Shui Yu
Orcid: 0000-0003-4485-6743Affiliations:
- University of Technology Sydney, School of Computer Science, Faculty of Engineering and Information Technology, Ultimo, NSW, Australia
- Deakin University, Australia (PhD 2004)
According to our database1,
Shui Yu
authored at least 681 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
LPQAA: a lightweight post-quantum access authentication scheme for satellite network.
J. Supercomput., January, 2025
2024
Mean-Field Game-Based Task-Offloaded Load Balance for Industrial Mobile Edge Computing Systems Using Software-Defined Networking.
IEEE Trans. Mob. Comput., December, 2024
Covert Communications Aided by Cooperative Jamming in Overlay Cognitive Radio Networks.
IEEE Trans. Mob. Comput., December, 2024
ACM Comput. Surv., December, 2024
IEEE Trans. Knowl. Data Eng., November, 2024
A Comprehensive Overview of Backdoor Attacks in Large Language Models Within Communication Networks.
IEEE Netw., November, 2024
IEEE/ACM Trans. Netw., October, 2024
Smart Contract-Based Decentralized Data Sharing and Content Delivery for Intelligent Connected Vehicles in Edge Computing.
IEEE Trans. Intell. Transp. Syst., October, 2024
IEEE Internet Things J., October, 2024
EMTD-SSC: An Enhanced Malicious Traffic Detection Model Using Transfer Learning Under Small Sample Conditions in IoT.
IEEE Internet Things J., October, 2024
Efficient Fault-Tolerant Path Embedding for 3D Torus Network Using Locally Faulty Blocks.
IEEE Trans. Computers, September, 2024
Novel Intrusion Detection Strategies With Optimal Hyper Parameters for Industrial Internet of Things Based on Stochastic Games and Double Deep Q-Networks.
IEEE Internet Things J., September, 2024
Dynamic Bond Percolation-Based Reliable Topology Evolution Model for Dynamic Networks.
IEEE Trans. Netw. Serv. Manag., August, 2024
Privacy-Preserving Truth Discovery Based on Secure Multi-Party Computation in Vehicle-Based Mobile Crowdsensing.
IEEE Trans. Intell. Transp. Syst., July, 2024
MFGD3QN: Enhancing Edge Intelligence Defense Against DDoS With Mean-Field Games and Dueling Double Deep Q-Network.
IEEE Internet Things J., July, 2024
Exploiting Type I Adversarial Examples to Hide Data Information: A New Privacy-Preserving Approach.
IEEE Trans. Emerg. Top. Comput. Intell., June, 2024
Evolution of Credit Scores of Enterprises in a Social Network: A Perspective Based on Opinion Dynamics.
IEEE Trans. Comput. Soc. Syst., June, 2024
Reinforcement-Learning-Based Offloading for RIS-Aided Cloud-Edge Computing in IoT Networks: Modeling, Analysis, and Optimization.
IEEE Internet Things J., June, 2024
Comparative DQN-Improved Algorithms for Stochastic Games-Based Automated Edge Intelligence-Enabled IoT Malware Spread-Suppression Strategies.
IEEE Internet Things J., June, 2024
Robust Localization for Mobile Targets Along a Narrow Path With LoS/NLoS Interference.
IEEE Internet Things J., June, 2024
Combining Lyapunov Optimization With Actor-Critic Networks for Privacy-Aware IIoT Computation Offloading.
IEEE Internet Things J., May, 2024
IEEE Internet Things J., May, 2024
IEEE Internet Things J., May, 2024
Leveraging Digital Twin and DRL for Collaborative Context Offloading in C-V2X Autonomous Driving.
IEEE Trans. Veh. Technol., April, 2024
A GNN-Enabled Multipath Routing Algorithm for Spatial-Temporal Varying LEO Satellite Networks.
IEEE Trans. Veh. Technol., April, 2024
Deep Q-Network-Based Open-Set Intrusion Detection Solution for Industrial Internet of Things.
IEEE Internet Things J., April, 2024
Blockchain-Empowered Multiagent Systems: Advancing IoT Security and Transaction Efficiency.
IEEE Internet Things J., April, 2024
ACM Comput. Surv., April, 2024
Constant Wideband Compressive Spectrum Sensing With Cascade Forward-Backward Propagating and Prior Knowledge Refining.
IEEE Trans. Wirel. Commun., March, 2024
IEEE Netw., March, 2024
VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain.
J. Netw. Comput. Appl., March, 2024
IEEE Wirel. Commun., February, 2024
Task Offloading Control and Customized Workload Scheduling in Multi-Layer Cloud Networks.
IEEE Trans. Netw. Serv. Manag., February, 2024
Online Training Flow Scheduling for Geo-Distributed Machine Learning Jobs Over Heterogeneous and Dynamic Networks.
IEEE Trans. Cogn. Commun. Netw., February, 2024
UAV-Assisted Secure Uplink Communications in Satellite-Supported IoT: Secrecy Fairness Approach.
IEEE Internet Things J., February, 2024
Privacy-preserving offloading scheme in multi-access mobile edge computing based on MADRL.
J. Parallel Distributed Comput., January, 2024
Modeling on Resource Allocation for Age-Sensitive Mobile-Edge Computing Using Federated Multiagent Reinforcement Learning.
IEEE Internet Things J., January, 2024
A Novel Nature-Inspired Algorithm for Optimal Task Scheduling in Fog-Cloud Blockchain System.
IEEE Internet Things J., January, 2024
Modeling and Analyzing the Spatial-Temporal Propagation of Malware in Mobile Wearable IoT Networks.
IEEE Internet Things J., January, 2024
VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks.
Comput. Secur., January, 2024
Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks.
Appl. Soft Comput., January, 2024
EDCOMA: Enabling Efficient Double Compressed Auditing for Blockchain-Based Decentralized Storage.
IEEE Trans. Serv. Comput., 2024
Blockchained Dual-Asynchronous Federated Learning Services for Digital Twin Empowered Edge-Cloud Continuum.
IEEE Trans. Serv. Comput., 2024
Tree-ORAP: A Tree-Based Oblivious Random-Access Protocol for Privacy-Protected Blockchain.
IEEE Trans. Serv. Comput., 2024
Energy-Efficient Graph Reinforced vNFC Deployment in Elastic Optical Inter-DC Networks.
IEEE Trans. Netw. Sci. Eng., 2024
An Efficient Differentiated Routing Scheme for MEO/LEO-Based Multi-Layer Satellite Networks.
IEEE Trans. Netw. Sci. Eng., 2024
MTDroid: A Moving Target Defense-Based Android Malware Detector Against Evasion Attacks.
IEEE Trans. Inf. Forensics Secur., 2024
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Edasvic: Enabling Efficient and Dynamic Storage Verification for Clouds of Industrial Internet Platforms.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-Networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Exploring the Practicality of Differentially Private Federated Learning: A Local Iteration Tuning Approach.
IEEE Trans. Dependable Secur. Comput., 2024
The Role of Class Information in Model Inversion Attacks Against Image Deep Learning Classifiers.
IEEE Trans. Dependable Secur. Comput., 2024
You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Cloud Comput., 2024
IEEE Signal Process. Lett., 2024
Neural Networks, 2024
A novel cross-domain adaptation framework for unsupervised criminal jargon detection via pre-trained contextual embedding of darknet corpus.
Expert Syst. Appl., 2024
VeriCNN: Integrity verification of large-scale CNN training process based on zk-SNARK.
Expert Syst. Appl., 2024
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey.
Eng. Appl. Artif. Intell., 2024
Joint Beamforming and Illumination Pattern Design for Beam-Hopping LEO Satellite Communications.
CoRR, 2024
Explainable AI Security: Exploring Robustness of Graph Neural Networks to Adversarial Attacks.
CoRR, 2024
Federated Learning with Blockchain-Enhanced Machine Unlearning: A Trustworthy Approach.
CoRR, 2024
CoRR, 2024
Sci. China Inf. Sci., 2024
Comput. Electr. Eng., 2024
Ad Hoc Networks, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the IEEE International Conference on Communications, 2024
2023
Security Challenges and Potential Solutions in Aerial-Terrestrial Wireless Networking.
IEEE Internet Things Mag., December, 2023
Cybersecur., December, 2023
ACM Trans. Priv. Secur., November, 2023
Consensus Convergence Speed in Social Network DeGroot Model: The Effects of the Agents With High Self-Confidence Levels.
IEEE Trans. Comput. Soc. Syst., October, 2023
Computation Offloading Method Using Stochastic Games for Software-Defined-Network-Based Multiagent Mobile Edge Computing.
IEEE Internet Things J., October, 2023
Trustworthy Sensor Fusion Against Inaudible Command Attacks in Advanced Driver-Assistance Systems.
IEEE Internet Things J., October, 2023
DMRA: Model Usability Detection Scheme Against Model-Reuse Attacks in the Internet of Things.
IEEE Internet Things J., October, 2023
Disjoint Paths Construction and Fault-Tolerant Routing in BCube of Data Center Networks.
IEEE Trans. Computers, September, 2023
Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems.
Expert Syst. Appl., September, 2023
NFLCS: An Service Function Chain Path Optimization Strategy Based on Network-Functional Layout Clustering.
IEEE Trans. Veh. Technol., August, 2023
IEEE Internet Things J., August, 2023
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems.
Digit. Commun. Networks, August, 2023
J. Supercomput., July, 2023
PASTO: Enabling Secure and Efficient Task Offloading in TrustZone-Enabled Edge Clouds.
IEEE Trans. Veh. Technol., June, 2023
Multi-agent DRL for joint completion delay and energy consumption with queuing theory in MEC-based IIoT.
J. Parallel Distributed Comput., June, 2023
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things.
J. Netw. Comput. Appl., May, 2023
IEEE Internet Things J., May, 2023
IEEE Commun. Lett., May, 2023
Chronos: Accelerating Federated Learning With Resource Aware Training Volume Tuning at Network Edges.
IEEE Trans. Veh. Technol., March, 2023
Time-Varying Topology Model for Dynamic Routing in LEO Satellite Constellation Networks.
IEEE Trans. Veh. Technol., March, 2023
Frequency Energy Ratio Cell Based Operational Security Domain Analysis of Planetary Gearbox.
IEEE Trans. Reliab., March, 2023
IEEE Trans. Netw. Serv. Manag., March, 2023
Toward Large-Scale Graph-Based Traffic Forecasting: A Data-Driven Network Partitioning Approach.
IEEE Internet Things J., March, 2023
Machine Learning Empowered Intelligent Data Center Networking - Evolution, Challenges and Opportunities
Springer Briefs in Computer Science, Springer, ISBN: 978-981-19-7394-9, 2023
IEEE Wirel. Commun. Lett., 2023
Personalized Individual Semantics Learning to Support a Large-Scale Linguistic Consensus Process.
ACM Trans. Internet Techn., 2023
APDP: Attribute-Based Personalized Differential Privacy Data Publishing Scheme for Social Networks.
IEEE Trans. Netw. Sci. Eng., 2023
Boosting Accuracy of Differentially Private Federated Learning in Industrial IoT With Sparse Responses.
IEEE Trans. Ind. Informatics, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks.
IEEE Trans. Inf. Forensics Secur., 2023
Joint Differential Game and Double Deep Q-Networks for Suppressing Malware Spread in Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023
A High Accuracy and Adaptive Anomaly Detection Model With Dual-Domain Graph Convolutional Network for Insider Threat Detection.
IEEE Trans. Inf. Forensics Secur., 2023
A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023
Optimizing the Numbers of Queries and Replies in Convex Federated Learning With Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
VOSA: Verifiable and Oblivious Secure Aggregation for Privacy-Preserving Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023
Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Detecting Adversarial Examples on Deep Neural Networks With Mutual Information Neural Estimation.
IEEE Trans. Dependable Secur. Comput., 2023
Self-Adaptive Gradient Quantization for Geo-Distributed Machine Learning Over Heterogeneous and Dynamic Networks.
IEEE Trans. Cloud Comput., 2023
Deep Reinforcement Learning-Based Resource Allocation for Content Distribution in IoT-Edge-Cloud Computing Environments.
Symmetry, 2023
Stealthy Backdoor Attack Against Speaker Recognition Using Phase-Injection Hidden Trigger.
IEEE Signal Process. Lett., 2023
Knowl. Based Syst., 2023
IEEE Internet Things J., 2023
Computation Placement Orchestrator for Mobile-Edge Computing in Heterogeneous Vehicular Networks.
IEEE Internet Things J., 2023
IEEE Internet Things J., 2023
IEEE Internet Things J., 2023
AAQ-PEKS: An Attribute-based Anti-Quantum Public-Key Encryption Scheme with Keyword Search for E-healthcare Scenarios.
IACR Cryptol. ePrint Arch., 2023
The SRVM: A Similarity-Based Relevance Vector Machine for Remaining Useful Lifetime Prediction in the Industrial Internet of Things.
IEEE Intell. Syst., 2023
ACM Comput. Surv., 2023
MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks.
CoRR, 2023
Towards Blockchain-Assisted Privacy-Aware Data Sharing For Edge Intelligence: A Smart Healthcare Perspective.
CoRR, 2023
Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced Driver-Assistance System.
CoRR, 2023
CoRR, 2023
High-frequency Matters: An Overwriting Attack and defense for Image-processing Neural Network Watermarking.
CoRR, 2023
IEEE Commun. Surv. Tutorials, 2023
IEEE Commun. Surv. Tutorials, 2023
Combining Federated Learning and Edge Computing Toward Ubiquitous Intelligence in 6G Network: Challenges, Recent Advances, and Future Directions.
IEEE Commun. Surv. Tutorials, 2023
Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence.
Big Data Min. Anal., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Inferring Private Data from AI Models in Metaverse through Black-box Model Inversion Attacks.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
SEI-DM: Crafting Revolutionary RF Signals in Low-Resource Settings via Diffusion Model.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
Construct New Graphs Using Information Bottleneck Against Property Inference Attacks.
Proceedings of the IEEE International Conference on Communications, 2023
A Location Privacy and Query Privacy Joint Protection Scheme for POI Query in Vehicular Networks.
Proceedings of the IEEE International Conference on Communications, 2023
FedMC: Federated Learning with Mode Connectivity Against Distributed Backdoor Attacks.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE Global Communications Conference, 2023
CP-FL: Practical Gradient Leakage Defense in Federated Learning with Compressive Privacy.
Proceedings of the IEEE Global Communications Conference, 2023
Enhancing Federated Learning by One-Shot Transferring of Intermediate Features from Clients.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
Extracting Privacy-Preserving Subgraphs in Federated Graph Learning using Information Bottleneck.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Privacy Preservation in IoT: Machine Learning Approaches - A Comprehensive Survey and Use Cases
Springer Briefs in Computer Science, Springer, ISBN: 978-981-19-1796-7, 2022
IEEE Wirel. Commun., 2022
DR-SDSN: An Elastic Differentiated Routing Framework for Software-Defined Satellite Networks.
IEEE Wirel. Commun., 2022
Ubiquitous Transmission Service: Hierarchical Wireless Data Rate Provisioning in Space-Air-Ocean Integrated Networks.
IEEE Trans. Wirel. Commun., 2022
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Veh. Technol., 2022
FDSA-STG: Fully Dynamic Self-Attention Spatio-Temporal Graph Networks for Intelligent Traffic Flow Prediction.
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Serv. Comput., 2022
IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Mob. Comput., 2022
Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures.
IEEE Trans. Ind. Informatics, 2022
A Covert Electricity-Theft Cyberattack Against Machine Learning-Based Detection Models.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Inf. Forensics Secur., 2022
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
Efficient Provision of Service Function Chains in Overlay Networks Using Reinforcement Learning.
IEEE Trans. Cloud Comput., 2022
Identification of Encrypted Traffic Through Attention Mechanism Based Long Short Term Memory.
IEEE Trans. Big Data, 2022
IEEE Trans. Big Data, 2022
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users.
IEEE Trans. Big Data, 2022
Pattern Recognit., 2022
IEEE Open J. Comput. Soc., 2022
FedTwin: Blockchain-Enabled Adaptive Asynchronous Federated Learning for Digital Twin Networks.
IEEE Netw., 2022
IEEE Netw., 2022
Mach. Learn., 2022
J. Netw. Comput. Appl., 2022
Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination.
J. Inf. Secur. Appl., 2022
USST: A two-phase privacy-preserving framework for personalized recommendation with semi-distributed training.
Inf. Sci., 2022
Achieving privacy-preserving sensitive attributes for large universe based on private set intersection.
Inf. Sci., 2022
SEMMI: Multi-party security decision-making scheme for linear functions in the internet of medical things.
Inf. Sci., 2022
FL-SEC: Privacy-Preserving Decentralized Federated Learning Using SignSGD for the Internet of Artificially Intelligent Things.
IEEE Internet Things Mag., 2022
DRL-Based Deadline-Driven Advance Reservation Allocation in EONs for Cloud-Edge Computing.
IEEE Internet Things J., 2022
Toward Crowdsourced Transportation Mode Identification: A Semisupervised Federated Learning Approach.
IEEE Internet Things J., 2022
A Communication-Efficient Federated Learning Scheme for IoT-Based Traffic Forecasting.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things.
IEEE Internet Things J., 2022
Security-Aware and Privacy-Preserving Personal Health Record Sharing Using Consortium Blockchain.
IEEE Internet Things J., 2022
Modeling on Energy-Efficiency Computation Offloading Using Probabilistic Action Generating.
IEEE Internet Things J., 2022
Guided Activity Prediction for Minimally Invasive Surgery Safety Improvement in the Internet of Medical Things.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
A Reliable and Efficient Task Offloading Strategy Based on Multifeedback Trust Mechanism for IoT Edge Computing.
IEEE Internet Things J., 2022
Guest Editorial Special Issue on Security, Privacy, and Trustworthiness in Intelligent Cyber-Physical Systems and Internet of Things.
IEEE Internet Things J., 2022
Efficient Cache Consistency Management for Transient IoT Data in Content-Centric Networking.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IET Image Process., 2022
Frontiers Comput. Sci., 2022
(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility.
Trans. Emerg. Telecommun. Technol., 2022
A family system based evolutionary algorithm for obstacle-evasion minimal exposure path problem in Internet of Things.
Expert Syst. Appl., 2022
Value-based reinforcement learning approaches for task offloading in Delay Constrained Vehicular Edge Computing.
Eng. Appl. Artif. Intell., 2022
Digit. Commun. Networks, 2022
Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks.
Concurr. Comput. Pract. Exp., 2022
Concurr. Comput. Pract. Exp., 2022
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects.
Comput. Secur., 2022
Joint optimization of Service Chain Graph Design and Mapping in NFV-enabled networks.
Comput. Networks, 2022
VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems.
Sci. China Inf. Sci., 2022
Crowdsourcing-based Multi-Device Communication Cooperation for Mobile High-Quality Video Enhancement.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
A Multi-objective based Inter-Layer Link Allocation Scheme for MEO/LEO Satellite Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the MobiArch '22: Proceedings of the 17th ACM Workshop on Mobility in the Evolving Internet Architecture, 2022
DRL-based Resource Allocation Optimization for Computation Offloading in Mobile Edge Computing.
Proceedings of the IEEE INFOCOM 2022, 2022
Personalized Privacy-Preserving Medical Data Sharing for Blockchain-based Smart Healthcare Networks.
Proceedings of the IEEE International Conference on Communications, 2022
SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things.
Proceedings of the IEEE International Conference on Communications, 2022
Maximum Focal Inter-Class Angular Loss with Norm Constraint for Automatic Modulation Classification.
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the IEEE Global Communications Conference, 2022
A NTRU-Based Access Authentication Scheme for Satellite Terrestrial Integrated Network.
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the 5th International Conference on Data Science and Information Technology, 2022
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022
Proceedings of the AI 2021: Advances in Artificial Intelligence, 2022
DDoS Attack Detection Combining Time Series-based Multi-dimensional Sketch and Machine Learning.
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022
2021
Adaptive Multi-Access Algorithm for Multi-Service Edge Users in 5G Ultra-Dense Heterogeneous Networks.
IEEE Trans. Veh. Technol., 2021
CoPace: Edge Computation Offloading and Caching for Self-Driving With Deep Reinforcement Learning.
IEEE Trans. Veh. Technol., 2021
Promotion of Answer Value Measurement With Domain Effects in Community Question Answering Systems.
IEEE Trans. Syst. Man Cybern. Syst., 2021
DP-LTOD: Differential Privacy Latent Trajectory Community Discovering Services over Location-Based Social Networks.
IEEE Trans. Serv. Comput., 2021
Efficient Virtual Network Embedding of Cloud-Based Data Center Networks into Optical Networks.
IEEE Trans. Parallel Distributed Syst., 2021
Compatibility-Aware Web API Recommendation for Mashup Creation via Textual Description Mining.
ACM Trans. Multim. Comput. Commun. Appl., 2021
On-Demand Dynamic Controller Placement in Software Defined Satellite-Terrestrial Networking.
IEEE Trans. Netw. Serv. Manag., 2021
Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks.
IEEE Trans. Netw. Sci. Eng., 2021
FASTGNN: A Topological Information Protected Federated Learning Approach for Traffic Speed Forecasting.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Inf. Forensics Secur., 2021
Memory Augmented Hierarchical Attention Network for Next Point-of-Interest Recommendation.
IEEE Trans. Comput. Soc. Syst., 2021
Complicating the Social Networks for Better Storytelling: An Empirical Study of Chinese Historical Text and Novel.
IEEE Trans. Comput. Soc. Syst., 2021
DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publication.
Soft Comput., 2021
IEEE Netw., 2021
Enabling Machine Learning with Service Function Chaining for Security Enhancement at 5G Edges.
IEEE Netw., 2021
A Software-Defined-Networking-Enabled Approach for Edge-Cloud Computing in the Internet of Things.
IEEE Netw., 2021
A survey on incorporating domain knowledge into deep learning for medical image analysis.
Medical Image Anal., 2021
Protected Resource Allocation in Space Division Multiplexing-Elastic Optical Networks with Fluctuating Traffic.
J. Netw. Comput. Appl., 2021
J. Netw. Comput. Appl., 2021
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing.
KSII Trans. Internet Inf. Syst., 2021
Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks.
Inf. Sci., 2021
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system.
Inf. Sci., 2021
IEEE Internet Things Mag., 2021
Energy-Efficient Deep Reinforced Traffic Grooming in Elastic Optical Networks for Cloud-Fog Computing.
IEEE Internet Things J., 2021
Gate-ID: WiFi-Based Human Identification Irrespective of Walking Directions in Smart Home.
IEEE Internet Things J., 2021
PoisonGAN: Generative Poisoning Attacks Against Federated Learning in Edge Computing Systems.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Fast Containment of Infectious Diseases With E-Healthcare Mobile Social Internet of Things.
IEEE Internet Things J., 2021
Deep-Reinforcement-Learning-Based User Profile Perturbation for Privacy-Aware Recommendation.
IEEE Internet Things J., 2021
6G-Enabled Short-Term Forecasting for Large-Scale Traffic Flow in Massive IoT Based on Time-Aware Locality-Sensitive Hashing.
IEEE Internet Things J., 2021
A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud.
IEEE Internet Things J., 2021
Neurocomputing, 2021
Energy efficiency with service availability guarantee for Network Function Virtualization.
Future Gener. Comput. Syst., 2021
Digit. Commun. Networks, 2021
Optimizing the Numbers of Queries and Replies in Federated Learning with Differential Privacy.
CoRR, 2021
Too Expensive to Attack: A Joint Defense Framework to Mitigate Distributed Attacks for the Internet of Things Grid.
CoRR, 2021
On the Practicality of Differential Privacy in Federated Learning by Tuning Iteration Times.
CoRR, 2021
IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments.
IEEE Access, 2021
A Hybrid Intrusion Detection System Based on Machine Learning under Differential Privacy Protection.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Too Expensive to Attack: Enlarge the Attack Expense through Joint Defense at the Edge.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
A Novel Mobile Core Network Architecture for Satellite-Terrestrial Integrated Network.
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Augmented Dual-Shuffle-based Moving Target Defense to Ensure CIA-triad in Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the Web and Big Data - 5th International Joint Conference, 2021
2020
IEEE Wirel. Commun. Lett., 2020
Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks.
IEEE Wirel. Commun. Lett., 2020
Energy-Latency Tradeoff for Dynamic Computation Offloading in Vehicular Fog Computing.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Veh. Technol., 2020
Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management.
IEEE Trans. Netw. Sci. Eng., 2020
IEEE Trans. Netw. Sci. Eng., 2020
GAN-Driven Personalized Spatial-Temporal Private Data Sharing in Cyber-Physical Social Systems.
IEEE Trans. Netw. Sci. Eng., 2020
Privacy on the Edge: Customizable Privacy-Preserving Context Sharing in Hierarchical Edge Computing.
IEEE Trans. Netw. Sci. Eng., 2020
SentiDiff: Combining Textual Information and Sentiment Diffusion Patterns for Twitter Sentiment Analysis.
IEEE Trans. Knowl. Data Eng., 2020
IEEE Trans. Comput. Soc. Syst., 2020
Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data.
IEEE Trans. Cloud Comput., 2020
FDFA: A fog computing assisted distributed analytics and detecting system for family activities.
Peer-to-Peer Netw. Appl., 2020
IEEE Open J. Comput. Soc., 2020
An efficient pipeline processing scheme for programming Protocol-independent Packet Processors.
J. Netw. Comput. Appl., 2020
An enhanced probabilistic fairness-aware group recommendation by incorporating social activeness.
J. Netw. Comput. Appl., 2020
J. Netw. Comput. Appl., 2020
J. Netw. Comput. Appl., 2020
Detecting false data attacks using machine learning techniques in smart grid: A survey.
J. Netw. Comput. Appl., 2020
J. Netw. Comput. Appl., 2020
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection.
J. Netw. Comput. Appl., 2020
Elastic Resilience for Software-Defined Satellite Networking: Challenges, Solutions, and Open Issues.
IT Prof., 2020
IEEE Internet Things J., 2020
APIS: Privacy-Preserving Incentive for Sensing Task Allocation in Cloud and Edge-Cooperation Mobile Internet of Things With SDN.
IEEE Internet Things J., 2020
Adaptive and Extensible Energy Supply Mechanism for UAVs-Aided Wireless-Powered Internet of Things.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Special issue on natural computation, fuzzy systems and knowledge discovery from the ICNC&FSKD 2017.
Neurocomputing, 2020
A Study of User Activity Patterns and the Effect of Venue Types on City Dynamics Using Location-Based Social Network Data.
ISPRS Int. J. Geo Inf., 2020
Location-Based Social Network's Data Analysis and Spatio-Temporal Modeling for the Mega City of Shanghai, China.
ISPRS Int. J. Geo Inf., 2020
IEEE Netw. Lett., 2020
HostWatcher: Protecting hosts in cloud data centers through software-defined networking.
Future Gener. Comput. Syst., 2020
A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems.
Future Gener. Comput. Syst., 2020
Digit. Commun. Networks, 2020
Digit. Commun. Networks, 2020
Secure search for encrypted personal health records from big data NoSQL databases in cloud.
Computing, 2020
Comput. Commun., 2020
Sci. China Inf. Sci., 2020
Appl. Intell., 2020
Efficient meta-heuristic approaches in solving minimal exposure path problem for heterogeneous wireless multimedia sensor networks in internet of things.
Appl. Intell., 2020
IEEE Access, 2020
IEEE Access, 2020
An Online Pricing Strategy of EV Charging and Data Caching in Highway Service Stations.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Performance analysis of indoor localization based on channel state information ranging model.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020
A Unified Federated Learning Framework for Wireless Communications: towards Privacy, Efficiency, and Security.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Dynamic Sample Selection for Federated Learning with Heterogeneous Data in Fog Computing.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Scalable and Updatable Attribute-based Privacy Protection Scheme for Big Data Publishing.
Proceedings of the IEEE Global Communications Conference, 2020
An Enhanced Motif Graph Clustering-Based Deep Learning Approach for Traffic Forecasting.
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020
2019
Advances in Information Security 73, Springer, ISBN: 978-3-030-02178-8, 2019
IEEE Trans. Serv. Comput., 2019
Efficient Data Placement and Replication for QoS-Aware Approximate Query Evaluation of Big Data Analytics.
IEEE Trans. Parallel Distributed Syst., 2019
Differential Privacy Oriented Distributed Online Learning for Mobile Social Video Prefetching.
IEEE Trans. Multim., 2019
An Immunization Framework for Social Networks Through Big Data Based Influence Modeling.
IEEE Trans. Dependable Secur. Comput., 2019
Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks.
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Trans. Comput. Soc. Syst., 2019
A Feedback Mechanism With Bounded Confidence- Based Optimization Approach for Consensus Reaching in Multiple Attribute Large-Scale Group Decision-Making.
IEEE Trans. Comput. Soc. Syst., 2019
IEEE Trans. Cloud Comput., 2019
Enabling Efficient Service Function Chains at Terrestrial-Satellite Hybrid Cloud Networks.
IEEE Netw., 2019
Frontiers Inf. Technol. Electron. Eng., 2019
J. Netw. Comput. Appl., 2019
HSIRD: A model for characterizing dynamics of malware diffusion in heterogeneous WSNs.
J. Netw. Comput. Appl., 2019
J. Netw. Comput. Appl., 2019
J. Netw. Comput. Appl., 2019
J. Netw. Comput. Appl., 2019
Three-dimensional robot localization using cameras in wireless multimedia sensor networks.
J. Netw. Comput. Appl., 2019
J. Comput. Sci. Technol., 2019
Editorial of cross-layer design issues, challenges and opportunities for future intelligent heterogeneous networks.
J. Ambient Intell. Humaniz. Comput., 2019
A heuristic line piloting method to disclose malicious taxicab driver's privacy over GPS big data.
Inf. Sci., 2019
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
IEEE Commun. Lett., 2019
Future Gener. Comput. Syst., 2019
Consensus efficiency in group decision making: A comprehensive comparative study and its optimal design.
Eur. J. Oper. Res., 2019
Concurr. Comput. Pract. Exp., 2019
Concurr. Comput. Pract. Exp., 2019
Efficient solution to the millionaires' problem based on asymmetric commutative encryption scheme.
Comput. Intell., 2019
EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid.
Sci. China Inf. Sci., 2019
Joint Power Control and Channel Allocation for Interference Mitigation Based on Reinforcement Learning.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
An Efficient Privacy-Preserving Mutual Authentication Scheme for Secure V2V Communication in Vehicular Ad Hoc Network.
IEEE Access, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019
A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the IEEE INFOCOM 2019, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
GAN-DP: Generative Adversarial Net Driven Differentially Privacy-Preserving Big Data Publishing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
PDGAN: A Novel Poisoning Defense Method in Federated Learning Using Generative Adversarial Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Privacy Aware Recommendation: Reinforcement Learning Based User Profile Perturbation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Word2Cluster: A New Multi-Label Text Clustering Algorithm with an Adaptive Clusters Number.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
MemNetAR: Memory Network with Adversative Relation for Target-Level Sentiment Classification.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
BQSV: Protecting SDN Controller Cluster's Network Topology View Based on Byzantine Quorum System with Verification Function.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019
Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
Network Traffic Prediction Based on Deep Belief Network and Spatiotemporal Compressive Sensing in Wireless Mesh Backbone Networks.
Wirel. Commun. Mob. Comput., 2018
Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things.
IEEE Wirel. Commun., 2018
An Adaptive Multipath Algorithm to Overcome the Unpredictability of Heterogeneous Wireless Networks for High-Speed Railway.
IEEE Trans. Veh. Technol., 2018
A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018
Improving SDN Scalability With Protocol-Oblivious Source Routing: A System-Level Study.
IEEE Trans. Netw. Serv. Manag., 2018
SERvICE: A Software Defined Framework for Integrated Space-Terrestrial Satellite Communication.
IEEE Trans. Mob. Comput., 2018
Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds.
IEEE Trans. Emerg. Top. Comput., 2018
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Comput. Soc. Syst., 2018
IEEE Trans. Cloud Comput., 2018
EAI Endorsed Trans. Security Safety, 2018
A Collaborative Data Collection Scheme Based on Optimal Clustering for Wireless Sensor Networks.
Sensors, 2018
Managing consensus and self-confidence in multiplicative preference relations in group decision making.
Knowl. Based Syst., 2018
Data integrity verification of the outsourced big data in the cloud environment: A survey.
J. Netw. Comput. Appl., 2018
Quality-of-sensing aware budget constrained contaminant detection sensor deployment in water distribution system.
J. Netw. Comput. Appl., 2018
MC-VAP: A multi-connection virtual access point for high performance software-defined wireless networks.
J. Netw. Comput. Appl., 2018
Toward efficient parallel routing optimization for large-scale SDN networks using GPGPU.
J. Netw. Comput. Appl., 2018
Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server.
J. Netw. Comput. Appl., 2018
DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems.
J. Netw. Comput. Appl., 2018
DDSE: A novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks.
J. Netw. Comput. Appl., 2018
Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks.
IEEE Internet Things J., 2018
IEEE Internet Things J., 2018
IET Networks, 2018
Tuna: An Efficient and Practical Scheme for Wireless Access Point in 5G Networks Virtualization.
IEEE Commun. Lett., 2018
Future Gener. Comput. Syst., 2018
Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective.
IEEE Commun. Mag., 2018
Traffic Engineering in Information-Centric Networking: Opportunities, Solutions and Challenges.
IEEE Commun. Mag., 2018
Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server.
Clust. Comput., 2018
Parallel and Progressive Approaches for Skyline Query Over Probabilistic Incomplete Database.
IEEE Access, 2018
IEEE Access, 2018
Efficient Performance Monitoring for Ubiquitous Virtual Networks Based on Matrix Completion.
IEEE Access, 2018
Profit-Aware Distributed Online Scheduling for Data-Oriented Tasks in Cloud Datacenters.
IEEE Access, 2018
A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View.
IEEE Access, 2018
IEEE Access, 2018
IEEE Access Special Section Editorial: Green Cloud and Fog Computing: Energy Efficiency and Sustainability Aware Infrastructures, Protocols, and Applications.
IEEE Access, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks.
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Temporal-Sparsity Aware Service Recommendation Method via Hybrid Collaborative Filtering Techniques.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018
New Algorithm for Secure Outsourcing of Modular Exponentiation with Optimal Checkability Based on Single Untrusted Server.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Green Social CPS Based E-Healthcare Systems to Control the Spread of Infectious Diseases.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Virtualization of Table Resources in Programmable Data Plane with Global Consideration.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Automatic Selection of Security Service Function Chaining Using Reinforcement Learning.
Proceedings of the IEEE Globecom Workshops, 2018
Proceedings of the IEEE Global Communications Conference, 2018
AQ-DP: A New Differential Privacy Scheme Based on Quasi-Identifier Classifying in Big Data.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Efficient Mappings of Service Function Chains at Terrestrial-Satellite Hybrid Cloud Networks.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018
Proceedings of the Australasian Computer Science Week Multiconference, 2018
2017
A Scalable and Smart Hierarchical Wireless Communication Architecture Based on Network/User Separation.
IEEE Wirel. Commun., 2017
IEEE Wirel. Commun., 2017
A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment.
IEEE Trans. Parallel Distributed Syst., 2017
Impairment- and Splitting-Aware Cloud-Ready Multicast Provisioning in Elastic Optical Networks.
IEEE/ACM Trans. Netw., 2017
IEEE Trans. Multim., 2017
IEEE Trans. Aerosp. Electron. Syst., 2017
IEEE Netw., 2017
Online multi-objective optimization for live video forwarding across video data centers.
J. Vis. Commun. Image Represent., 2017
Congestion-Aware Local Reroute for Fast Failure Recovery in Software-Defined Networks.
JOCN, 2017
A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion.
J. Netw. Comput. Appl., 2017
Modeling and performance analysis for multimedia data flows scheduling in software defined networks.
J. Netw. Comput. Appl., 2017
Inf. Sci., 2017
IEEE Internet Things J., 2017
How to shutdown a cloud: a DDoS attack in a private infrastructure-as-a-service cloud.
Int. J. Auton. Adapt. Commun. Syst., 2017
IEEE Commun. Lett., 2017
IEEE Commun. Lett., 2017
Digit. Commun. Networks, 2017
Concurr. Comput. Pract. Exp., 2017
An energy-aware virtual machine scheduling method for service QoS enhancement in clouds over big data.
Concurr. Comput. Pract. Exp., 2017
Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Commun. Surv. Tutorials, 2017
IEEE Commun. Surv. Tutorials, 2017
IEEE Commun. Mag., 2017
A Novel Multipath-Transmission Supported Software Defined Wireless Network Architecture.
IEEE Access, 2017
IEEE Access, 2017
Network Traffic Prediction Based on Deep Belief Network in Wireless Mesh Backbone Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017
Amplified Locality-Sensitive Hashing for Privacy-Preserving Distributed Service Recommendation.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Towards an Analysis of Traffic Shaping and Policing in Fog Networks Using Stochastic Fluid Models.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017
Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Preferential attachment and the spreading influence of users in online social networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Fuzzy Multi-Attribute Utility Based Network Selection Approach for High-Speed Railway Scenario.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Are current resources in SDN allocated to maximum performance and minimize costs and maintaining QoS problems?
Proceedings of the Australasian Computer Science Week Multiconference, 2017
Proceedings of the Australasian Computer Science Week Multiconference, 2017
2016
IEEE Trans. Veh. Technol., 2016
IEEE Trans. Parallel Distributed Syst., 2016
Graph Theory-Based QoE-Driven Cooperation Stimulation for Content Dissemination in Device-to-Device Communication.
IEEE Trans. Emerg. Top. Comput., 2016
A Game-Theoretic Resource Allocation Approach for Intercell Device-to-Device Communications in Cellular Networks.
IEEE Trans. Emerg. Top. Comput., 2016
Joint Optimization of Task Scheduling and Image Placement in Fog Computing Supported Software-Defined Embedded System.
IEEE Trans. Computers, 2016
IEEE Trans. Computers, 2016
Secur. Commun. Networks, 2016
Peer-to-Peer Netw. Appl., 2016
FUIR: Fusing user and item information to deal with data sparsity by using side information in recommendation systems.
J. Netw. Comput. Appl., 2016
Traffic matrix prediction and estimation based on deep learning in large-scale IP backbone networks.
J. Netw. Comput. Appl., 2016
Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review.
IEEE Internet Things J., 2016
IEEE Commun. Lett., 2016
Incentivizing Users of Data Centers Participate in The Demand Response Programs via Time-Varying Monetary Rewards.
CoRR, 2016
IEEE Access, 2016
Editorial for IEEE Access Special Section on Theoretical Foundations for Big Data Applications: Challenges and Opportunities.
IEEE Access, 2016
IEEE Access, 2016
A General QoS Aware Flow-Balancing and Resource Management Scheme in Distributed Software-Defined Networks.
IEEE Access, 2016
IEEE Access, 2016
Proceedings of the Smart Computing and Communication, 2016
An Evolutionary Approach for Short-Term Traffic Flow Forecasting Service in Intelligent Transportation System.
Proceedings of the Smart Computing and Communication, 2016
Complex network theoretical analysis on information dissemination over vehicular networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
SAT-GRD: An ID/Loc split network architecture interconnecting satellite and ground networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Traffic Matrix Prediction and Estimation Based on Deep Learning for Data Center Networks.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Analysis of the Spreading Influence Variations for Online Social Users under Attacks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
QoS Correlation-Aware Service Composition for Unified Network-Cloud Service Provisioning.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Efficient and Low-Delay Task Scheduling for Big Data Clusters in a Theoretical Perspective.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016
A Virtual Machine Scheduling Method for Trade-Offs Between Energy and Performance in Cloud Environment.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016
Cost Optimal Resource Provisioning for Live Video Forwarding Across Video Data Centers.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016
Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-18108-0, 2015
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization.
IEEE Trans. Parallel Distributed Syst., 2015
IEEE Trans. Inf. Forensics Secur., 2015
Consensus Building in a Local Context for the AHP-GDM With the Individual Numerical Scale and Prioritization Method.
IEEE Trans. Fuzzy Syst., 2015
IEEE Trans. Emerg. Top. Comput., 2015
SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors.
IEEE Trans. Comput. Soc. Syst., 2015
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
Int. J. Parallel Emergent Distributed Syst., 2015
Learning Complementary Saliency Priors for Foreground Object Segmentation in Complex Scenes.
Int. J. Comput. Vis., 2015
Int. J. Auton. Adapt. Commun. Syst., 2015
Concurr. Comput. Pract. Exp., 2015
Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the International Telecommunication Networks and Applications Conference, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
An Energy-Aware QoS Enhanced Method for Service Computing across Clouds and Data Centers.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015
2014
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-9491-1, 2014
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distributed Syst., 2014
Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing.
IEEE Trans. Parallel Distributed Syst., 2014
On the Multicast Lifetime of WANETs with Multibeam Antennas: Formulation, Algorithms, and Analysis.
IEEE Trans. Computers, 2014
Peer-to-Peer Netw. Appl., 2014
Are the popular users always important for information dissemination in online social networks?
IEEE Netw., 2014
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2014
IEEE Commun. Lett., 2014
IEEE Commun. Surv. Tutorials, 2014
Propagation model of smartphone worms based on semi-Markov process and social relationship graph.
Comput. Secur., 2014
Comput. Networks, 2014
Type-aware task placement in geo-distributed data centers with low OPEX using data center resizing.
Proceedings of the International Conference on Computing, Networking and Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
2013
Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration.
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Mob. Comput., 2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Fuzzy Syst., 2013
J. Netw. Comput. Appl., 2013
J. Netw. Comput. Appl., 2013
Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones.
J. Comput. Syst. Sci., 2013
Eur. J. Oper. Res., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the International Conference on Computing, Networking and Communications, 2013
Proceedings of IEEE International Conference on Communications, 2013
Mining Mechanism of Top-k Influential Nodes Based on Voting Algorithm in Mobile Social Networks.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
2012
IEEE Trans. Syst. Man Cybern. Part B, 2012
IEEE Trans. Parallel Distributed Syst., 2012
IEEE Trans. Netw. Serv. Manag., 2012
Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks.
IEEE Trans. Inf. Forensics Secur., 2012
IEEE Trans. Inf. Forensics Secur., 2012
M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models.
J. Netw. Comput. Appl., 2012
Neurocomputing, 2012
Least square completion and inconsistency repair methods for additively consistent fuzzy preference relations.
Fuzzy Sets Syst., 2012
Grid transaction management and an efficient development kit.
Comput. Syst. Sci. Eng., 2012
Comput. Networks, 2012
An efficient deadlock prevention approach for service oriented transaction processing.
Comput. Math. Appl., 2012
Comput. J., 2012
Service-Oriented Wireless Sensor Networks and an Energy-Aware Mesh Routing Algorithm.
Ad Hoc Sens. Wirel. Networks, 2012
AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the International Conference on Computing, Networking and Communications, 2012
2011
CM-Based Blind Equalization of Time-Varying SIMO-FIR Channel With Single Pulsation Estimation.
IEEE Trans. Veh. Technol., 2011
IEEE Trans. Parallel Distributed Syst., 2011
Selecting the Individual Numerical Scale and Prioritization Method in the Analytic Hierarchy Process: A 2-Tuple Fuzzy Linguistic Approach.
IEEE Trans. Fuzzy Syst., 2011
J. Netw. Comput. Appl., 2011
A Shadow-Like Task Migration Model Based on Context Semantics for Mobile and Pervasive Environments.
Comput. Informatics, 2011
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Convergence and Hybrid Information Technology, 2011
Multicast Lifetime Maximization Using Network Coding in Lossy Wireless Ad Hoc Networks.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
2010
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010
2009
Computing the Numerical Scale of the Linguistic Term Set for the 2-Tuple Fuzzy Linguistic Representation Model.
IEEE Trans. Fuzzy Syst., 2009
Pervasive Mob. Comput., 2009
Effective metric for detecting distributed denial-of-service attacks based on information divergence.
IET Commun., 2009
Linguistic multiperson decision making based on the use of multiple preference relations.
Fuzzy Sets Syst., 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
2008
IEEE Commun. Lett., 2008
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
2007
An Enhanced Parallel Downloading Algorithm for BT.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007
Proceedings of the Knowledge Science, 2007
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
2006
Performance optimization for energy-aware adaptive checkpointing in embedded real-time systems.
Proceedings of the Conference on Design, Automation and Test in Europe, 2006
Proceedings of the Advances in Intelligent IT, 2006
2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Distributed and Parallel Computing, 2005
2004
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004
Proceedings of the Parallel and Distributed Processing and Applications, 2004
Load Balance Algorithms for Anycast.
Proceedings of the iiWAS'2004, 2004
2003
J. Comput. Sci. Technol., 2003
Fault-Tolerant Servers for Anycast Communication.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
Proceedings of the Computer Science 2003, 2003
2002
Proceedings of the Distributed Communities on the Web, 4th International Workshop, 2002