Shui Yu

According to our database1, Shui Yu authored at least 254 papers between 2002 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Network Traffic Prediction Based on Deep Belief Network and Spatiotemporal Compressive Sensing in Wireless Mesh Backbone Networks.
Wireless Communications and Mobile Computing, 2018

Collaborative ensemble learning under differential privacy.
Web Intelligence, 2018

A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks.
IEEE Trans. Network and Service Management, 2018

Improving SDN Scalability With Protocol-Oblivious Source Routing: A System-Level Study.
IEEE Trans. Network and Service Management, 2018

SERvICE: A Software Defined Framework for Integrated Space-Terrestrial Satellite Communication.
IEEE Trans. Mob. Comput., 2018

Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds.
IEEE Trans. Emerging Topics Comput., 2018

Rumor Source Identification in Social Networks with Time-Varying Topology.
IEEE Trans. Dependable Sec. Comput., 2018

A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks.
IEEE Trans. Comput. Social Systems, 2018

Converged Network-Cloud Service Composition with End-to-End Performance Guarantee.
IEEE Trans. Cloud Computing, 2018

An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks.
ICST Trans. Security Safety, 2018

A Collaborative Data Collection Scheme Based on Optimal Clustering for Wireless Sensor Networks.
Sensors, 2018

Sequential time-dependent reliability analysis for the lower extremity exoskeleton under uncertainty.
Rel. Eng. & Sys. Safety, 2018

Quality-of-sensing aware budget constrained contaminant detection sensor deployment in water distribution system.
J. Network and Computer Applications, 2018

Toward efficient parallel routing optimization for large-scale SDN networks using GPGPU.
J. Network and Computer Applications, 2018

Influence analysis in social networks: A survey.
J. Network and Computer Applications, 2018

Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server.
J. Network and Computer Applications, 2018

DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems.
J. Network and Computer Applications, 2018

DDSE: A novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks.
J. Network and Computer Applications, 2018

Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks.
IEEE Internet of Things Journal, 2018

Privacy issues in social networks and analysis: a comprehensive survey.
IET Networks, 2018

Tuna: An Efficient and Practical Scheme for Wireless Access Point in 5G Networks Virtualization.
IEEE Communications Letters, 2018

Social networking big data: Opportunities, solutions, and challenges.
Future Generation Comp. Syst., 2018

Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective.
IEEE Communications Magazine, 2018

Parallel and Progressive Approaches for Skyline Query Over Probabilistic Incomplete Database.
IEEE Access, 2018

Robust Design for the Lower Extremity Exoskeleton Under a Stochastic Terrain by Mimicking Wolf Pack Behaviors.
IEEE Access, 2018

Efficient Performance Monitoring for Ubiquitous Virtual Networks Based on Matrix Completion.
IEEE Access, 2018

Profit-Aware Distributed Online Scheduling for Data-Oriented Tasks in Cloud Datacenters.
IEEE Access, 2018

A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View.
IEEE Access, 2018

IEEE Access Special Section Editorial: Green Cloud and Fog Computing: Energy Efficiency and Sustainability Aware Infrastructures, Protocols, and Applications.
IEEE Access, 2018

Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Empirical study on taxi's mobility nature in dense urban area.
Proceedings of the IEEE INFOCOM 2018, 2018

New Algorithm for Secure Outsourcing of Modular Exponentiation with Optimal Checkability Based on Single Untrusted Server.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Analyzing and Modelling the Interference Impact on Energy Efficiency of WLANs.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Energy-Efficient Virtual Network Function Placement in Telecom Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Green Social CPS Based E-Healthcare Systems to Control the Spread of Infectious Diseases.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Deadline-Aware Coflow Scheduling Approach for Big Data Applications.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Improving Data Utility through Game Theory in Personalized Differential Privacy.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

High Energy Efficiency Transmission in MIMO Satellite Communications.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An SMDP-Based Service Function Allocation Scheme for Mobile Edge Clouds.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Trust-Grained Personalized Privacy-Preserving Scheme for Big Social Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Inference Attack in Android Activity based on Program Fingerprint.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Full Cycle Campus Life of College Students: A Big Data Case in China.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018

A survey on big data stream processing in SDN supported cloud environment.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
A Scalable and Smart Hierarchical Wireless Communication Architecture Based on Network/User Separation.
IEEE Wireless Commun., 2017

Enhancing Vehicular Communication Using 5G-Enabled Smart Collaborative Networking.
IEEE Wireless Commun., 2017

A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment.
IEEE Trans. Parallel Distrib. Syst., 2017

Impairment- and Splitting-Aware Cloud-Ready Multicast Provisioning in Elastic Optical Networks.
IEEE/ACM Trans. Netw., 2017

Mobile Live Video Streaming Optimization via Crowdsourcing Brokerage.
IEEE Trans. Multimedia, 2017

Resource Allocation in Space Multiaccess Systems.
IEEE Trans. Aerospace and Electronic Systems, 2017

HetNet: A Flexible Architecture for Heterogeneous Satellite-Terrestrial Networks.
IEEE Network, 2017

Online multi-objective optimization for live video forwarding across video data centers.
J. Visual Communication and Image Representation, 2017

A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion.
J. Network and Computer Applications, 2017

Modeling and performance analysis for multimedia data flows scheduling in software defined networks.
J. Network and Computer Applications, 2017

Social influence modeling using information theory in mobile social networks.
Inf. Sci., 2017

FogRoute: DTN-Based Data Dissemination Model in Fog Computing.
IEEE Internet of Things Journal, 2017

How to shutdown a cloud: a DDoS attack in a private infrastructure-as-a-service cloud.
IJAACS, 2017

Local Fast Reroute With Flow Aggregation in Software Defined Networks.
IEEE Communications Letters, 2017

A Sleeping and Offloading Optimization Scheme for Energy-Efficient WLANs.
IEEE Communications Letters, 2017

Complex Network Theoretical Analysis on Information Dissemination over Vehicular Networks.
CoRR, 2017

The structure of communities in scale-free networks.
Concurrency and Computation: Practice and Experience, 2017

An energy-aware virtual machine scheduling method for service QoS enhancement in clouds over big data.
Concurrency and Computation: Practice and Experience, 2017

Networking for Big Data: A Survey.
IEEE Communications Surveys and Tutorials, 2017

Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Communications Surveys and Tutorials, 2017

Locator/Identifier Split Networking: A Promising Future Internet Architecture.
IEEE Communications Surveys and Tutorials, 2017

Enhancing Crowd Collaborations for Software Defined Vehicular Networks.
IEEE Communications Magazine, 2017

An efficient and fast GPU-based algorithm for visualizing large volume of 4D data from virtual heart simulations.
Biomed. Signal Proc. and Control, 2017

A Novel Multipath-Transmission Supported Software Defined Wireless Network Architecture.
IEEE Access, 2017

Scoring Users' Privacy Disclosure Across Multiple Online Social Networks.
IEEE Access, 2017

Network Traffic Prediction Based on Deep Belief Network in Wireless Mesh Backbone Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Amplified Locality-Sensitive Hashing for Privacy-Preserving Distributed Service Recommendation.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Cloud Service Enhanced Method Supporting Context-Aware Applications.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Towards an Analysis of Traffic Shaping and Policing in Fog Networks Using Stochastic Fluid Models.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Distance-based location privacy protection in social networks.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

FuzzyDP: Fuzzy-based big data publishing against inquiry attacks.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Preferential attachment and the spreading influence of users in online social networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

On the two time scale characteristics of wireless high speed railway networks.
Proceedings of the IEEE International Conference on Communications, 2017

Big data set privacy preserving through sensitive attribute-based grouping.
Proceedings of the IEEE International Conference on Communications, 2017

Modeling software defined satellite networks using queueing theory.
Proceedings of the IEEE International Conference on Communications, 2017

Loss-aware adaptive scalable transmission in wireless high-speed railway networks.
Proceedings of the IEEE International Conference on Communications, 2017

Flow Entry Sharing in Protection Design for Software Defined Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Fuzzy Multi-Attribute Utility Based Network Selection Approach for High-Speed Railway Scenario.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Reliability of Cloud Controlled Multi-UAV Systems for On-Demand Services.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Resource-Efficient Virtual Network Function Placement in Operator Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Hybrid Location Privacy Protection Scheme in Big Data Environment.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

HCaching: High-Speed Caching for Information-Centric Networking.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Joint Virtual Network Function Selection and Traffic Steering in Telecom Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Are current resources in SDN allocated to maximum performance and minimize costs and maintaining QoS problems?
Proceedings of the Australasian Computer Science Week Multiconference, 2017

Privacy preserving in big data sets through multiple shuffle.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Link State Prediction-Based Reliable Transmission for High-Speed Railway Networks.
IEEE Trans. Vehicular Technology, 2016

Towards Practical and Near-Optimal Coflow Scheduling for Data Center Networks.
IEEE Trans. Parallel Distrib. Syst., 2016

Graph Theory-Based QoE-Driven Cooperation Stimulation for Content Dissemination in Device-to-Device Communication.
IEEE Trans. Emerging Topics Comput., 2016

A Game-Theoretic Resource Allocation Approach for Intercell Device-to-Device Communications in Cellular Networks.
IEEE Trans. Emerging Topics Comput., 2016

Joint Optimization of Task Scheduling and Image Placement in Fog Computing Supported Software-Defined Embedded System.
IEEE Trans. Computers, 2016

A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking.
IEEE Trans. Computers, 2016

Reliability Evaluation for Clustered WSNs under Malware Propagation.
Sensors, 2016

DDoS attacks on data plane of software-defined network: are they possible?
Security and Communication Networks, 2016

A scalable and automatic mechanism for resource allocation in self-organizing cloud.
Peer-to-Peer Networking and Applications, 2016

Big data for networking [Guest Editorial].
IEEE Network, 2016

FUIR: Fusing user and item information to deal with data sparsity by using side information in recommendation systems.
J. Network and Computer Applications, 2016

Traffic matrix prediction and estimation based on deep learning in large-scale IP backbone networks.
J. Network and Computer Applications, 2016

Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review.
IEEE Internet of Things Journal, 2016

Performance Analysis of Software-Defined Network Switch Using M/Geo/1 Model.
IEEE Communications Letters, 2016

Incentivizing Users of Data Centers Participate in The Demand Response Programs via Time-Varying Monetary Rewards.
CoRR, 2016

Cloud Security.
IEEE Cloud Computing, 2016

Special Issue on Big Data from networking perspective.
Big Data Research, 2016

Interference-Aware Coordinated Power Allocation in Autonomous Wi-Fi Environment.
IEEE Access, 2016

Editorial for IEEE Access Special Section on Theoretical Foundations for Big Data Applications: Challenges and Opportunities.
IEEE Access, 2016

Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data.
IEEE Access, 2016

A General QoS Aware Flow-Balancing and Resource Management Scheme in Distributed Software-Defined Networks.
IEEE Access, 2016

When Will You Have a New Mobile Phone? An Empirical Answer From Big Data.
IEEE Access, 2016

Bike-Sharing System: A Big-Data Perspective.
Proceedings of the Smart Computing and Communication, 2016

An Evolutionary Approach for Short-Term Traffic Flow Forecasting Service in Intelligent Transportation System.
Proceedings of the Smart Computing and Communication, 2016

Complex network theoretical analysis on information dissemination over vehicular networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Information-agnostic coflow scheduling with optimal demotion thresholds.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

SAT-GRD: An ID/Loc split network architecture interconnecting satellite and ground networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Time cumulative complexity modeling and analysis for space-based networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Dynamic Pricing Method for Carpooling Service Based on Coalitional Game Analysis.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

OSaaS: Online Shopping as a Service to Escalate E-Commerce in Developing Countries.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Breaking the Split Incentive Hurdle via Time-Varying Monetary Rewards.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

An Adaptive Cloudlet Placement Method for Mobile Applications over GPS Big Data.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Traffic Matrix Prediction and Estimation Based on Deep Learning for Data Center Networks.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

Achieving Fast and Lightweight SDN Updates with Segment Routing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Analysis of the Spreading Influence Variations for Online Social Users under Attacks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

QoS Correlation-Aware Service Composition for Unified Network-Cloud Service Provisioning.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Efficient and Low-Delay Task Scheduling for Big Data Clusters in a Theoretical Perspective.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Popularity-Based Cache Consistency Mechanism for Information-Centric Networking.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Privacy protection: A community-structured evolutionary game approach.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Trustable service rating in social networks: A peer prediction method.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

A Virtual Machine Scheduling Method for Trade-Offs Between Energy and Performance in Cloud Environment.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

Effect of precipitation on the wind retrieval from synthetic aperture radar.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

Cost Optimal Resource Provisioning for Live Video Forwarding Across Video Data Centers.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016

Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Delay Tolerant Networks
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-18108-0, 2015

A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization.
IEEE Trans. Parallel Distrib. Syst., 2015

Malware Propagation in Large-Scale Networks.
IEEE Trans. Knowl. Data Eng., 2015

K-Center: An Approach on the Multi-Source Identification of Information Diffusion.
IEEE Trans. Information Forensics and Security, 2015

Consensus Building in a Local Context for the AHP-GDM With the Individual Numerical Scale and Prioritization Method.
IEEE Trans. Fuzzy Systems, 2015

A Distributed Gateway Selection Algorithm for UAV Networks.
IEEE Trans. Emerging Topics Comput., 2015

SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors.
IEEE Trans. Comput. Social Systems, 2015

An Improved Stochastic Modeling of Opportunistic Routing in Vehicular CPS.
IEEE Trans. Computers, 2015

Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace.
IEEE Trans. Computers, 2015

Special Issue on networking aspects in Big Data.
IJPEDS, 2015

Modeling malicious activities in cyber space.
IEEE Network, 2015

Networking for big data: part 2 [Guest Editorial].
IEEE Network, 2015

Learning Complementary Saliency Priors for Foreground Object Segmentation in Complex Scenes.
International Journal of Computer Vision, 2015

Optimal VM placement in data centres with architectural and resource constraints.
IJAACS, 2015

A profiling based task scheduling approach for multicore network processors.
Concurrency and Computation: Practice and Experience, 2015

Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Dynamic access point association using Software Defined Networking.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

Enabling Efficient and Secure Outsourcing of Large Matrix Multiplications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Stability Analysis and Resource Allocation for Space-Based Multi-Access Systems.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

vGraph: Graph Virtualization towards Big Data.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

An Energy-Aware QoS Enhanced Method for Service Computing across Clouds and Data Centers.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

Big Data Sensing and Service: A Tutorial.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015

2014
Distributed Denial of Service Attack and Defense.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-9491-1, 2014

Can We Beat DDoS Attacks in Clouds?
IEEE Trans. Parallel Distrib. Syst., 2014

To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing.
IEEE Trans. Parallel Distrib. Syst., 2014

On the Multicast Lifetime of WANETs with Multibeam Antennas: Formulation, Algorithms, and Analysis.
IEEE Trans. Computers, 2014

Distributed Denial of Service (DDoS) detection by traffic pattern analysis.
Peer-to-Peer Networking and Applications, 2014

Networking for big data [Guest Editorial].
IEEE Network, 2014

Are the popular users always important for information dissemination in online social networks?
IEEE Network, 2014

Guest Editorial.
Journal of Multimedia, 2014

Security and Privacy in Online Social Networks: A Survey.
EAI Endorsed Trans. Indust. Netw. & Intellig. Syst., 2014

An Effective and Feasible Traceback Scheme in Mobile Internet Environment.
IEEE Communications Letters, 2014

Smartphone Malware and Its Propagation Modeling: A Survey.
IEEE Communications Surveys and Tutorials, 2014

Propagation model of smartphone worms based on semi-Markov process and social relationship graph.
Computers & Security, 2014

Containing smartphone worm propagation with an influence maximization algorithm.
Computer Networks, 2014

Type-aware task placement in geo-distributed data centers with low OPEX using data center resizing.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Network dynamics of mobile social networks.
Proceedings of the IEEE International Conference on Communications, 2014

Detection on application layer DDoS using random walk model.
Proceedings of the IEEE International Conference on Communications, 2014

A clusterized firewall framework for cloud computing.
Proceedings of the IEEE International Conference on Communications, 2014

Byzantine-resilient secure software-defined networks with multiple controllers.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration.
IEEE Trans. Parallel Distrib. Syst., 2013

Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks.
IEEE Trans. Mob. Comput., 2013

Secure RFID Tag Ownership Transfer Based on Quadratic Residues.
IEEE Trans. Information Forensics and Security, 2013

Linguistic Computational Model Based on 2-Tuples and Intervals.
IEEE Trans. Fuzzy Systems, 2013

A survey and tutorial of wireless relay network protocols based on network coding.
J. Network and Computer Applications, 2013

Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones.
J. Comput. Syst. Sci., 2013

Numerical scales generated individually for analytic hierarchy process.
European Journal of Operational Research, 2013

DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Modeling Malware Propagation in Smartphone Social Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A hierarchical pea-based anomaly detection model.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

A general cloud firewall framework with dynamic resource allocation.
Proceedings of IEEE International Conference on Communications, 2013

Mining Mechanism of Top-k Influential Nodes Based on Voting Algorithm in Mobile Social Networks.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

A dynamical Deterministic Packet Marking scheme for DDoS traceback.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
On the Stress Function-Based OWA Determination Method With Optimization Criteria.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2012

Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient.
IEEE Trans. Parallel Distrib. Syst., 2012

Securing Recommendations in Grouped P2P E-Commerce Trust Model.
IEEE Trans. Network and Service Management, 2012

Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks.
IEEE Trans. Information Forensics and Security, 2012

A Dual-Channel Time-Spread Echo Method for Audio Watermarking.
IEEE Trans. Information Forensics and Security, 2012

M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models.
J. Network and Computer Applications, 2012

An interior point trust region method for nonnegative matrix factorization.
Neurocomputing, 2012

Least square completion and inconsistency repair methods for additively consistent fuzzy preference relations.
Fuzzy Sets and Systems, 2012

Grid transaction management and an efficient development kit.
Comput. Syst. Sci. Eng., 2012

A minimum disclosure approach to authentication and privacy in RFID systems.
Computer Networks, 2012

An efficient deadlock prevention approach for service oriented transaction processing.
Computers & Mathematics with Applications, 2012

Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics.
Comput. J., 2012

Service-Oriented Wireless Sensor Networks and an Energy-Aware Mesh Routing Algorithm.
Ad Hoc & Sensor Wireless Networks, 2012

AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Can we beat legitimate cyber behavior mimicking attacks from botnets?
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Why it is Hard to Fight against Cyber Criminals?
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

DDoS discrimination by Linear Discriminant Analysis (LDA).
Proceedings of the International Conference on Computing, Networking and Communications, 2012

2011
CM-Based Blind Equalization of Time-Varying SIMO-FIR Channel With Single Pulsation Estimation.
IEEE Trans. Vehicular Technology, 2011

Traceback of DDoS Attacks Using Entropy Variations.
IEEE Trans. Parallel Distrib. Syst., 2011

Selecting the Individual Numerical Scale and Prioritization Method in the Analytic Hierarchy Process: A 2-Tuple Fuzzy Linguistic Approach.
IEEE Trans. Fuzzy Systems, 2011

Orthogonal feedback scheme for network coding.
J. Network and Computer Applications, 2011

Survey of network coding-aware routing protocols in wireless networks.
J. Network and Computer Applications, 2011

A Shadow-Like Task Migration Model Based on Context Semantics for Mobile and Pervasive Environments.
Computing and Informatics, 2011

On the maximum throughput of two-hop wireless network coding.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

A Survey on Latest Botnet Attack and Defense.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Utilizing Intelligent Middleware for Reconfiguration of Applications on Android.
Proceedings of the Convergence and Hybrid Information Technology, 2011

Non-monotone averaging aggregation.
Proceedings of the FUZZ-IEEE 2011, 2011

Multicast Lifetime Maximization Using Network Coding in Lossy Wireless Ad Hoc Networks.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

2010
Efficient Web Browsing with Perfect Anonymity Using Page Prefetching.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010

2009
Computing the Numerical Scale of the Linguistic Term Set for the 2-Tuple Fuzzy Linguistic Representation Model.
IEEE Trans. Fuzzy Systems, 2009

Improving the QoS for information discovery in autonomic wireless sensor networks.
Pervasive and Mobile Computing, 2009

Effective metric for detecting distributed denial-of-service attacks based on information divergence.
IET Communications, 2009

Linguistic multiperson decision making based on the use of multiple preference relations.
Fuzzy Sets and Systems, 2009

Discriminating DDoS Flows from Flash Crowds Using Information Distance.
Proceedings of the Third International Conference on Network and System Security, 2009

Effective DDoS Attacks Detection Using Generalized Entropy Metric.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

2008
Information theory based detection against network behavior mimicking DDoS attacks.
IEEE Communications Letters, 2008

Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

The Crossroads Approach to Information Discovery in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

A Transformation Model for Heterogeneous Servers.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

2007
An Enhanced Parallel Downloading Algorithm for BT.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007

A Resource-Search and Routing Algorithm within PCDN Autonomy Area.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

Novel Data Management Algorithms in Peer-to-Peer Content Distribution Networks.
Proceedings of the Knowledge Science, 2007

A Parallel Downloading Algorithm for Redundant Networks.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

Massive Data Delivery in Unstructured Peer-to-Peer Networks with Network Coding.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Performance optimization for energy-aware adaptive checkpointing in embedded real-time systems.
Proceedings of the Conference on Design, Automation and Test in Europe, 2006

Online Algorithm for Application Layer Anycast.
Proceedings of the Advances in Intelligent IT, 2006

2005
A Mesh Based Anycast Routing Protocol for Ad Hoc Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

AGARM: An Adaptive Grid Application and Resource Monitor Framework.
Proceedings of the Computational Science, 2005

An Efficient Reliable Architecture for Application Layer Anycast Service.
Proceedings of the Distributed and Parallel Computing, 2005

2004
A Novel Middleware Based Web Database Model.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004

A Peer-to-Peer Hypertext Categorization Using Directed Acyclic Graph Support Vector Machines.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Grid Resource Discovery Model Based on the Hierarchical Architecture and P2P Overlay Network.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

Minicast: A Multicast-Anycast Protocol for Message Delivery.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

Load Balance Algorithms for Anycast.
Proceedings of the iiWAS'2004, 2004

Novel SVM Performance Estimators for Information Retrieval Systems.
Proceedings of the Advanced Web Technologies and Applications, 2004

SIMON: A Multi-strategy Classification Approach Resolving Ontology Heterogeneity on the Semantic Web.
Proceedings of the Advanced Web Technologies and Applications, 2004

2003
Self-Adaptive Clock Synchronization for Computational Grid.
J. Comput. Sci. Technol., 2003

A New Multivariate Decision Tree Construction Algorithm Based on Variable Precision Rough Set.
Proceedings of the Advances in Web-Age Information Management, 2003

Fault-Tolerant Servers for Anycast Communication.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

DHCS: A Case of Knowledge Share in Cooperative Computing Environment.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

A Load Balancing Algorithm for Web Based Server Grids.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Self-Adaptive Clock Synchronization Based on Clock Precision Difference.
Proceedings of the Computer Science 2003, 2003

2002
An Efficient Algorithm for Application-Layer Anycasting.
Proceedings of the Distributed Communities on the Web, 4th International Workshop, 2002


  Loading...