163]Wanchun Dou, Wenda Tang
, Shu Li, Shui Yu
, Kim-Kwang Raymond Choo
:
A heuristic line piloting method to disclose malicious taxicab driver's privacy over GPS big data. Inf. Sci. 483: 247-261 (2019) - [j162]Muhammad Khalil Afzal, Wazir Zada Khan
, Tariq Umer
, Byung-Seo Kim, Shui Yu
:
Editorial of cross-layer design issues, challenges and opportunities for future intelligent heterogeneous networks. J. Ambient Intell. Humaniz. Comput. 10(11): 4207-4208 (2019) - [j161]Lei Cui, Youyang Qu
, Mohammad Reza Nosouhi
, Shui Yu
, Jianwei Niu, Gang Xie:
Improving Data Utility Through Game Theory in Personalized Differential Privacy. J. Comput. Sci. Technol. 34(2): 272-286 (2019) - [j160]Li Yang, Yifang Zhi, Teng Wei, Shui Yu
, Jianfeng Ma:
Inference attack in Android Activity based on program fingerprint. J. Netw. Comput. Appl. 127: 92-106 (2019) - [j159]Gang Liu, Wei Quan, Nan Cheng, Hongke Zhang, Shui Yu
:
Efficient DDoS attacks mitigation for stateful forwarding in Internet of Things. J. Netw. Comput. Appl. 130: 1-13 (2019) - [j158]Lichuan Ma, Qingqi Pei, Yong Xiang, Lina Yao, Shui Yu
:
A reliable reputation computation framework for online items in E-commerce. J. Netw. Comput. Appl. 134: 13-25 (2019) - [j157]Xin Jin, Fei Gu, Jianwei Niu, Shui Yu
, Zhenchao Ouyang
:
HRCal: An effective calibration system for heart rate detection during exercising. J. Netw. Comput. Appl. 136: 1-10 (2019) - [j156]Sheng Feng, Shigen Shen
, Longjun Huang, Adam C. Champion, Shui Yu
, Chengdong Wu, Yunzhou Zhang:
Three-dimensional robot localization using cameras in wireless multimedia sensor networks. J. Netw. Comput. Appl. 146 (2019) - [j155]Shigen Shen
, Haiping Zhou, Sheng Feng, Longjun Huang, Jianhua Liu
, Shui Yu
, Qiying Cao
:
HSIRD: A model for characterizing dynamics of malware diffusion in heterogeneous WSNs. J. Netw. Comput. Appl. 146 (2019) - [j154]Junxiao Xue
, Chen-yang Sun, Junjin Cheng, Mingliang Xu
, Yafei Li, Shui Yu
:
Wheat ear growth modeling based on a polygon. Frontiers Inf. Technol. Electron. Eng. 20(9): 1175-1184 (2019) - [j153]Bohao Feng
, Guanglei Li, Guanwen Li, Yuming Zhang, Huachun Zhou, Shui Yu
:
Enabling Efficient Service Function Chains at Terrestrial-Satellite Hybrid Cloud Networks. IEEE Netw. 33(6): 94-99 (2019) - [j152]Feng Luo, Chunxiao Jiang
, Shui Yu
, Jingjing Wang
, Yipeng Li
, Yong Ren
:
Stability of Cloud-Based UAV Systems Supporting Big Data Acquisition and Processing. IEEE Trans. Cloud Comput. 7(3): 866-877 (2019) - [j151]Min Zhan, Haiming Liang
, Gang Kou, Yucheng Dong
, Shui Yu
:
Impact of Social Network Structures on Uncertain Opinion Formation. IEEE Trans. Comput. Soc. Syst. 6(4): 670-679 (2019) - [j150]Quanbo Zha, Haiming Liang
, Gang Kou, Yucheng Dong
, Shui Yu
:
A Feedback Mechanism With Bounded Confidence- Based Optimization Approach for Consensus Reaching in Multiple Attribute Large-Scale Group Decision-Making. IEEE Trans. Comput. Soc. Syst. 6(5): 994-1006 (2019) - [j149]Cai Fu
, Xiao-Yang Liu
, Jia Yang, Laurence T. Yang
, Shui Yu
, Tianqing Zhu
:
Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks. IEEE Trans. Dependable Secur. Comput. 16(4): 693-710 (2019) - [j148]Sancheng Peng, Guojun Wang, Yongmei Zhou, Cong Wan, Cong Wang, Shui Yu, Jianwei Niu:
An Immunization Framework for Social Networks Through Big Data Based Influence Modeling. IEEE Trans. Dependable Secur. Comput. 16(6): 984-995 (2019) - [j147]Mu Wang, Changqiao Xu
, Xingyan Chen
, Hao Hao, Lujie Zhong
, Shui Yu
:
Differential Privacy Oriented Distributed Online Learning for Mobile Social Video Prefetching. IEEE Trans. Multim. 21(3): 636-651 (2019) - [j146]Qiufen Xia
, Zichuan Xu
, Weifa Liang
, Shui Yu
, Song Guo
, Albert Y. Zomaya
:
Efficient Data Placement and Replication for QoS-Aware Approximate Query Evaluation of Big Data Analytics. IEEE Trans. Parallel Distributed Syst. 30(12): 2677-2691 (2019) - [j145]Bin Yuan
, Deqing Zou
, Shui Yu
, Hai Jin
, Weizhong Qiang
, Jinan Shen:
Defending Against Flow Table Overloading Attack in Software-Defined Networks. IEEE Trans. Serv. Comput. 12(2): 231-246 (2019) - [c149]Yuting Cheng, Li Yang, Shui Yu
, Jianfeng Ma:
Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation. CANS 2019: 392-411 - [c148]Wenwen Yan, Anmin Fu
, Yi Mu, Zhe Xia, Shui Yu
, Boyu Kuang:
EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices. IoT S&P@CCS 2019: 2-7 - [c147]Yifang Zhi, Li Yang, Shui Yu
, Jianfeng Ma:
BQSV: Protecting SDN Controller Cluster's Network Topology View Based on Byzantine Quorum System with Verification Function. CSS (1) 2019: 73-88 - [c146]Yiwei Gao, Jianwei Niu, Xuefeng Liu, Kaili Mao, Shui Yu
:
MemNetAR: Memory Network with Adversative Relation for Target-Level Sentiment Classification. GLOBECOM 2019: 1-6 - [c145]Xiaobo Li, Lei Zhou
, Anmin Fu
, Shui Yu
, Mang Su, Wei Yang:
Privacy Preserving Fog-Enabled Dynamic Data Aggregation in Mobile Phone Sensing. GLOBECOM 2019: 1-6 - [c144]Kaili Mao, Jianwei Niu, Xuefeng Liu, Shui Yu
, Longbo Zhao:
Word2Cluster: A New Multi-Label Text Clustering Algorithm with an Adaptive Clusters Number. GLOBECOM 2019: 1-6 - [c143]Keshav Sood
, Shiva Raj Pokhrel, Kallol Krishna Karmakar
, Vijay Varadharajan, Shui Yu
:
SDN-Capable IoT Last-Miles: Design Challenges. GLOBECOM 2019: 1-6 - [c142]Desheng Wang, Weizhe Zhang, Shui Yu
, Hui He:
RLS-VNE: Repeatable Large-Scale Virtual Network Embedding over Substrate Nodes. GLOBECOM 2019: 1-6 - [c141]Yilin Xiao, Liang Xiao
, Hailu Zhang, Shui Yu
, H. Vincent Poor:
Privacy Aware Recommendation: Reinforcement Learning Based User Profile Perturbation. GLOBECOM 2019: 1-6 - [c140]Jiale Zhang, Bing Chen, Shui Yu
, Hai Deng:
PEFL: A Privacy-Enhanced Federated Learning Scheme for Big Data Analytics. GLOBECOM 2019: 1-6 - [c139]Yuxiang Chen, Guishan Dong, Yao Hao, Zhaolei Zhang, Haiyang Peng, Shui Yu
:
An Open Identity Authentication Scheme Based on Blockchain. ICA3PP (1) 2019: 421-438 - [c138]Xinyu Zhan, Mingsong Chen, Shui Yu
, Yue Zhang:
Adaptive Detection Method for Packet-In Message Injection Attack in SDN. ICA3PP (2) 2019: 482-495 - [c137]Guishan Dong, Yuxiang Chen, Yao Hao, Zhaolei Zhang, Peng Zhang, Shui Yu:
Tiger Tally: Cross-Domain Scheme for Different Authentication Mechanism. ICA3PP (1) 2019: 533-549 - [c136]Zhaoyang Wang, Qingqi Pei, Xuefeng Liu, Lichuan Ma, Huizhong Li, Shui Yu
:
DAPS: A Decentralized Anonymous Payment Scheme with Supervision. ICA3PP (2) 2019: 537-550 - [c135]Ying Zhao, Junjun Chen, Jiale Zhang, Di Wu
, Jian Teng, Shui Yu
:
PDGAN: A Novel Poisoning Defense Method in Federated Learning Using Generative Adversarial Network. ICA3PP (1) 2019: 595-609 - [c134]Youyang Qu
, Shui Yu
, Jingwen Zhang, Huynh Thi Thanh Binh, Longxiang Gao, Wanlei Zhou
:
GAN-DP: Generative Adversarial Net Driven Differentially Privacy-Preserving Big Data Publishing. ICC 2019: 1-6 - [c133]Yunqing Wang, Xiaoning Zhang, Lang Fan, Shui Yu
, Rongping Lin:
Segment Routing Optimization for VNF Chaining. ICC 2019: 1-7 - [c132]Ke Xiao, Jianyu Zhao, Yunhua He, Shui Yu
:
Trajectory Prediction of UAV in Smart City using Recurrent Neural Networks. ICC 2019: 1-6 - [c131]Lin Yao, Yuxiang Jia, Haijun Zhang, Keping Long, Miao Pan, Shui Yu
:
A Decentralized Private Data Transaction Pricing and Quality Control Method. ICC 2019: 1-5 - [c130]Shiva Raj Pokhrel
, Keshav Sood
, Shui Yu
, Mohammad Reza Nosouhi
:
Policy-based Bigdata Security and QoS Framework for SDN/IoT: An Analytic Approach. INFOCOM Workshops 2019: 73-78 - [c129]Jiacheng Zhang, Li Yang, Shui Yu
, Jianfeng Ma:
A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration. NSS 2019: 520-535 - [c128]Xiongwei Fei, Kenli Li, Shui Yu
, Keqin Li:
An Economical and High-Quality Encryption Scheme for Cloud Servers with GPUs. PDCAT 2019: 214-219 - [c127]Ying Zhao, Junjun Chen, Di Wu
, Jian Teng, Shui Yu
:
Multi-Task Network Anomaly Detection using Federated Learning. SoICT 2019: 273-279 - [c126]Mohammad Reza Nosouhi
, Shui Yu
, Keshav Sood
, Marthie Grobler
:
HSDC-Net: Secure Anonymous Messaging in Online Social Networks. TrustCom/BigDataSE 2019: 350-357 - [c125]Jiale Zhang, Junjun Chen, Di Wu
, Bing Chen, Shui Yu
:
Poisoning Attack in Federated Learning using Generative Adversarial Nets. TrustCom/BigDataSE 2019: 374-380 - [i6]Binbin Jin, Enhong Chen, Hongke Zhao, Zhenya Huang, Qi Liu, Hengshu Zhu, Shui Yu:
Promotion of Answer Value Measurement with Domain Effects in Community Question Answering Systems. CoRR abs/1906.00156 (2019) - [i5]Mahdi Dibaei
, Xi Zheng, Kun Jiang, Sasa Maric, Robert Abbas, Shigang Liu, Yuexin Zhang, Yao Deng, Sheng Wen, Jun Zhang, Yang Xiang, Shui Yu:
An Overview of Attacks and Defences on Intelligent Connected Vehicles. CoRR abs/1907.07455 (2019) - 2018
- [j144]Qiang Liu
, Pan Li, Wentao Zhao, Wei Cai, Shui Yu
, Victor C. M. Leung:
A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View. IEEE Access 6: 12103-12117 (2018) - [j143]Minhaj Ahmad Khan, Tariq Umer
, Samee U. Khan
, Shui Yu
, Abderrezak Rachedi
:
IEEE Access Special Section Editorial: Green Cloud and Fog Computing: Energy Efficiency and Sustainability Aware Infrastructures, Protocols, and Applications. IEEE Access 6: 12280-12283 (2018) - [j142]Yifu Zeng
, Kenli Li, Shui Yu
, Yantao Zhou, Keqin Li:
Parallel and Progressive Approaches for Skyline Query Over Probabilistic Incomplete Database. IEEE Access 6: 13289-13301 (2018) - [j141]Xinheng Wang
, Chuan Xu, Guofeng Zhao, Kun Xie, Shui Yu
:
Efficient Performance Monitoring for Ubiquitous Virtual Networks Based on Matrix Completion. IEEE Access 6: 14524-14536 (2018) - [j140]Wei Lu
, Ping Lu, Quanying Sun, Shui Yu
, Zuqing Zhu
:
Profit-Aware Distributed Online Scheduling for Data-Oriented Tasks in Cloud Datacenters. IEEE Access 6: 15629-15642 (2018) - [j139]Letian Li
, Na Deng, Weilong Ren
, Baohua Kou, Wuyang Zhou, Shui Yu
:
Multi-Service Resource Allocation in Future Network With Wireless Virtualization. IEEE Access 6: 53854-53868 (2018) - [j138]Yang Xiao
, Qingqi Pei
, Xuefeng Liu, Shui Yu
:
A Novel Trust Evaluation Mechanism for Collaborative Filtering Recommender Systems. IEEE Access 6: 70298-70312 (2018) - [j137]Anmin Fu
, Yiming Zhu, Guomin Yang
, Shui Yu
, Yan Yu:
Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server. Clust. Comput. 21(4): 1933-1947 (2018) - [j136]Shui Yu
, Guojun Wang, Xiting Liu, Jianwei Niu:
Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective. IEEE Commun. Mag. 56(9): 14-18 (2018) - [j135]Jiawei Li, Hongbin Luo, Shan Zhang, Shui Yu
, Tilman Wolf:
Traffic Engineering in Information-Centric Networking: Opportunities, Solutions and Challenges. IEEE Commun. Mag. 56(11): 124-130 (2018) - [j134]Sancheng Peng, Shui Yu
, Peter Mueller
:
Social networking big data: Opportunities, solutions, and challenges. Future Gener. Comput. Syst. 86: 1456-1458 (2018) - [j133]Xinheng Wang
, Chuan Xu
, Guofeng Zhao, Shui Yu
:
Tuna: An Efficient and Practical Scheme for Wireless Access Point in 5G Networks Virtualization. IEEE Commun. Lett. 22(4): 748-751 (2018) - [j132]Vu Viet Hoang Pham
, Shui Yu
, Keshav Sood
, Lei Cui:
Privacy issues in social networks and analysis: a comprehensive survey. IET Networks 7(2): 74-84 (2018) - [j131]Shigen Shen
, Longjun Huang
, Haiping Zhou
, Shui Yu
, En Fan, Qiying Cao
:
Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks. IEEE Internet Things J. 5(2): 1043-1054 (2018) - [j130]Huadong Ma
, Shui Yu
, Moncef Gabbouj
, Peter Mueller
:
Guest Editorial Special Issue on Multimedia Big Data in Internet of Things. IEEE Internet Things J. 5(5): 3405-3407 (2018) - [j129]Laizhong Cui, Huaixiong Hu, Shui Yu
, Qiao Yan, Zhong Ming, Zhenkun Wen, Nan Lu:
DDSE: A novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks. J. Netw. Comput. Appl. 103: 119-130 (2018) - [j128]Deze Zeng, Shiyan Zhang, Lin Gu, Shui Yu
, Zhangjie Fu:
Quality-of-sensing aware budget constrained contaminant detection sensor deployment in water distribution system. J. Netw. Comput. Appl. 103: 274-279 (2018) - [j127]Anmin Fu
, Yuhan Li, Shui Yu
, Yan Yu, Gongxuan Zhang:
DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems. J. Netw. Comput. Appl. 104: 97-106 (2018) - [j126]Sancheng Peng, Yongmei Zhou, Lihong Cao, Shui Yu
, Jianwei Niu, Weijia Jia
:
Influence analysis in social networks: A survey. J. Netw. Comput. Appl. 106: 17-32 (2018) - [j125]Xiong Wang, Qian Zhang, Jing Ren, Shizhong Xu, Sheng Wang, Shui Yu
:
Toward efficient parallel routing optimization for large-scale SDN networks using GPGPU. J. Netw. Comput. Appl. 113: 1-13 (2018) - [j124]Anmin Fu
, Shuai Li, Shui Yu
, Yuqing Zhang, Yinxia Sun:
Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server. J. Netw. Comput. Appl. 118: 102-112 (2018) - [j123]Lei Zhou
, Anmin Fu
, Shui Yu
, Mang Su, Boyu Kuang:
Data integrity verification of the outsourced big data in the cloud environment: A survey. J. Netw. Comput. Appl. 122: 1-15 (2018) - [j122]Chuan Xu, Wenqiang Jin, Xinheng Wang, Guofeng Zhao, Shui Yu
:
MC-VAP: A multi-connection virtual access point for high performance software-defined wireless networks. J. Netw. Comput. Appl. 122: 88-98 (2018) - [j121]Zijing Cheng, Xiaoning Zhang, Shaohui Shen, Shui Yu
, Jing Ren, Rongping Lin
:
T-Trail: Link Failure Monitoring in Software-Defined Optical Networks. JOCN 10(4): 344-352 (2018) - [j120]Wenqi Liu, Hengjie Zhang, Xia Chen
, Shui Yu
:
Managing consensus and self-confidence in multiplicative preference relations in group decision making. Knowl. Based Syst. 162: 62-73 (2018) - [j119]Guorui Li
, Haobo Chen, Sancheng Peng
, Xinguang Li, Cong Wang, Shui Yu
, Pengfei Yin:
A Collaborative Data Collection Scheme Based on Optimal Clustering for Wireless Sensor Networks. Sensors 18(8): 2487 (2018) - [j118]Zheng Wang, Shui Yu, Scott Rose:
An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks. EAI Endorsed Trans. Security Safety 4(14): e3 (2018) - [j117]Jun Huang
, Qiang Duan, Song Guo
, Yuhong Yan, Shui Yu
:
Converged Network-Cloud Service Composition with End-to-End Performance Guarantee. IEEE Trans. Cloud Comput. 6(2): 545-557 (2018) - [j116]Youyang Qu
, Shui Yu
, Longxiang Gao
, Wanlei Zhou
, Sancheng Peng
:
A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks. IEEE Trans. Comput. Soc. Syst. 5(3): 773-784 (2018) - [j115]Jiao Jiao Jiang
, Sheng Wen
, Shui Yu
, Yang Xiang, Wanlei Zhou
:
Rumor Source Identification in Social Networks with Time-Varying Topology. IEEE Trans. Dependable Secur. Comput. 15(1): 166-179 (2018) - [j114]Hongwei Li, Dongxiao Liu, Yuanshun Dai, Tom H. Luan
, Shui Yu
:
Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds. IEEE Trans. Emerg. Top. Comput. 6(1): 97-109 (2018) - [j113]Taixin Li
, Huachun Zhou, Hongbin Luo
, Shui Yu
:
SERvICE: A Software Defined Framework for Integrated Space-Terrestrial Satellite Communication. IEEE Trans. Mob. Comput. 17(3): 703-716 (2018) - [j112]Shengru Li, Kai Han, Nirwan Ansari
, Qinkun Bao, Daoyun Hu, Junjie Liu, Shui Yu
, Zuqing Zhu:
Improving SDN Scalability With Protocol-Oblivious Source Routing: A System-Level Study. IEEE Trans. Netw. Serv. Manag. 15(1): 275-288 (2018) - [j111]Bin Yuan
, Hai Jin
, Deqing Zou
, Laurence Tianruo Yang
, Shui Yu
:
A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 15(2): 825-839 (2018) - [j110]Yuyang Zhang
, Ping Dong
, Shui Yu
, Hongbin Luo
, Tao Zheng, Hongke Zhang:
An Adaptive Multipath Algorithm to Overcome the Unpredictability of Heterogeneous Wireless Networks for High-Speed Railway. IEEE Trans. Veh. Technol. 67(12): 11332-11344 (2018) - [j109]Youyang Qu
, Shui Yu
, Wanlei Zhou
, Sancheng Peng, Guojun Wang, Ke Xiao:
Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things. IEEE Wirel. Commun. 25(6): 91-97 (2018) - [j108]Tao Xiang, Yang Li, Xiaoguo Li, Shigang Zhong, Shui Yu
:
Collaborative ensemble learning under differential privacy. Web Intell. 16(1): 73-87 (2018) - [j107]Laisen Nie, Xiaojie Wang
, Liangtian Wan
, Shui Yu
, Houbing Song
, Dingde Jiang:
Network Traffic Prediction Based on Deep Belief Network and Spatiotemporal Compressive Sensing in Wireless Mesh Backbone Networks. Wirel. Commun. Mob. Comput. 2018 (2018) - [c124]Ahmed Al-Mansoori, Shui Yu
, Yong Xiang, Keshav Sood
:
A survey on big data stream processing in SDN supported cloud environment. ACSW 2018: 12:1-12:11 - [c123]Benyou Wang, Kaihe Deng, Weiwei Wei, Sihai Zhang, Wuyang Zhou, Shui Yu
:
Full Cycle Campus Life of College Students: A Big Data Case in China. BigComp 2018: 507-512 - [c122]Li Yang, Teng Wei, Jianfeng Ma, Shui Yu
, Chao Yang:
Inference Attack in Android Activity based on Program Fingerprint. CNS 2018: 1-9 - [c121]Boyu Fan, Zhenchao Ouyang
, Jianwei Niu, Shui Yu
, Joel J. P. C. Rodrigues:
Smart Water Flosser: A Novel Smart Oral Cleaner with IMU Sensor. GLOBECOM 2018: 1-7 - [c120]Bohao Feng
, Guanglei Li, Guanwen Li, Huachun Zhou, Hongke Zhang, Shui Yu
:
Efficient Mappings of Service Function Chains at Terrestrial-Satellite Hybrid Cloud Networks. GLOBECOM 2018: 1-6 - [c119]Haifeng Ke, Anmin Fu
, Shui Yu
, Si Chen:
AQ-DP: A New Differential Privacy Scheme Based on Quasi-Identifier Classifying in Big Data. GLOBECOM 2018: 1-6 - [c118]Jiawei Li, Hongbin Luo, Mingshuang Jin, Shui Yu
, Zhaoxu Wang:
Solving Selfish Routing in Route-by-Name Information-Centric Network Architectures. GLOBECOM 2018: 1-7 - [c117]Guanglei Li, Huachun Zhou, Bohao Feng
, Guanwen Li, Shui Yu
:
Automatic Selection of Security Service Function Chaining Using Reinforcement Learning. GLOBECOM Workshops 2018: 1-6 - [c116]Shu Li, Jie Zhang, Dongqing Xie, Shui Yu
, Wanchun Dou:
High Quality Participant Recruitment of Mobile Crowdsourcing over Big Data. GLOBECOM 2018: 1-6 - [c115]Mohammad Reza Nosouhi
, Shui Yu
, Marthie Grobler
, Yong Xiang, Zuqing Zhu:
SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification. GLOBECOM 2018: 1-6 - [c114]Youyang Qu
, Shui Yu
, Wanlei Zhou
, Jianwei Niu:
FBI: Friendship Learning-Based User Identification in Multiple Social Networks. GLOBECOM 2018: 1-6 - [c113]Keshav Sood
, Kallol Krishna Karmakar
, Vijay Varadharajan, Udaya Kiran Tupakula
, Shui Yu
:
Towards QoS and Security in Software-Driven Heterogeneous Autonomous Networks. GLOBECOM 2018: 1-6 - [c112]Yuhan Xue, Shengru Li, Kai Han, Sicheng Zhao, Huibai Huang, Shui Yu
, Zuqing Zhu:
Virtualization of Table Resources in Programmable Data Plane with Global Consideration. GLOBECOM 2018: 1-6 - [c111]Longxia Huang, Gongxuan Zhang, Shui Yu
, Anmin Fu
, John Yearwood:
Customized Data Sharing Scheme Based on Blockchain and Weighted Attribute. GLOBECOM 2018: 206-212 - [c110]Lei Cui, Youyang Qu
, Shui Yu
, Longxiang Gao, Gang Xie:
A Trust-Grained Personalized Privacy-Preserving Scheme for Big Social Data. ICC 2018: 1-6 - [c109]Guanwen Li, Bohao Feng
, Guanglei Li, Huachun Zhou, Shui Yu
:
An SMDP-Based Service Function Allocation Scheme for Mobile Edge Clouds. ICC 2018: 1-6 - [c108]Yuanyuan Ma, Tiejun Lv, Xuewei Zhang, Hui Gao, Shui Yu
:
High Energy Efficiency Transmission in MIMO Satellite Communications. ICC 2018: 1-6 - [c107]Youyang Qu
, Lei Cui, Shui Yu
, Wanlei Zhou
, Jun Wu:
Improving Data Utility through Game Theory in Personalized Differential Privacy. ICC 2018: 1-6 - [c106]Wenda Tang, Song Wang, Duanchao Li, Taigui Huang, Wanchun Dou, Shui Yu
:
A Deadline-Aware Coflow Scheduling Approach for Big Data Applications. ICC 2018: 1-6 - [c105]Qichao Xu, Zhou Su, Shui Yu
:
Green Social CPS Based E-Healthcare Systems to Control the Spread of Infectious Diseases. ICC 2018: 1-5 - [c104]Zhichao Xu, Xiaoning Zhang, Shui Yu
, Ji Zhang:
Energy-Efficient Virtual Network Function Placement in Telecom Networks. ICC 2018: 1-7 - [c103]Guofeng Zhao, Qianyun Wang, Chuan Xu, Shui Yu
:
Analyzing and Modelling the Interference Impact on Energy Efficiency of WLANs. ICC 2018: 1-6 - [c102]Yiming Zhu, Anmin Fu
, Shui Yu
, Yan Yu, Shuai Li, Zhenzhu Chen:
New Algorithm for Secure Outsourcing of Modular Exponentiation with Optimal Checkability Based on Single Untrusted Server. ICC 2018: 1-6 - [c101]Shunmei Meng, Qianmu Li, Shiping Chen
, Shui Yu
, Lianyong Qi, Wenmin Lin, Xiaolong Xu
, Wanchun Dou:
Temporal-Sparsity Aware Service Recommendation Method via Hybrid Collaborative Filtering Techniques. ICSOC 2018: 421-429 - [c100]Zhenkun Qiu, Sihai Zhang, Wuyang Zhou, Shui Yu
:
Empirical study on taxi's mobility nature in dense urban area. INFOCOM Workshops 2018: 232-237 - [c99]Yankang Zhao, Xiaobo Ma, Jianfeng Li, Shui Yu
, Wei Li:
Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks. NSS 2018: 319-336 - [c98]Meng Liu
, Priyadarsi Nanda, Xuyun Zhang
, Chi Yang, Shui Yu
, Jianxin Li
:
Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem. TrustCom/BigDataSE 2018: 990-995 - [c97]Wenda Tang, Shu Li, Wajid Rafique, Wanchun Dou, Shui Yu
:
An Offloading Approach in Fog Computing Environment. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 857-864 - [c96]Zhaoxu Wang, Huachun Zhou, Bohao Feng, Wei Quan, Shui Yu
:
MTF: Mitigating Link Flooding Attacks in Delay Tolerant Networks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1532-1539 - [i4]Jianguo Chen, Kenli Li, Zhuo Tang, Kashif Bilal, Shui Yu
, Chuliang Weng, Keqin Li:
A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment. CoRR abs/1810.07748 (2018) - [i3]Liehuang Zhu, Baokun Zheng, Meng Shen, Shui Yu
, Feng Gao, Hongyu Li, Kexin Shi, Keke Gai:
Research on the Security of Blockchain Data: A Survey. CoRR abs/1812.02009 (2018) - 2017
- [j106]Chuan Xu, Wenqiang Jin, Guofeng Zhao, Huaglory Tianfield
, Shui Yu
, Youyang Qu
:
A Novel Multipath-Transmission Supported Software Defined Wireless Network Architecture. IEEE Access 5: 2111-2125 (2017) - [j105]Erfan Aghasian
, Saurabh Kumar Garg
, Longxiang Gao, Shui Yu
, James Montgomery
:
Scoring Users' Privacy Disclosure Across Multiple Online Social Networks. IEEE Access 5: 13118-13130 (2017) - [j104]Wei Quan, Yana Liu, Hongke Zhang, Shui Yu
:
Enhancing Crowd Collaborations for Software Defined Vehicular Networks. IEEE Commun. Mag. 55(8): 80-86 (2017) - [j103]Jiaojiao Jiang
, Sheng Wen
, Shui Yu
, Yang Xiang
, Wanlei Zhou
:
Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies. IEEE Commun. Surv. Tutorials 19(1): 465-481 (2017) - [j102]Shui Yu
, Meng Liu, Wanchun Dou, Xiting Liu, Sanming Zhou:
Networking for Big Data: A Survey. IEEE Commun. Surv. Tutorials 19(1): 531-549 (2017) - [j101]Bohao Feng
, Hongke Zhang, Huachun Zhou, Shui Yu
:
Locator/Identifier Split Networking: A Promising Future Internet Architecture. IEEE Commun. Surv. Tutorials 19(4): 2927-2948 (2017) - [j100]Wanchun Dou, Xiaolong Xu
, Shunmei Meng, Xuyun Zhang
, Chunhua Hu, Shui Yu
, Jian Yang:
An energy-aware virtual machine scheduling method for service QoS enhancement in clouds over big data. Concurr. Comput. Pract. Exp. 29(14) (2017) - [j99]Jiao Jiao Jiang
, Sheng Wen
, Shui Yu
, Yang Xiang, Wanlei Zhou
, Houcine Hassan:
The structure of communities in scale-free networks. Concurr. Comput. Pract. Exp. 29(14) (2017) - [j98]Shui Yu
, Peter Mueller, Albert Y. Zomaya
:
Editorial: special issue on "big data security and privacy". Digit. Commun. Networks 3(4): 211-212 (2017) - [j97]Xiaoning Zhang
, Zijing Cheng, Rongping Lin, Lei He, Shui Yu
, Hongbin Luo:
Local Fast Reroute With Flow Aggregation in Software Defined Networks. IEEE Commun. Lett. 21(4): 785-788 (2017) - [j96]Chuan Xu, Zhenzhen Han, Guofeng Zhao, Shui Yu
:
A Sleeping and Offloading Optimization Scheme for Energy-Efficient WLANs. IEEE Commun. Lett. 21(4): 877-880 (2017) - [j95]Meng Liu, Wanchun Dou, Shui Yu
:
How to shutdown a cloud: a DDoS attack in a private infrastructure-as-a-service cloud. Int. J. Auton. Adapt. Commun. Syst. 10(1): 1-14 (2017) - [j94]Longxiang Gao, Tom H. Luan
, Shui Yu
, Wanlei Zhou
, Bo Liu
:
FogRoute: DTN-Based Data Dissemination Model in Fog Computing. IEEE Internet Things J. 4(1): 225-235 (2017) - [j93]Sancheng Peng, Aimin Yang, Lihong Cao, Shui Yu
, Dongqing Xie:
Social influence modeling using information theory in mobile social networks. Inf. Sci. 379: 146-159 (2017) - [j92]Jun Huang, Liqian Xu, Qiang Duan, Cong-Cong Xing, Jiangtao Luo, Shui Yu
:
Modeling and performance analysis for multimedia data flows scheduling in software defined networks. J. Netw. Comput. Appl. 83: 89-100 (2017) - [j91]Shigen Shen
, Haiping Ma, En Fan
, Keli Hu
, Shui Yu
, Jianhua Liu
, Qiying Cao
:
A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion. J. Netw. Comput. Appl. 91: 26-35 (2017) - [j90]Zijing Cheng, Xiaoning Zhang, Yichao Li, Shui Yu
, Rongping Lin
, Lei He:
Congestion-Aware Local Reroute for Fast Failure Recovery in Software-Defined Networks. JOCN 9(11): 934-944 (2017) - [j89]Wu Liu, Yihong Gao, Huadong Ma, Shui Yu
, Jie Nie:
Online multi-objective optimization for live video forwarding across video data centers. J. Vis. Commun. Image Represent. 48: 502-513 (2017) - [j88]Bohao Feng
, Huachun Zhou, Hongke Zhang, Guanwen Li, Haifeng Li, Shui Yu
, Han-Chieh Chao:
HetNet: A Flexible Architecture for Heterogeneous Satellite-Terrestrial Networks. IEEE Netw. 31(6): 86-92 (2017) - [j87]Jun Du
, Chunxiao Jiang, Jian Wang, Yong Ren, Shui Yu
, Zhu Han:
Resource Allocation in Space Multiaccess Systems. IEEE Trans. Aerosp. Electron. Syst. 53(2): 598-618 (2017) - [j86]Taotao Wu, Wanchun Dou, Qiang Ni
, Shui Yu
, Guihai Chen
:
Mobile Live Video Streaming Optimization via Crowdsourcing Brokerage. IEEE Trans. Multim. 19(10): 2267-2281 (2017) - [j85]Zuqing Zhu
, Xiahe Liu, Yixiang Wang, Wei Lu, Long Gong, Shui Yu
, Nirwan Ansari
:
Impairment- and Splitting-Aware Cloud-Ready Multicast Provisioning in Elastic Optical Networks. IEEE/ACM Trans. Netw. 25(2): 1220-1234 (2017) - [j84]Jianguo Chen
, Kenli Li, Zhuo Tang, Kashif Bilal, Shui Yu
, Chuliang Weng, Keqin Li:
A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment. IEEE Trans. Parallel Distributed Syst. 28(4): 919-933 (2017) - [j83]Hongke Zhang, Ping Dong, Shui Yu
, Jiayang Song:
A Scalable and Smart Hierarchical Wireless Communication Architecture Based on Network/User Separation. IEEE Wirel. Commun. 24(1): 18-24 (2017) - [j82]Ping Dong, Tao Zheng, Shui Yu
, Hongke Zhang, Xiaoyun Yan:
Enhancing Vehicular Communication Using 5G-Enabled Smart Collaborative Networking. IEEE Wirel. Commun. 24(6): 72-79 (2017) - [c95]Keshav Sood
, Shui Yu
, Yong Xiang:
Are current resources in SDN allocated to maximum performance and minimize costs and maintaining QoS problems? ACSW 2017: 42:1-42:6 - [c94]Youyang Qu, Jiyang Xu, Shui Yu
:
Privacy preserving in big data sets through multiple shuffle. ACSW 2017: 72:1-72:8 - [c93]Shundan Jiao, Xiaoning Zhang, Shui Yu
, Xue Song, Zhichao Xu:
Joint Virtual Network Function Selection and Traffic Steering in Telecom Networks. GLOBECOM 2017: 1-7 - [c92]Haifeng Li, Huachun Zhou, Wei Quan, Bohao Feng, Hongke Zhang, Shui Yu
:
HCaching: High-Speed Caching for Information-Centric Networking. GLOBECOM 2017: 1-6 - [c91]Mohammad Reza Nosouhi
, Vu Viet Hoang Pham
, Shui Yu
, Yong Xiang, Matthew J. Warren
:
A Hybrid Location Privacy Protection Scheme in Big Data Environment. GLOBECOM 2017: 1-6 - [c90]Xue Song, Xiaoning Zhang, Shui Yu
, Shundan Jiao, Zhichao Xu:
Resource-Efficient Virtual Network Function Placement in Operator Networks. GLOBECOM 2017: 1-7 - [c89]Jingjing Wang
, Chunxiao Jiang, Zuyao Ni, Sanghai Guan, Shui Yu
, Yong Ren:
Reliability of Cloud Controlled Multi-UAV Systems for On-Demand Services. GLOBECOM 2017: 1-6 - [c88]Xiaoyun Yan, Ping Dong, Tao Zheng, Hongke Zhang, Shui Yu
:
Fuzzy Multi-Attribute Utility Based Network Selection Approach for High-Speed Railway Scenario. GLOBECOM 2017: 1-6 - [c87]Xiaoning Zhang, Shui Yu
, Zhichao Xu, Yichao Li, Zijing Cheng, Wanlei Zhou
:
Flow Entry Sharing in Protection Design for Software Defined Networks. GLOBECOM 2017: 1-7 - [c86]Zhongbai Jiang, Changqiao Xu, Jianfeng Guan, Hongke Zhang, Shui Yu
:
Loss-aware adaptive scalable transmission in wireless high-speed railway networks. ICC 2017: 1-6 - [c85]Taixin Li
, Huachun Zhou, Hongbin Luo, Wei Quan, Shui Yu
:
Modeling software defined satellite networks using queueing theory. ICC 2017: 1-6 - [c84]Youyang Qu
, Shui Yu
, Longxiang Gao, Jianwei Niu:
Big data set privacy preserving through sensitive attribute-based grouping. ICC 2017: 1-6 - [c83]Chengxiao Yu
, Wei Quan, Shui Yu
, Hongke Zhang:
On the two time scale characteristics of wireless high speed railway networks. ICC 2017: 1-6 - [c82]Jiao Jiao Jiang
, Longxiang Gao, Shui Yu
, Jiong Jin
, Dongfeng Yuan:
Preferential attachment and the spreading influence of users in online social networks. ICCC 2017: 1-6 - [c81]Youyang Qu
, Shui Yu
, Longxiang Gao, Sancheng Peng, Yong Xiang, Liang Xiao
:
FuzzyDP: Fuzzy-based big data publishing against inquiry attacks. INFOCOM Workshops 2017: 7-12 - [c80]Bo Liu
, Wanlei Zhou
, Shui Yu
, Kun Wang, Yu Wang, Yong Xiang, Jin Li:
Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper). ISPEC 2017: 694-704 - [c79]Mohammad Reza Nosouhi
, Youyang Qu, Shui Yu
, Yong Xiang, Damien Manuel:
Distance-based location privacy protection in social networks. ITNAC 2017: 1-6 - [c78]Jiaojiao Jiang
, Longxiang Gao, Jiong Jin
, Tom H. Luan
, Shui Yu
, Dong Yuan
, Yong Xiang, Dongfeng Yuan:
Towards an Analysis of Traffic Shaping and Policing in Fog Networks Using Stochastic Fluid Models. MobiQuitous 2017: 196-204 - [c77]Zifan Liu, Qing Cai, Song Wang, Xiaolong Xu
, Wanchun Dou, Shui Yu
:
A Cloud Service Enhanced Method Supporting Context-Aware Applications. MONAMI 2017: 277-290 - [c76]Zheng Wang
, Shui Yu
, Scott Rose:
An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks. SecureComm 2017: 793-807 - [c75]Lianyong Qi, Wanchun Dou, Xuyun Zhang
, Shui Yu
:
Amplified Locality-Sensitive Hashing for Privacy-Preserving Distributed Service Recommendation. SpaCCS 2017: 280-297 - [c74]Laisen Nie
, Dingde Jiang, Shui Yu
, Houbing Song
:
Network Traffic Prediction Based on Deep Belief Network in Wireless Mesh Backbone Networks. WCNC 2017: 1-5 - [i2]Jingjing Wang, Chunxiao Jiang, Longxiang Gao, Shui Yu
, Zhu Han, Yong Ren:
Complex Network Theoretical Analysis on Information Dissemination over Vehicular Networks. CoRR abs/1701.00240 (2017) - 2016
- [j81]Shui Yu
:
Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data. IEEE Access 4: 2751-2763 (2016) - [j80]Yaodong Zhang, Chunxiao Jiang
, Zhu Han, Shui Yu
, Jian Yuan:
Interference-Aware Coordinated Power Allocation in Autonomous Wi-Fi Environment. IEEE Access 4: 3489-3500 (2016) - [j79]Shui Yu
, Chonggang Wang, Ke Liu, Albert Y. Zomaya
:
Editorial for IEEE Access Special Section on Theoretical Foundations for Big Data Applications: Challenges and Opportunities. IEEE Access 4: 5730-5732 (2016) - [j78]Keshav Sood
, Shui Yu
, Yong Xiang, Hongbing Cheng:
A General QoS Aware Flow-Balancing and Resource Management Scheme in Distributed Software-Defined Networks. IEEE Access 4: 7176-7185 (2016) - [j77]Qingli Ma
, Sihai Zhang
, Wuyang Zhou, Shui Yu
, Chonggang Wang:
When Will You Have a New Mobile Phone? An Empirical Answer From Big Data. IEEE Access 4: 10147-10157 (2016) - [j76]Shui Yu
, Ke Liu:
Special Issue on Big Data from networking perspective. Big Data Res. 3: 1 (2016) - [j75]Peter Mueller
, Chin-Tser Huang, Shui Yu
, Zahir Tari
, Ying-Dar Lin:
Cloud Security. IEEE Cloud Comput. 3(5): 22-24 (2016) - [j74]Keshav Sood
, Shui Yu
, Yong Xiang:
Performance Analysis of Software-Defined Network Switch Using M/Geo/1 Model. IEEE Commun. Lett. 20(12): 2522-2525 (2016) - [j73]Keshav Sood
, Shui Yu
, Yong Xiang:
Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review. IEEE Internet Things J. 3(4): 453-463 (2016) - [j72]Jianwei Niu, Lei Wang, Xiting Liu, Shui Yu
:
FUIR: Fusing user and item information to deal with data sparsity by using side information in recommendation systems. J. Netw. Comput. Appl. 70: 41-50 (2016) - [j71]Laisen Nie, Dingde Jiang, Lei Guo
, Shui Yu
:
Traffic matrix prediction and estimation based on deep learning in large-scale IP backbone networks. J. Netw. Comput. Appl. 76: 16-22 (2016) - [j70]Song Guo
, Shui Yu
, Jie Li
, Nirwan Ansari
:
Big data for networking [Guest Editorial]. IEEE Netw. 30(1): 4-5 (2016) - [j69]Xiaotong Wu
, Meng Liu, Wan-Chun Dou, Longxiang Gao, Shui Yu
:
A scalable and automatic mechanism for resource allocation in self-organizing cloud. Peer-to-Peer Netw. Appl. 9(1): 28-41 (2016) - [j68]Xiaotong Wu
, Meng Liu, Wan-Chun Dou, Shui Yu
:
DDoS attacks on data plane of software-defined network: are they possible? Secur. Commun. Networks 9(18): 5444-5459 (2016) - [j67]Shigen Shen
, Longjun Huang, Jianhua Liu
, Adam C. Champion, Shui Yu
, Qiying Cao
:
Reliability Evaluation for Clustered WSNs under Malware Propagation. Sensors 16(6): 855 (2016) - [j66]Shui Yu
, Wanlei Zhou
, Song Guo
, Minyi Guo:
A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking. IEEE Trans. Computers 65(5): 1418-1427 (2016) - [j65]Deze Zeng, Lin Gu, Song Guo
, Zixue Cheng, Shui Yu
:
Joint Optimization of Task Scheduling and Image Placement in Fog Computing Supported Software-Defined Embedded System. IEEE Trans. Computers 65(12): 3702-3712 (2016) - [j64]Jun Huang, Ying Yin, Yanxiao Zhao, Qiang Duan, Wei Wang, Shui Yu
:
A Game-Theoretic Resource Allocation Approach for Intercell Device-to-Device Communications in Cellular Networks. IEEE Trans. Emerg. Top. Comput. 4(4): 475-486 (2016) - [j63]Aiqing Zhang, Jianxin Chen, Liang Zhou, Shui Yu
:
Graph Theory-Based QoE-Driven Cooperation Stimulation for Content Dissemination in Device-to-Device Communication. IEEE Trans. Emerg. Top. Comput. 4(4): 556-567 (2016) - [j62]Shouxi Luo, Hongfang Yu, Yangming Zhao, Sheng Wang, Shui Yu
, Lemin Li:
Towards Practical and Near-Optimal Coflow Scheduling for Data Center Networks. IEEE Trans. Parallel Distributed Syst. 27(11): 3366-3380 (2016) - [j61]Hongke Zhang, Wei Quan
, Jiayang Song, Zhongbai Jiang, Shui Yu
:
Link State Prediction-Based Reliable Transmission for High-Speed Railway Networks. IEEE Trans. Veh. Technol. 65(12): 9617-9629 (2016) - [c73]Jiao Jiao Jiang
, Youyang Qu
, Shui Yu
, Wanlei Zhou
, Wei Wu:
Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks. CIT 2016: 431-435 - [c72]Yihong Gao, Huadong Ma, Wu Liu, Shui Yu
:
Cost Optimal Resource Provisioning for Live Video Forwarding Across Video Data Centers. BigCom 2016: 27-38 - [c71]Xiaolong Xu, Wenping Wang, Taotao Wu, Wan-Chun Dou, Shui Yu
:
A Virtual Machine Scheduling Method for Trade-Offs Between Energy and Performance in Cloud Environment. CBD 2016: 246-251 - [c70]Jun Du, Chunxiao Jiang, Jian Wang, Shui Yu
, Yong Ren:
Trustable service rating in social networks: A peer prediction method. GlobalSIP 2016: 415-419 - [c69]Jun Du, Chunxiao Jiang, Shui Yu
, Kwang-Cheng Chen
, Yong Ren:
Privacy protection: A community-structured evolutionary game approach. GlobalSIP 2016: 1007-1011 - [c68]Bohao Feng
, Huachun Zhou, Hongke Zhang, Jiao Jiao Jiang
, Shui Yu
:
A Popularity-Based Cache Consistency Mechanism for Information-Centric Networking. GLOBECOM 2016: 1-6 - [c67]Yuanxiang Gao, Hong-Fang Yu, Shouxi Luo, Shui Yu
:
Efficient and Low-Delay Task Scheduling for Big Data Clusters in a Theoretical Perspective. GLOBECOM 2016: 1-6 - [c66]Jun Huang, Shihao Li, Qiang Duan, Ruozhou Yu
, Shui Yu
:
QoS Correlation-Aware Service Composition for Unified Network-Cloud Service Provisioning. GLOBECOM 2016: 1-6 - [c65]Jiao Jiao Jiang
, Sheng Wen
, Shui Yu
, Wanlei Zhou
, Yi Qian:
Analysis of the Spreading Influence Variations for Online Social Users under Attacks. GLOBECOM 2016: 1-6 - [c64]Long Luo, Hong-Fang Yu, Shouxi Luo, Mingui Zhang, Shui Yu
:
Achieving Fast and Lightweight SDN Updates with Segment Routing. GLOBECOM 2016: 1-6 - [c63]Laisen Nie
, Dingde Jiang, Lei Guo
, Shui Yu
, Houbing Song
:
Traffic Matrix Prediction and Estimation Based on Deep Learning for Data Center Networks. GLOBECOM Workshops 2016: 1-6 - [c62]Haolong Xiang, Xiaolong Xu, Haoquan Zheng, Shu Li, Taotao Wu, Wanchun Dou, Shui Yu
:
An Adaptive Cloudlet Placement Method for Mobile Applications over GPS Big Data. GLOBECOM 2016: 1-6 - [c61]Yong Zhan, Du Xu, Hongfang Yu, Shui Yu
:
Breaking the Split Incentive Hurdle via Time-Varying Monetary Rewards. GLOBECOM 2016: 1-6 - [c60]Shu Li, Fan Fei, Dou Ruihan, Shui Yu
, Wan-Chun Dou:
A Dynamic Pricing Method for Carpooling Service Based on Coalitional Game Analysis. HPCC/SmartCity/DSS 2016: 78-85 - [c59]Maqbool Khan
, Xiaolong Xu, Wanchun Dou, Shui Yu
:
OSaaS: Online Shopping as a Service to Escalate E-Commerce in Developing Countries. HPCC/SmartCity/DSS 2016: 1402-1409 - [c58]Jun Du, Chunxiao Jiang, Shui Yu
, Yong Ren:
Time cumulative complexity modeling and analysis for space-based networks. ICC 2016: 1-6 - [c57]Bohao Feng
, Huachun Zhou, Guanwen Li, Haifeng Li, Shui Yu
:
SAT-GRD: An ID/Loc split network architecture interconnecting satellite and ground networks. ICC 2016: 1-6 - [c56]Yuanxiang Gao, Hong-Fang Yu, Shouxi Luo, Shui Yu
:
Information-agnostic coflow scheduling with optimal demotion thresholds. ICC 2016: 1-6 - [c55]Jingjing Wang
, Chunxiao Jiang, Longxiang Gao, Shui Yu
, Zhu Han, Yong Ren:
Complex network theoretical analysis on information dissemination over vehicular networks. ICC 2016: 1-6 - [c54]Fan Fei, Shu Li, Wanchun Dou, Shui Yu
:
An Evolutionary Approach for Short-Term Traffic Flow Forecasting Service in Intelligent Transportation System. SmartCom 2016: 477-486 - [c53]Zhili Jia, Gang Xie, Jerry Gao, Shui Yu
:
Bike-Sharing System: A Big-Data Perspective. SmartCom 2016: 548-557 - [i1]Yong Zhan, Du Xu, Hong-Fang Yu, Shui Yu:
Incentivizing Users of Data Centers Participate in The Demand Response Programs via Time-Varying Monetary Rewards. CoRR abs/1604.01950 (2016) - 2015
- [b2]Longxiang Gao
, Shui Yu
, Tom H. Luan, Wanlei Zhou:
Delay Tolerant Networks. Springer Briefs in Computer Science, Springer 2015, ISBN 978-3-319-18107-3, pp. 1-85 - [j60]Feilong Tang, Ilsun You, Can Tang, Shui Yu
:
A profiling based task scheduling approach for multicore network processors. Concurr. Comput. Pract. Exp. 27(4): 855-869 (2015) - [j59]Deze Zeng, Song Guo
, Huawei Huang, Shui Yu
, Victor C. M. Leung:
Optimal VM placement in data centres with architectural and resource constraints. Int. J. Auton. Adapt. Commun. Syst. 8(4): 392-406 (2015) - [j58]Yonghong Tian, Jia Li, Shui Yu
, Tiejun Huang:
Learning Complementary Saliency Priors for Foreground Object Segmentation in Complex Scenes. Int. J. Comput. Vis. 111(2): 153-170 (2015) - [j57]Shui Yu
, Xiaodong Lin, Jelena V. Misic:
Networking for big data: part 2 [Guest Editorial]. IEEE Netw. 29(5): 4-5 (2015) - [j56]Shui Yu
, Guojun Wang, Wanlei Zhou
:
Modeling malicious activities in cyber space. IEEE Netw. 29(6): 83-87 (2015) - [j55]Shui Yu
:
Special Issue on networking aspects in Big Data. Int. J. Parallel Emergent Distributed Syst. 30(1): 3-4 (2015) - [j54]Shui Yu
, Song Guo
, Ivan Stojmenovic:
Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace. IEEE Trans. Computers 64(1): 139-151 (2015) - [j53]Deze Zeng, Song Guo
, Ahmed Barnawi, Shui Yu
, Ivan Stojmenovic:
An Improved Stochastic Modeling of Opportunistic Routing in Vehicular CPS. IEEE Trans. Computers 64(7): 1819-1829 (2015) - [j52]Yuan Zhang
, Chunxiang Xu, Shui Yu
, Hongwei Li, Xiaojun Zhang:
SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors. IEEE Trans. Comput. Soc. Syst. 2(4): 159-170 (2015) - [j51]Feng Luo, Chunxiao Jiang, Jun Du, Jian Yuan, Yong Ren, Shui Yu
, Mohsen Guizani:
A Distributed Gateway Selection Algorithm for UAV Networks. IEEE Trans. Emerg. Top. Comput. 3(1): 22-33 (2015) - [j50]Yucheng Dong, Zhi-Ping Fan, Shui Yu
:
Consensus Building in a Local Context for the AHP-GDM With the Individual Numerical Scale and Prioritization Method. IEEE Trans. Fuzzy Syst. 23(2): 354-368 (2015) - [j49]Jiao Jiao Jiang
, Sheng Wen
, Shui Yu
, Yang Xiang
, Wanlei Zhou
:
K-Center: An Approach on the Multi-Source Identification of Information Diffusion. IEEE Trans. Inf. Forensics Secur. 10(12): 2616-2626 (2015) - [j48]Shui Yu
, Guofei Gu, Ahmed Barnawi, Song Guo
, Ivan Stojmenovic:
Malware Propagation in Large-Scale Networks. IEEE Trans. Knowl. Data Eng. 27(1): 170-179 (2015) - [j47]Meng Liu, Wanchun Dou, Shui Yu
, Zhensheng Zhang:
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization. IEEE Trans. Parallel Distributed Syst. 26(3): 621-631 (2015) - [c52]Jerry Gao, Lihui Lei, Shui Yu
:
Big Data Sensing and Service: A Tutorial. BigDataService 2015: 79-88 - [c51]Wanchun Dou, Xiaolong Xu, Shunmei Meng, Shui Yu
:
An Energy-Aware QoS Enhanced Method for Service Computing across Clouds and Data Centers. CBD 2015: 80-87 - [c50]Maqbool Khan
, Meng Liu, Wanchun Dou, Shui Yu
:
vGraph: Graph Virtualization towards Big Data. CBD 2015: 153-158 - [c49]Jun Du, Chunxiao Jiang, Jian Wang, Shui Yu
, Yong Ren:
Stability Analysis and Resource Allocation for Space-Based Multi-Access Systems. GLOBECOM 2015: 1-6 - [c48]Kun Jia, Hongwei Li, Dongxiao Liu, Shui Yu
:
Enabling Efficient and Secure Outsourcing of Large Matrix Multiplications. GLOBECOM 2015: 1-6 - [c47]Keshav Sood
, Shigang Liu, Shui Yu
, Yong Xiang:
Dynamic access point association using Software Defined Networking. ITNAC 2015: 226-231 - [c46]Jiao Jiao Jiang
, Andi Zhou, Kasra Majbouri Yazdi, Sheng Wen
, Shui Yu
, Yang Xiang:
Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach. TrustCom/BigDataSE/ISPA (1) 2015: 302-309 - 2014
- [b1]Shui Yu
:
Distributed Denial of Service Attack and Defense. Springer Briefs in Computer Science, Springer 2014, ISBN 978-1-4614-9490-4, pp. i-x, 1-97 - [j46]Sancheng Peng, Min Wu, Guojun Wang, Shui Yu
:
Containing smartphone worm propagation with an influence maximization algorithm. Comput. Networks 74: 103-113 (2014) - [j45]Sancheng Peng, Min Wu, Guojun Wang, Shui Yu
:
Propagation model of smartphone worms based on semi-Markov process and social relationship graph. Comput. Secur. 44: 92-103 (2014) - [j44]Sancheng Peng, Shui Yu
, Aimin Yang:
Smartphone Malware and Its Propagation Modeling: A Survey. IEEE Commun. Surv. Tutorials 16(2): 925-941 (2014) - [j43]Shui Yu
, Keshav Sood
, Yong Xiang:
An Effective and Feasible Traceback Scheme in Mobile Internet Environment. IEEE Commun. Lett. 18(11): 1911-1914 (2014) - [j42]Sudarshan Kudlur Satyanarayana, Keshav Sood
, Yuan Tao, Shui Yu:
Security and Privacy in Online Social Networks: A Survey. EAI Endorsed Trans. Ind. Networks Intell. Syst. 1(1): e3 (2014) - [j41]Yonghong Tian, Shui Yu, Chin-Yung Lin, Wen Gao, Wanlei Zhou:
Guest Editorial. J. Multim. 9(1): 1-3 (2014) - [j40]Shui Yu
, Xiaodong Lin, Jelena V. Misic:
Networking for big data [Guest Editorial]. IEEE Netw. 28(4): 4 (2014) - [j39]Sheng Wen
, Jiao Jiao Jiang
, Yang Xiang
, Shui Yu
, Wanlei Zhou
:
Are the popular users always important for information dissemination in online social networks? IEEE Netw. 28(5): 64-67 (2014) - [j38]Theerasak Thapngam, Shui Yu
, Wanlei Zhou
, S. Kami Makki:
Distributed Denial of Service (DDoS) detection by traffic pattern analysis. Peer-to-Peer Netw. Appl. 7(4): 346-358 (2014) - [j37]Song Guo
, Minyi Guo, Victor C. M. Leung
, Shui Yu
, Yong Xiang:
On the Multicast Lifetime of WANETs with Multibeam Antennas: Formulation, Algorithms, and Analysis. IEEE Trans. Computers 63(8): 1988-2001 (2014) - [j36]Shui Yu
, Yonghong Tian, Song Guo
, Dapeng Oliver Wu
:
Can We Beat DDoS Attacks in Clouds? IEEE Trans. Parallel Distributed Syst. 25(9): 2245-2254 (2014) - [j35]Peng Li, Song Guo
, Shui Yu
, Athanasios V. Vasilakos
:
Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing. IEEE Trans. Parallel Distributed Syst. 25(12): 3264-3273 (2014) - [j34]Sheng Wen
, Jiao Jiao Jiang
, Yang Xiang
, Shui Yu
, Wanlei Zhou
, Weijia Jia
:
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks. IEEE Trans. Parallel Distributed Syst. 25(12): 3306-3316 (2014) - [c45]He Li
, Peng Li, Song Guo
, Shui Yu
:
Byzantine-resilient secure software-defined networks with multiple controllers. ICC 2014: 695-700 - [c44]Chuan Xu, Guofeng Zhao, Gaogang Xie, Shui Yu
:
Detection on application layer DDoS using random walk model. ICC 2014: 707-712 - [c43]Guofeng Zhao, Dan Li, Chuan Xu, Hong Tang, Shui Yu
:
Network dynamics of mobile social networks. ICC 2014: 2478-2483 - [c42]Meng Liu, Wan-Chun Dou, Shui Yu
, Zhensheng Zhang:
A clusterized firewall framework for cloud computing. ICC 2014: 3788-3793 - [c41]Lin Gu, Deze Zeng, Song Guo
, Shui Yu
:
Type-aware task placement in geo-distributed data centers with low OPEX using data center resizing. ICNC 2014: 211-215 - 2013
- [j33]Yucheng Dong, Wei-Chiang Hong
, Yinfeng Xu, Shui Yu
:
Numerical scales generated individually for analytic hierarchy process. Eur. J. Oper. Res. 229(3): 654-662 (2013) - [j32]Sancheng Peng, Guojun Wang, Shui Yu
:
Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones. J. Comput. Syst. Sci. 79(5): 586-595 (2013) - [j31]Ahmed Hassan Mohammed, Bin Dai, Benxiong Huang, Muhammad Azhar Iqbal, Guan Xu, Peng Qin, Shui Yu
:
A survey and tutorial of wireless relay network protocols based on network coding. J. Netw. Comput. Appl. 36(2): 593-610 (2013) - [j30]Chuan Xu, C. Du, Guofeng Zhao, Shui Yu
:
A novel model for user clicks identification based on hidden semi-Markov. J. Netw. Comput. Appl. 36(2): 791-798 (2013) - [j29]Yucheng Dong, Guiqing Zhang, Wei-Chiang Hong
, Shui Yu
:
Linguistic Computational Model Based on 2-Tuples and Intervals. IEEE Trans. Fuzzy Syst. 21(6): 1006-1018 (2013) - [j28]Robin Doss
, Wanlei Zhou
, Shui Yu
:
Secure RFID Tag Ownership Transfer Based on Quadratic Residues. IEEE Trans. Inf. Forensics Secur. 8(2): 390-401 (2013) - [j27]Longxiang Gao, Ming Li, Alessio Bonti
, Wanlei Zhou
, Shui Yu
:
Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks. IEEE Trans. Mob. Comput. 12(11): 2132-2144 (2013) - [j26]Yi Xie, Jiankun Hu
, Yang Xiang
, Shui Yu
, Shensheng Tang, Yu Wang
:
Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration. IEEE Trans. Parallel Distributed Syst. 24(9): 1807-1817 (2013) - [c40]Qiang Liu, Jianping Yin, Shui Yu
:
A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology. CSS 2013: 243-257 - [c39]Shui Yu
, Wanlei Zhou
, Song Guo
, Minyi Guo:
A dynamical Deterministic Packet Marking scheme for DDoS traceback. GLOBECOM 2013: 729-734 - [c38]Sancheng Peng, Guojun Wang, Shui Yu
:
Mining Mechanism of Top-k Influential Nodes Based on Voting Algorithm in Mobile Social Networks. HPCC/EUC 2013: 2194-2199 - [c37]Shui Yu
, Robin Doss
, Wanlei Zhou
, Song Guo
:
A general cloud firewall framework with dynamic resource allocation. ICC 2013: 1941-1945 - [c36]Biming Tian, Kathryn E. Merrick
, Shui Yu
, Jiankun Hu
:
A hierarchical pea-based anomaly detection model. ICNC 2013: 621-625 - [c35]Sancheng Peng, Guojun Wang, Shui Yu
:
Modeling Malware Propagation in Smartphone Social Networks. TrustCom/ISPA/IUCC 2013: 196-201 - [c34]Yuan Tao, Shui Yu
:
DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics. TrustCom/ISPA/IUCC 2013: 233-240 - 2012
- [j25]Feilong Tang, Can Tang, Minyi Guo, Song Guo, Shui Yu:
Service-Oriented Wireless Sensor Networks and an Energy-Aware Mesh Routing Algorithm. Ad Hoc Sens. Wirel. Networks 15(1): 21-46 (2012) - [j24]Shui Yu
, Wanlei Zhou
, Weijia Jia
, Jiankun Hu
:
Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics. Comput. J. 55(4): 410-421 (2012) - [j23]Feilong Tang, Ilsun You, Shui Yu
, Cho-Li Wang, Minyi Guo, Wenlong Liu:
An efficient deadlock prevention approach for service oriented transaction processing. Comput. Math. Appl. 63(2): 458-468 (2012) - [j22]Robin Doss
, Wanlei Zhou
, Saravanan Sundaresan, Shui Yu
, Longxiang Gao:
A minimum disclosure approach to authentication and privacy in RFID systems. Comput. Networks 56(15): 3401-3416 (2012) - [j21]Feilong Tang, Ilsun You, Shui Yu, Huakang Li, Cho-Li Wang:
Grid transaction management and an efficient development kit. Comput. Syst. Sci. Eng. 27(5) (2012) - [j20]Xinwang Liu
, Yuwen Pan, Yejun Xu
, Shui Yu
:
Least square completion and inconsistency repair methods for additively consistent fuzzy preference relations. Fuzzy Sets Syst. 198: 1-19 (2012) - [j19]Jiao Jiao Jiang, Haibin Zhang, Shui Yu
:
An interior point trust region method for nonnegative matrix factorization. Neurocomputing 97: 309-316 (2012) - [j18]Longxiang Gao, Ming Li, Alessio Bonti
, Wanlei Zhou
, Shui Yu
:
M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models. J. Netw. Comput. Appl. 35(4): 1285-1296 (2012) - [j17]Yong Xiang, Iynkaran Natgunanathan, Dezhong Peng, Wanlei Zhou
, Shui Yu
:
A Dual-Channel Time-Spread Echo Method for Audio Watermarking. IEEE Trans. Inf. Forensics Secur. 7(2): 383-392 (2012) - [j16]Shui Yu
, Guofeng Zhao, Wanchun Dou, Simon James
:
Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks. IEEE Trans. Inf. Forensics Secur. 7(4): 1381-1393 (2012) - [j15]Felix Musau, Guojun Wang, Shui Yu
, Muhammad Bashir Abdullahi
:
Securing Recommendations in Grouped P2P E-Commerce Trust Model. IEEE Trans. Netw. Serv. Manag. 9(4): 407-420 (2012) - [j14]Shui Yu
, Wanlei Zhou
, Weijia Jia
, Song Guo
, Yong Xiang, Feilong Tang:
Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient. IEEE Trans. Parallel Distributed Syst. 23(6): 1073-1080 (2012) - [j13]Xinwang Liu
, Shui Yu
:
On the Stress Function-Based OWA Determination Method With Optimization Criteria. IEEE Trans. Syst. Man Cybern. Part B 42(1): 246-257 (2012) - [c33]Theerasak Thapngam, Shui Yu
, Wanlei Zhou
:
DDoS discrimination by Linear Discriminant Analysis (LDA). ICNC 2012: 532-536 - [c32]Shui Yu
, Wanlei Zhou
, Wanchun Dou, S. Kami Makki:
Why it is Hard to Fight against Cyber Criminals? ICDCS Workshops 2012: 537-541 - [c31]Peng Li, Song Guo
, Shui Yu
, Athanasios V. Vasilakos
:
CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. INFOCOM 2012: 100-108 - [c30]Shui Yu
, Song Guo
, Ivan Stojmenovic:
Can we beat legitimate cyber behavior mimicking attacks from botnets? INFOCOM 2012: 2851-2855 - [c29]Longxiang Gao, Ming Li, Tianqing Zhu, Alessio Bonti
, Wanlei Zhou
, Shui Yu
:
AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs. TrustCom 2012: 1245-1250 - 2011
- [j12]Feilong Tang, Can Tang, Minyi Guo, Shui Yu, Song Guo:
A Shadow-Like Task Migration Model Based on Context Semantics for Mobile and Pervasive Environments. Comput. Informatics 30(6): 1131-1146 (2011) - [j11]Jun Yang, Bin Dai, Benxiong Huang, Shui Yu
:
Orthogonal feedback scheme for network coding. J. Netw. Comput. Appl. 34(5): 1623-1633 (2011) - [j10]Muhammad Azhar Iqbal
, Bin Dai, Benxiong Huang, A. Hassan, Shui Yu
:
Survey of network coding-aware routing protocols in wireless networks. J. Netw. Comput. Appl. 34(6): 1956-1970 (2011) - [j9]Yucheng Dong, Hui Hong, Yinfeng Xu, Shui Yu
:
Selecting the Individual Numerical Scale and Prioritization Method in the Analytic Hierarchy Process: A 2-Tuple Fuzzy Linguistic Approach. IEEE Trans. Fuzzy Syst. 19(1): 13-25 (2011) - [j8]Shui Yu
, Wanlei Zhou
, Robin Doss
, Weijia Jia
:
Traceback of DDoS Attacks Using Entropy Variations. IEEE Trans. Parallel Distributed Syst. 22(3): 412-425 (2011) - [j7]Dezhong Peng, Yong Xiang, Zhang Yi, Shui Yu
:
CM-Based Blind Equalization of Time-Varying SIMO-FIR Channel With Single Pulsation Estimation. IEEE Trans. Veh. Technol. 60(5): 2410-2415 (2011) - [c28]Qi Chen, Wenmin Lin, Wanchun Dou, Shui Yu
:
CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment. DASC 2011: 427-434 - [c27]Chih-Hao Hsu, Peng Li, Song Guo
, Shui Yu
, Zhuzhong Qian:
Multicast Lifetime Maximization Using Network Coding in Lossy Wireless Ad Hoc Networks. EUC 2011: 95-99 - [c26]Gleb Beliakov
, Shui Yu
, Daniel Paternain
:
Non-monotone averaging aggregation. FUZZ-IEEE 2011: 2905-2908 - [c25]S. Kami Makki, Narasimha Bharadwaj Srirangam, Venkata Susheel Aiswarya, Shui Yu
:
Utilizing Intelligent Middleware for Reconfiguration of Applications on Android. ICHIT (1) 2011: 81-89 - [c24]Lei Zhang, Shui Yu
, Di Wu
, Paul A. Watters
:
A Survey on Latest Botnet Attack and Defense. TrustCom 2011: 53-60 - [c23]Deze Zeng, Song Guo
, Hai Jin, Shui Yu
:
On the maximum throughput of two-hop wireless network coding. WCNC 2011: 416-421 - 2010
- [c22]Shui Yu
, Theerasak Thapngam, Su Wei, Wanlei Zhou
:
Efficient Web Browsing with Perfect Anonymity Using Page Prefetching. ICA3PP (1) 2010: 1-12
2000 – 2009
- 2009
- [j6]Yucheng Dong, Yinfeng Xu, Shui Yu
:
Linguistic multiperson decision making based on the use of multiple preference relations. Fuzzy Sets Syst. 160(5): 603-623 (2009) - [j5]Ke Li, Wanlei Zhou
, Shui Yu
:
Effective metric for detecting distributed denial-of-service attacks based on information divergence. IET Commun. 3(12): 1851-1860 (2009) - [j4]Robin Doss
, Gang Li
, Vicky Mak
, Shui Yu
, Morshed U. Chowdhury
:
Improving the QoS for information discovery in autonomic wireless sensor networks. Pervasive Mob. Comput. 5(4): 334-349 (2009) - [j3]Yucheng Dong, Yinfeng Xu, Shui Yu
:
Computing the Numerical Scale of the Linguistic Term Set for the 2-Tuple Fuzzy Linguistic Representation Model. IEEE Trans. Fuzzy Syst. 17(6): 1366-1378 (2009) - [c21]Ke Li, Wanlei Zhou
, Shui Yu
, Bo Dai:
Effective DDoS Attacks Detection Using Generalized Entropy Metric. ICA3PP 2009: 266-280 - [c20]Shui Yu
, Theerasak Thapngam, Jianwen Liu, Su Wei, Wanlei Zhou
:
Discriminating DDoS Flows from Flash Crowds Using Information Distance. NSS 2009: 351-356 - 2008
- [j2]Shui Yu
, Wanlei Zhou
, Robin Doss
:
Information theory based detection against network behavior mimicking DDoS attacks. IEEE Commun. Lett. 12(4): 318-321 (2008) - [c19]Shui Yu
, Robin Doss
, Theerasak Thapngam, David Qian:
A Transformation Model for Heterogeneous Servers. HPCC 2008: 665-671 - [c18]Robin Doss, Gang Li
, Shui Yu
, Vicky Mak
, Morshed U. Chowdhury:
The Crossroads Approach to Information Discovery in Wireless Sensor Networks. ICDCN 2008: 310-321 - [c17]Shui Yu
, Wanlei Zhou
:
Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks. PerCom 2008: 566-571 - 2007
- [c16]Shui Yu
, Zhongwen Li:
Massive Data Delivery in Unstructured Peer-to-Peer Networks with Network Coding. ACIS-ICIS 2007: 592-597 - [c15]Ke Li, Wanlei Zhou, Shui Yu
, Bo Dai:
A Parallel Downloading Algorithm for Redundant Networks. CIT 2007: 177-182 - [c14]Ke Li, Wanlei Zhou, Shui Yu
, Ping Li:
Novel Data Management Algorithms in Peer-to-Peer Content Distribution Networks. KSEM 2007: 538-543 - [c13]Ke Li, Wanlei Zhou, Shui Yu
, Yunsheng Zhang:
A Resource-Search and Routing Algorithm within PCDN Autonomy Area. PDCAT 2007: 509-514 - [c12]Ke Li, Wanlei Zhou, Shui Yu:
An Enhanced Parallel Downloading Algorithm for BT. PDPTA 2007: 1023-1027 - 2006
- [c11]Shui Yu, Zhongwen Li, Bin Liu:
Online Algorithm for Application Layer Anycast. AMT 2006: 340-345 - [c10]Zhongwen Li, Hong Chen, Shui Yu:
Performance optimization for energy-aware adaptive checkpointing in embedded real-time systems. DATE 2006: 678-683 - 2005
- [c9]Shui Yu
, Wanlei Zhou
:
An Efficient Reliable Architecture for Application Layer Anycast Service. ICA3PP 2005: 376-385 - [c8]Shui Yu
, Wanlei Zhou
:
A Mesh Based Anycast Routing Protocol for Ad Hoc Networks. ISPA 2005: 927-932 - 2004
- [c7]Shui Yu, Wanlei Zhou, John Casey:
Load Balance Algorithms for Anycast. iiWAS 2004 - [c6]Shui Yu
, Wanlei Zhou
, Justin T. Rough
:
Minicast: A Multicast-Anycast Protocol for Message Delivery. ISPA 2004: 798-803 - [c5]Shui Yu
, Wanlei Zhou:
A Novel Middleware Based Web Database Model. Web Intelligence 2004: 533-536 - 2003
- [j1]Ying Zhao, Wanlei Zhou
, Jiumei Huang, Shui Yu
:
Self-Adaptive Clock Synchronization for Computational Grid. J. Comput. Sci. Technol. 18(4): 434-441 (2003) - [c4]Ying Zhao, Wanlei Zhou, Elicia Lanham, Shui Yu, Mingjun Lan:
Self-Adaptive Clock Synchronization Based on Clock Precision Difference. ACSC 2003: 181-187 - [c3]Shui Yu
, John Casey, Wanlei Zhou
:
A Load Balancing Algorithm for Web Based Server Grids. GCC (2) 2003: 121-128 - [c2]Shui Yu, Wanlei Zhou, Weijia Jia:
Fault-Tolerant Servers for Anycast Communication. PDPTA 2003: 1244-1250 - 2002
- [c1]Shui Yu
, Wanlei Zhou
, Fuchun Huang, Mingjun Lan:
An Efficient Algorithm for Application-Layer Anycasting. DCW 2002: 74-83
Coauthor Index
aka: Wanchun Dou
aka: Jiao Jiao Jiang

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-21 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint