Fei Yu

Orcid: 0000-0002-2217-578X

Affiliations:
  • Peoples' Friendship University of Russia, Moscow, Russia
  • Soochow University, China (former)
  • Jiangsu Provincial Key Laboratory for Computer Information Processing Technology, Suzhou, China (former)
  • Hunan University, Changsha, China (former)


According to our database1, Fei Yu authored at least 64 papers between 2005 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
Recent Advances in Security and Privacy for Wireless Sensor Networks 2016.
J. Sensors, 2017

2015
Recent Advances in Security and Privacy for Wireless Sensor Networks.
J. Sensors, 2015

2013
Survey of DCA for Abnormal Detection.
J. Softw., 2013

The System Design of a Node of P2P Networks for Intrusion Detection.
J. Networks, 2013

A Classification Algorithm for Network Traffic based on Improved Support Vector Machine.
J. Comput., 2013

2012
Research on Intrusion Detection Model of Heterogeneous Attributes Clustering.
J. Softw., 2012

Guest Editors' Introduction: Special Section on ISIP 2011.
J. Multim., 2012

Distributed Firewall with Intrusion Detection System.
J. Comput., 2012

2011
A Content-based Classified Hierarchical Vector Quantization Algorithm for Volume Compression.
J. Softw., 2011

Assigning Method for Decision Power Based on Linguisitc 2-tuple Judgment Matrices.
J. Softw., 2011

Guest Editorial.
J. Softw., 2011

Guest Editorial.
J. Networks, 2011

A Survey of Game Theory in Wireless Sensor Networks Security.
J. Networks, 2011

Research on 3G-based Mobile Self-rescue System for Medical Emergency.
J. Networks, 2011

Privacy Preservation in Role-based Access Control Model.
J. Networks, 2011

Automated Trust Negotiation with Time Behavior.
J. Networks, 2011

An Improved Speech Enhancement Method based on Teager Energy Operator and Perceptual Wavelet Packet Decomposition.
J. Multim., 2011

Multi-agent Middleware for the Integration of Mobile Supply Chain.
J. Comput., 2011

An Improving MFCC Features Extraction Based on FastICA Algorithm plus RASTA Filtering.
J. Comput., 2011

Guest Editorial.
J. Comput., 2011

A Method for Semantic Web Service Selection Based on QoS Ontology.
J. Comput., 2011

Voice activity detection method based on multivalued coarse-graining Lempel-Ziv complexity.
Comput. Sci. Inf. Syst., 2011

2010
Guest Editorial.
J. Softw., 2010

Guest Editorial.
J. Softw., 2010

Guest Editorial.
J. Networks, 2010

Guest Editorial.
J. Networks, 2010

Guest Editorial.
J. Multim., 2010

A New Judging and Revising Method for Ordinal Consistency of Fuzzy Judgment Matrix.
J. Comput., 2010

Guest Editorial.
J. Comput., 2010

Guest Editorial.
J. Comput., 2010

2009
Editorial.
J. Softw., 2009

Editorial.
J. Softw., 2009

Editorial.
J. Networks, 2009

Research of Secure Intranet/Internet Access Platform Based on Ontology.
J. Networks, 2009

Editorial.
J. Multim., 2009

Editorial.
J. Comput., 2009

Editorial.
J. Comput., 2009

HW-SW Framework for Multimedia Applications on MPSoC: Practice and Experience.
J. Comput., 2009

2008
Editorial.
J. Softw., 2008

Editorial.
J. Comput., 2008

Editorial.
J. Commun., 2008

Editorial.
J. Commun., 2008

Design and Implementation of Embedded Multimedia Surveillance System.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

Intrusion Detection for High-Speed Networks Based on Producing System.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

2007
E-learning System Based on Neural Networks.
Proceedings of the World Congress on Engineering, 2007

Distributed Denial of Service Attacks Alarm Modeling Based on Wireless Local Area Network.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Simulation of Wireless Local Area Network.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

An Improved Algorithm of Pattern Matching for Information Security Audit System.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

The Implementation of Evidence Theory in Mobile E-Business Payment.
Proceedings of the Workshop on Intelligent Information Technology Application, 2007

An Access Control Model in Lager-Scale P2P File Sharing Systems.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Catastrophe Prediction of Cnaphalocrosis Medinalis Based on Fuzzy Reasoning.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Research on Advanced Distributed Learning by Using SCORM.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Research on Speech Emotion Recognition System in E-Learning.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation.
Proceedings of the 2006 International Conference on Semantics, 2006

Data Distribution Algorithm of High-Speed Intrusion Detection system Based on Network Processor.
Proceedings of the 2006 International Conference on Semantics, 2006

Research on User Authentication for Grid Computing Security.
Proceedings of the 2006 International Conference on Semantics, 2006

Research on Remote Heterogeneous Disaster Recovery Technology in Grid Computing Security.
Proceedings of the 2006 International Conference on Semantics, 2006

A Mobility-Aware Zone-Based Routing Protocol for Mobile Grid Computing.
Proceedings of the 2006 International Conference on Semantics, 2006

Intrusion Detection Based on Fuzzy Neural Networks.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

PVM: A Memory Management under Vertical Architecture.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Worm Intrusion Alarm Modeling Based on Network Traffic Character.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A Privacy Policy of P3P Based on Relational Database.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

An Information Audit System Based on Bayes Algorithm.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
Badness Information Audit Based on Image Character Filtering.
Proceedings of the Parallel and Distributed Processing and Applications, 2005


  Loading...