Shui Yu

Orcid: 0000-0003-4485-6743

Affiliations:
  • University of Technology Sydney, School of Computer Science, Faculty of Engineering and Information Technology, Ultimo, NSW, Australia
  • Deakin University, Australia (PhD 2004)


According to our database1, Shui Yu authored at least 681 papers between 2002 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
LPQAA: a lightweight post-quantum access authentication scheme for satellite network.
J. Supercomput., January, 2025

2024
Mean-Field Game-Based Task-Offloaded Load Balance for Industrial Mobile Edge Computing Systems Using Software-Defined Networking.
IEEE Trans. Mob. Comput., December, 2024

Covert Communications Aided by Cooperative Jamming in Overlay Cognitive Radio Networks.
IEEE Trans. Mob. Comput., December, 2024

When Federated Learning Meets Privacy-Preserving Computation.
ACM Comput. Surv., December, 2024

TTSR: Tensor-Train Subspace Representation Method for Visual Domain Adaptation.
IEEE Trans. Knowl. Data Eng., November, 2024

A Comprehensive Overview of Backdoor Attacks in Large Language Models Within Communication Networks.
IEEE Netw., November, 2024

Social-Aware Clustered Federated Learning With Customized Privacy Preservation.
IEEE/ACM Trans. Netw., October, 2024

Smart Contract-Based Decentralized Data Sharing and Content Delivery for Intelligent Connected Vehicles in Edge Computing.
IEEE Trans. Intell. Transp. Syst., October, 2024

Intelligent Consensus Enhanced Spectrum Sharing in Heterogeneous Wireless Networks.
IEEE Internet Things J., October, 2024

EMTD-SSC: An Enhanced Malicious Traffic Detection Model Using Transfer Learning Under Small Sample Conditions in IoT.
IEEE Internet Things J., October, 2024

Efficient Fault-Tolerant Path Embedding for 3D Torus Network Using Locally Faulty Blocks.
IEEE Trans. Computers, September, 2024

Novel Intrusion Detection Strategies With Optimal Hyper Parameters for Industrial Internet of Things Based on Stochastic Games and Double Deep Q-Networks.
IEEE Internet Things J., September, 2024

Dynamic Bond Percolation-Based Reliable Topology Evolution Model for Dynamic Networks.
IEEE Trans. Netw. Serv. Manag., August, 2024

Privacy-Preserving Truth Discovery Based on Secure Multi-Party Computation in Vehicle-Based Mobile Crowdsensing.
IEEE Trans. Intell. Transp. Syst., July, 2024

An Asynchronous Multi-Task Semantic Communication Method.
IEEE Netw., July, 2024

MFGD3QN: Enhancing Edge Intelligence Defense Against DDoS With Mean-Field Games and Dueling Double Deep Q-Network.
IEEE Internet Things J., July, 2024

Exploiting Type I Adversarial Examples to Hide Data Information: A New Privacy-Preserving Approach.
IEEE Trans. Emerg. Top. Comput. Intell., June, 2024

Evolution of Credit Scores of Enterprises in a Social Network: A Perspective Based on Opinion Dynamics.
IEEE Trans. Comput. Soc. Syst., June, 2024

Reinforcement-Learning-Based Offloading for RIS-Aided Cloud-Edge Computing in IoT Networks: Modeling, Analysis, and Optimization.
IEEE Internet Things J., June, 2024

Comparative DQN-Improved Algorithms for Stochastic Games-Based Automated Edge Intelligence-Enabled IoT Malware Spread-Suppression Strategies.
IEEE Internet Things J., June, 2024

Robust Localization for Mobile Targets Along a Narrow Path With LoS/NLoS Interference.
IEEE Internet Things J., June, 2024

Combining Lyapunov Optimization With Actor-Critic Networks for Privacy-Aware IIoT Computation Offloading.
IEEE Internet Things J., May, 2024

Public and Private Blockchain Infusion: A Novel Approach to Federated Learning.
IEEE Internet Things J., May, 2024

Blockchain-Based Gradient Inversion and Poisoning Defense for Federated Learning.
IEEE Internet Things J., May, 2024

Leveraging Digital Twin and DRL for Collaborative Context Offloading in C-V2X Autonomous Driving.
IEEE Trans. Veh. Technol., April, 2024

A GNN-Enabled Multipath Routing Algorithm for Spatial-Temporal Varying LEO Satellite Networks.
IEEE Trans. Veh. Technol., April, 2024

Deep Q-Network-Based Open-Set Intrusion Detection Solution for Industrial Internet of Things.
IEEE Internet Things J., April, 2024

Blockchain-Empowered Multiagent Systems: Advancing IoT Security and Transaction Efficiency.
IEEE Internet Things J., April, 2024

Generative Adversarial Networks: A Survey on Attack and Defense Perspective.
ACM Comput. Surv., April, 2024

Constant Wideband Compressive Spectrum Sensing With Cascade Forward-Backward Propagating and Prior Knowledge Refining.
IEEE Trans. Wirel. Commun., March, 2024

AI-Enabled Space-Air-Ground Integrated Networks: Management and Optimization.
IEEE Netw., March, 2024

VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain.
J. Netw. Comput. Appl., March, 2024

Future Quantum Communications and Networking: A Review and Vision.
IEEE Wirel. Commun., February, 2024

Task Offloading Control and Customized Workload Scheduling in Multi-Layer Cloud Networks.
IEEE Trans. Netw. Serv. Manag., February, 2024

Online Training Flow Scheduling for Geo-Distributed Machine Learning Jobs Over Heterogeneous and Dynamic Networks.
IEEE Trans. Cogn. Commun. Netw., February, 2024

UAV-Assisted Secure Uplink Communications in Satellite-Supported IoT: Secrecy Fairness Approach.
IEEE Internet Things J., February, 2024

Privacy-preserving offloading scheme in multi-access mobile edge computing based on MADRL.
J. Parallel Distributed Comput., January, 2024

Modeling on Resource Allocation for Age-Sensitive Mobile-Edge Computing Using Federated Multiagent Reinforcement Learning.
IEEE Internet Things J., January, 2024

A Novel Nature-Inspired Algorithm for Optimal Task Scheduling in Fog-Cloud Blockchain System.
IEEE Internet Things J., January, 2024

Modeling and Analyzing the Spatial-Temporal Propagation of Malware in Mobile Wearable IoT Networks.
IEEE Internet Things J., January, 2024

VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks.
Comput. Secur., January, 2024

Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks.
Appl. Soft Comput., January, 2024

EDCOMA: Enabling Efficient Double Compressed Auditing for Blockchain-Based Decentralized Storage.
IEEE Trans. Serv. Comput., 2024

Blockchained Dual-Asynchronous Federated Learning Services for Digital Twin Empowered Edge-Cloud Continuum.
IEEE Trans. Serv. Comput., 2024

Tree-ORAP: A Tree-Based Oblivious Random-Access Protocol for Privacy-Protected Blockchain.
IEEE Trans. Serv. Comput., 2024

Energy-Efficient Graph Reinforced vNFC Deployment in Elastic Optical Inter-DC Networks.
IEEE Trans. Netw. Sci. Eng., 2024

An Efficient Differentiated Routing Scheme for MEO/LEO-Based Multi-Layer Satellite Networks.
IEEE Trans. Netw. Sci. Eng., 2024

MTDroid: A Moving Target Defense-Based Android Malware Detector Against Evasion Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training.
IEEE Trans. Inf. Forensics Secur., 2024

Forgetting and Remembering Are Both You Need: Balanced Graph Structure Unlearning.
IEEE Trans. Inf. Forensics Secur., 2024

Edasvic: Enabling Efficient and Dynamic Storage Verification for Clouds of Industrial Internet Platforms.
IEEE Trans. Inf. Forensics Secur., 2024

Machine Unlearning via Representation Forgetting With Parameter Self-Sharing.
IEEE Trans. Inf. Forensics Secur., 2024

SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-Networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2024

GMFITD: Graph Meta-Learning for Effective Few-Shot Insider Threat Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Stealthy Targeted Backdoor Attacks Against Image Captioning.
IEEE Trans. Inf. Forensics Secur., 2024

Exploring the Practicality of Differentially Private Federated Learning: A Local Iteration Tuning Approach.
IEEE Trans. Dependable Secur. Comput., 2024

The Role of Class Information in Model Inversion Attacks Against Image Deep Learning Classifiers.
IEEE Trans. Dependable Secur. Comput., 2024

You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted.
IEEE Trans. Dependable Secur. Comput., 2024

Design and Robust Evaluation of Next Generation Node Authentication Approach.
IEEE Trans. Dependable Secur. Comput., 2024

Similarity-Based Secure Deduplication for IIoT Cloud Management System.
IEEE Trans. Dependable Secur. Comput., 2024

Privacy-Preserving and Byzantine-Robust Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2024

psvCNN: A Zero-Knowledge CNN Prediction Integrity Verification Strategy.
IEEE Trans. Cloud Comput., 2024

An Efficient Hypergraph-Based Routing Algorithm in Time-Sensitive Networks.
IEEE Signal Process. Lett., 2024

Textual emotion classification using MPNet and cascading broad learning.
Neural Networks, 2024

A novel cross-domain adaptation framework for unsupervised criminal jargon detection via pre-trained contextual embedding of darknet corpus.
Expert Syst. Appl., 2024

VeriCNN: Integrity verification of large-scale CNN training process based on zk-SNARK.
Expert Syst. Appl., 2024

Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey.
Eng. Appl. Artif. Intell., 2024

Can Self Supervision Rejuvenate Similarity-Based Link Prediction?
CoRR, 2024

Joint Beamforming and Illumination Pattern Design for Beam-Hopping LEO Satellite Communications.
CoRR, 2024

DDFAD: Dataset Distillation Framework for Audio Data.
CoRR, 2024

Explainable AI Security: Exploring Robustness of Graph Neural Networks to Adversarial Attacks.
CoRR, 2024

Federated TrustChain: Blockchain-Enhanced LLM Training and Unlearning.
CoRR, 2024

Inference Attacks: A Taxonomy, Survey, and Promising Directions.
CoRR, 2024

Federated Learning with Blockchain-Enhanced Machine Unlearning: A Trustworthy Approach.
CoRR, 2024

Machine Unlearning: A Comprehensive Survey.
CoRR, 2024

A Temporally Disentangled Contrastive Diffusion Model for Spatiotemporal Imputation.
CoRR, 2024

Meta label associated loss for fine-grained visual recognition.
Sci. China Inf. Sci., 2024

VPRQ: Verifiable and privacy-preserving range query over encrypted cloud data.
Comput. Electr. Eng., 2024

SIHQR model with time delay for worm spread analysis in IIoT-enabled PLC network.
Ad Hoc Networks, 2024

DRL-Based Two-Stage SFC Deployment Approach Under Latency Constraints.
Proceedings of the IEEE INFOCOM 2024, 2024

SGD-YOLOv5: A Small Object Detection Model for Complex Industrial Environments.
Proceedings of the International Joint Conference on Neural Networks, 2024

Fairness-Aware Federated Learning Framework on Heterogeneous Data Distributions.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Security Challenges and Potential Solutions in Aerial-Terrestrial Wireless Networking.
IEEE Internet Things Mag., December, 2023

An efficient confidentiality protection solution for pub/sub system.
Cybersecur., December, 2023

SAM: Query-efficient Adversarial Attacks against Graph Neural Networks.
ACM Trans. Priv. Secur., November, 2023

Consensus Convergence Speed in Social Network DeGroot Model: The Effects of the Agents With High Self-Confidence Levels.
IEEE Trans. Comput. Soc. Syst., October, 2023

Computation Offloading Method Using Stochastic Games for Software-Defined-Network-Based Multiagent Mobile Edge Computing.
IEEE Internet Things J., October, 2023

Trustworthy Sensor Fusion Against Inaudible Command Attacks in Advanced Driver-Assistance Systems.
IEEE Internet Things J., October, 2023

DMRA: Model Usability Detection Scheme Against Model-Reuse Attacks in the Internet of Things.
IEEE Internet Things J., October, 2023

Disjoint Paths Construction and Fault-Tolerant Routing in BCube of Data Center Networks.
IEEE Trans. Computers, September, 2023

Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems.
Expert Syst. Appl., September, 2023

NFLCS: An Service Function Chain Path Optimization Strategy Based on Network-Functional Layout Clustering.
IEEE Trans. Veh. Technol., August, 2023

Toward IoT Node Authentication Mechanism in Next Generation Networks.
IEEE Internet Things J., August, 2023

VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems.
Digit. Commun. Networks, August, 2023

A transformer with layer-cross decoding for remaining useful life prediction.
J. Supercomput., July, 2023

PASTO: Enabling Secure and Efficient Task Offloading in TrustZone-Enabled Edge Clouds.
IEEE Trans. Veh. Technol., June, 2023

Multi-agent DRL for joint completion delay and energy consumption with queuing theory in MEC-based IIoT.
J. Parallel Distributed Comput., June, 2023

STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things.
J. Netw. Comput. Appl., May, 2023

Differentially Private Crowdsourcing With the Public and Private Blockchain.
IEEE Internet Things J., May, 2023

UAV Placement for VR Reconstruction: A Tradeoff Between Resolution and Delay.
IEEE Commun. Lett., May, 2023

Chronos: Accelerating Federated Learning With Resource Aware Training Volume Tuning at Network Edges.
IEEE Trans. Veh. Technol., March, 2023

Time-Varying Topology Model for Dynamic Routing in LEO Satellite Constellation Networks.
IEEE Trans. Veh. Technol., March, 2023

Frequency Energy Ratio Cell Based Operational Security Domain Analysis of Planetary Gearbox.
IEEE Trans. Reliab., March, 2023

Efficient Federated DRL-Based Cooperative Caching for Mobile Edge Networks.
IEEE Trans. Netw. Serv. Manag., March, 2023

Toward Large-Scale Graph-Based Traffic Forecasting: A Data-Driven Network Partitioning Approach.
IEEE Internet Things J., March, 2023

Machine Learning Empowered Intelligent Data Center Networking - Evolution, Challenges and Opportunities
Springer Briefs in Computer Science, Springer, ISBN: 978-981-19-7394-9, 2023

DTE-RR: Dynamic Topology Evolution-Based Reliable Routing in VANET.
IEEE Wirel. Commun. Lett., 2023

Personalized Individual Semantics Learning to Support a Large-Scale Linguistic Consensus Process.
ACM Trans. Internet Techn., 2023

APDP: Attribute-Based Personalized Differential Privacy Data Publishing Scheme for Social Networks.
IEEE Trans. Netw. Sci. Eng., 2023

Boosting Accuracy of Differentially Private Federated Learning in Industrial IoT With Sparse Responses.
IEEE Trans. Ind. Informatics, 2023

LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2023

Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks.
IEEE Trans. Inf. Forensics Secur., 2023

Joint Differential Game and Double Deep Q-Networks for Suppressing Malware Spread in Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023

A High Accuracy and Adaptive Anomaly Detection Model With Dual-Domain Graph Convolutional Network for Insider Threat Detection.
IEEE Trans. Inf. Forensics Secur., 2023

A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Optimizing the Numbers of Queries and Replies in Convex Federated Learning With Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2023

VOSA: Verifiable and Oblivious Secure Aggregation for Privacy-Preserving Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios.
IEEE Trans. Dependable Secur. Comput., 2023

UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies.
IEEE Trans. Dependable Secur. Comput., 2023

Detecting Adversarial Examples on Deep Neural Networks With Mutual Information Neural Estimation.
IEEE Trans. Dependable Secur. Comput., 2023

Self-Adaptive Gradient Quantization for Geo-Distributed Machine Learning Over Heterogeneous and Dynamic Networks.
IEEE Trans. Cloud Comput., 2023

Deep Reinforcement Learning-Based Resource Allocation for Content Distribution in IoT-Edge-Cloud Computing Environments.
Symmetry, 2023

Stealthy Backdoor Attack Against Speaker Recognition Using Phase-Injection Hidden Trigger.
IEEE Signal Process. Lett., 2023

Variational co-embedding learning for attributed network clustering.
Knowl. Based Syst., 2023

Enhancing Trajectory Recovery From Gradients via Mobility Prior Knowledge.
IEEE Internet Things J., 2023

Computation Placement Orchestrator for Mobile-Edge Computing in Heterogeneous Vehicular Networks.
IEEE Internet Things J., 2023

Hitting Moving Targets: Intelligent Prevention of IoT Intrusions on the Fly.
IEEE Internet Things J., 2023

Efficient Federated Learning for AIoT Applications Using Knowledge Distillation.
IEEE Internet Things J., 2023

FedInf: Social influence prediction with federated learning.
Neurocomputing, 2023

AAQ-PEKS: An Attribute-based Anti-Quantum Public-Key Encryption Scheme with Keyword Search for E-healthcare Scenarios.
IACR Cryptol. ePrint Arch., 2023

The SRVM: A Similarity-Based Relevance Vector Machine for Remaining Useful Lifetime Prediction in the Industrial Internet of Things.
IEEE Intell. Syst., 2023

A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning.
ACM Comput. Surv., 2023

MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks.
CoRR, 2023

Towards Blockchain-Assisted Privacy-Aware Data Sharing For Edge Intelligence: A Smart Healthcare Perspective.
CoRR, 2023

Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced Driver-Assistance System.
CoRR, 2023

pFedSim: Similarity-Aware Model Aggregation Towards Personalized Federated Learning.
CoRR, 2023

High-frequency Matters: An Overwriting Attack and defense for Image-processing Neural Network Watermarking.
CoRR, 2023

Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023

Reinforcement Learning-Based Physical Cross-Layer Security and Privacy in 6G.
IEEE Commun. Surv. Tutorials, 2023

Combining Federated Learning and Edge Computing Toward Ubiquitous Intelligence in 6G Network: Challenges, Recent Advances, and Future Directions.
IEEE Commun. Surv. Tutorials, 2023

Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence.
Big Data Min. Anal., 2023

RUE: Realising Unlearning from the Perspective of Economics.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Inferring Private Data from AI Models in Metaverse through Black-box Model Inversion Attacks.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

SEI-DM: Crafting Revolutionary RF Signals in Low-Resource Settings via Diffusion Model.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

Adversarial Domain Generalization Defense for Automatic Modulation Classification.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

Construct New Graphs Using Information Bottleneck Against Property Inference Attacks.
Proceedings of the IEEE International Conference on Communications, 2023

A Location Privacy and Query Privacy Joint Protection Scheme for POI Query in Vehicular Networks.
Proceedings of the IEEE International Conference on Communications, 2023

FedMC: Federated Learning with Mode Connectivity Against Distributed Backdoor Attacks.
Proceedings of the IEEE International Conference on Communications, 2023

Conditional Matching GAN Guided Reconstruction Attack in Machine Unlearning.
Proceedings of the IEEE Global Communications Conference, 2023

Hybrid Beamforming Design for Beam-Hopping LEO Satellite Communications.
Proceedings of the IEEE Global Communications Conference, 2023

CP-FL: Practical Gradient Leakage Defense in Federated Learning with Compressive Privacy.
Proceedings of the IEEE Global Communications Conference, 2023

Enhancing Federated Learning by One-Shot Transferring of Intermediate Features from Clients.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

Efficient Giant Graph Unlearning via Push-Pull Tuning.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

Extracting Privacy-Preserving Subgraphs in Federated Graph Learning using Information Bottleneck.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

BFU: Bayesian Federated Unlearning with Parameter Self-Sharing.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

Security and Privacy in Federated Learning
Springer, ISBN: 978-981-19-8691-8, 2023

2022
Privacy Preservation in IoT: Machine Learning Approaches - A Comprehensive Survey and Use Cases
Springer Briefs in Computer Science, Springer, ISBN: 978-981-19-1796-7, 2022

Optimizing High-Speed Mobile Networks with Smart Collaborative Theory.
IEEE Wirel. Commun., 2022

DR-SDSN: An Elastic Differentiated Routing Framework for Software-Defined Satellite Networks.
IEEE Wirel. Commun., 2022

Ubiquitous Transmission Service: Hierarchical Wireless Data Rate Provisioning in Space-Air-Ocean Integrated Networks.
IEEE Trans. Wirel. Commun., 2022

The Role of Communication Time in the Convergence of Federated Edge Learning.
IEEE Trans. Veh. Technol., 2022

TWCC: A Robust Through-the-Wall Crowd Counting System Using Ambient WiFi Signals.
IEEE Trans. Veh. Technol., 2022

FDSA-STG: Fully Dynamic Self-Attention Spatio-Temporal Graph Networks for Intelligent Traffic Flow Prediction.
IEEE Trans. Veh. Technol., 2022

Content Caching-Enhanced Computation Offloading in Mobile Edge Service Networks.
IEEE Trans. Veh. Technol., 2022

Repeatable Multi-Dimensional Virtual Network Embedding in Cloud Service Platform.
IEEE Trans. Serv. Comput., 2022

IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems.
IEEE Trans. Serv. Comput., 2022

Non-Line-of-Sight Localization of Passive UHF RFID Tags in Smart Storage Systems.
IEEE Trans. Mob. Comput., 2022

Matrix Completion via Schatten Capped $p$p Norm.
IEEE Trans. Knowl. Data Eng., 2022

Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures.
IEEE Trans. Ind. Informatics, 2022

A Covert Electricity-Theft Cyberattack Against Machine Learning-Based Detection Models.
IEEE Trans. Ind. Informatics, 2022

Attribute-Based Hierarchical Access Control With Extendable Policy.
IEEE Trans. Inf. Forensics Secur., 2022

LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check.
IEEE Trans. Inf. Forensics Secur., 2022

Peripheral-Free Device Pairing by Randomly Switching Power.
IEEE Trans. Dependable Secur. Comput., 2022

IPANM: Incentive Public Auditing Scheme for Non-Manager Groups in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Near-Optimal Energy-Efficient Algorithm for Virtual Network Function Placement.
IEEE Trans. Cloud Comput., 2022

Efficient Provision of Service Function Chains in Overlay Networks Using Reinforcement Learning.
IEEE Trans. Cloud Comput., 2022

Identification of Encrypted Traffic Through Attention Mechanism Based Long Short Term Memory.
IEEE Trans. Big Data, 2022

Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud.
IEEE Trans. Big Data, 2022

NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users.
IEEE Trans. Big Data, 2022

Heterogeneous representation learning and matching for few-shot relation prediction.
Pattern Recognit., 2022

Efficient Video Privacy Protection Against Malicious Face Recognition Models.
IEEE Open J. Comput. Soc., 2022

Guest Editorial: Trust, Security and Privacy of 6G.
IEEE Netw., 2022

FedTwin: Blockchain-Enabled Adaptive Asynchronous Federated Learning for Digital Twin Networks.
IEEE Netw., 2022

An Effective Double-Layer Detection System Against Social Engineering Attacks.
IEEE Netw., 2022

Attacking neural machine translations via hybrid attention learning.
Mach. Learn., 2022

FlexMon: A flexible and fine-grained traffic monitor for programmable networks.
J. Netw. Comput. Appl., 2022

Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination.
J. Inf. Secur. Appl., 2022

USST: A two-phase privacy-preserving framework for personalized recommendation with semi-distributed training.
Inf. Sci., 2022

Achieving privacy-preserving sensitive attributes for large universe based on private set intersection.
Inf. Sci., 2022

SEMMI: Multi-party security decision-making scheme for linear functions in the internet of medical things.
Inf. Sci., 2022

FL-SEC: Privacy-Preserving Decentralized Federated Learning Using SignSGD for the Internet of Artificially Intelligent Things.
IEEE Internet Things Mag., 2022

DRL-Based Deadline-Driven Advance Reservation Allocation in EONs for Cloud-Edge Computing.
IEEE Internet Things J., 2022

Toward Crowdsourced Transportation Mode Identification: A Semisupervised Federated Learning Approach.
IEEE Internet Things J., 2022

A Communication-Efficient Federated Learning Scheme for IoT-Based Traffic Forecasting.
IEEE Internet Things J., 2022

A Survey of Public-Key Encryption With Search Functionality for Cloud-Assisted IoT.
IEEE Internet Things J., 2022

Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things.
IEEE Internet Things J., 2022

Security-Aware and Privacy-Preserving Personal Health Record Sharing Using Consortium Blockchain.
IEEE Internet Things J., 2022

Modeling on Energy-Efficiency Computation Offloading Using Probabilistic Action Generating.
IEEE Internet Things J., 2022

Guided Activity Prediction for Minimally Invasive Surgery Safety Improvement in the Internet of Medical Things.
IEEE Internet Things J., 2022

Intelligent Jamming Defense Using DNN Stackelberg Game in Sensor Edge Cloud.
IEEE Internet Things J., 2022

A Reliable and Efficient Task Offloading Strategy Based on Multifeedback Trust Mechanism for IoT Edge Computing.
IEEE Internet Things J., 2022

Guest Editorial Special Issue on Security, Privacy, and Trustworthiness in Intelligent Cyber-Physical Systems and Internet of Things.
IEEE Internet Things J., 2022

Efficient Cache Consistency Management for Transient IoT Data in Content-Centric Networking.
IEEE Internet Things J., 2022

FedTor: An Anonymous Framework of Federated Learning in Internet of Things.
IEEE Internet Things J., 2022

A Reliable and Lightweight Trust Inference Model for Service Recommendation in SIoT.
IEEE Internet Things J., 2022

Three-Dimensional Cooperative Positioning for Internet of Things Provenance.
IEEE Internet Things J., 2022

Detecting adversarial examples by additional evidence from noise domain.
IET Image Process., 2022

Challenges and future directions of secure federated learning: a survey.
Frontiers Comput. Sci., 2022

(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility.
Trans. Emerg. Telecommun. Technol., 2022

A family system based evolutionary algorithm for obstacle-evasion minimal exposure path problem in Internet of Things.
Expert Syst. Appl., 2022

Value-based reinforcement learning approaches for task offloading in Delay Constrained Vehicular Edge Computing.
Eng. Appl. Artif. Intell., 2022

A survey on deep learning for textual emotion analysis in social networks.
Digit. Commun. Networks, 2022

Machine Learning Empowered Intelligent Data Center Networking: A Survey.
CoRR, 2022

Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks.
Concurr. Comput. Pract. Exp., 2022

Community detection using multitopology and attributes in social networks.
Concurr. Comput. Pract. Exp., 2022

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects.
Comput. Secur., 2022

Joint optimization of Service Chain Graph Design and Mapping in NFV-enabled networks.
Comput. Networks, 2022

VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems.
Sci. China Inf. Sci., 2022

Crowdsourcing-based Multi-Device Communication Cooperation for Mobile High-Quality Video Enhancement.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022

Graph-Based Traffic Forecasting via Communication-Efficient Federated Learning.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

A Multi-objective based Inter-Layer Link Allocation Scheme for MEO/LEO Satellite Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck.
Proceedings of the IEEE International Conference on Trust, 2022

BI-GAN: batch inversion membership inference attack on federated learning.
Proceedings of the MobiArch '22: Proceedings of the 17th ACM Workshop on Mobility in the Evolving Internet Architecture, 2022

DRL-based Resource Allocation Optimization for Computation Offloading in Mobile Edge Computing.
Proceedings of the IEEE INFOCOM 2022, 2022

Personalized Privacy-Preserving Medical Data Sharing for Blockchain-based Smart Healthcare Networks.
Proceedings of the IEEE International Conference on Communications, 2022

SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things.
Proceedings of the IEEE International Conference on Communications, 2022

Maximum Focal Inter-Class Angular Loss with Norm Constraint for Automatic Modulation Classification.
Proceedings of the IEEE Global Communications Conference, 2022

The Converged Scheduling for Time Sensitive Mission in Satellite Formation Flying.
Proceedings of the IEEE Global Communications Conference, 2022

Locally Random Sampling for Practical Privacy Protection in Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2022

A NTRU-Based Access Authentication Scheme for Satellite Terrestrial Integrated Network.
Proceedings of the IEEE Global Communications Conference, 2022

A Deep Reinforcement Learning Approach to Edge-based IDS Packets Sampling.
Proceedings of the 5th International Conference on Data Science and Information Technology, 2022

BASS: Blockchain-Based Asynchronous SignSGD for Robust Collaborative Data Mining.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022

Message from the Program Chairs BigDataSecurity 2022.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

GSMI: A Gradient Sign Optimization Based Model Inversion Method.
Proceedings of the AI 2021: Advances in Artificial Intelligence, 2022

DDoS Attack Detection Combining Time Series-based Multi-dimensional Sketch and Machine Learning.
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022

2021
Adaptive Multi-Access Algorithm for Multi-Service Edge Users in 5G Ultra-Dense Heterogeneous Networks.
IEEE Trans. Veh. Technol., 2021

CoPace: Edge Computation Offloading and Caching for Self-Driving With Deep Reinforcement Learning.
IEEE Trans. Veh. Technol., 2021

Can Steering Wheel Detect Your Driving Fatigue?
IEEE Trans. Veh. Technol., 2021

Promotion of Answer Value Measurement With Domain Effects in Community Question Answering Systems.
IEEE Trans. Syst. Man Cybern. Syst., 2021

DP-LTOD: Differential Privacy Latent Trajectory Community Discovering Services over Location-Based Social Networks.
IEEE Trans. Serv. Comput., 2021

Efficient Virtual Network Embedding of Cloud-Based Data Center Networks into Optical Networks.
IEEE Trans. Parallel Distributed Syst., 2021

Compatibility-Aware Web API Recommendation for Mashup Creation via Textual Description Mining.
ACM Trans. Multim. Comput. Commun. Appl., 2021

On-Demand Dynamic Controller Placement in Software Defined Satellite-Terrestrial Networking.
IEEE Trans. Netw. Serv. Manag., 2021

Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks.
IEEE Trans. Netw. Sci. Eng., 2021

FASTGNN: A Topological Information Protected Federated Learning Approach for Traffic Speed Forecasting.
IEEE Trans. Ind. Informatics, 2021

An SDN-Enabled Proactive Defense Framework for DDoS Mitigation in IoT Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Memory Augmented Hierarchical Attention Network for Next Point-of-Interest Recommendation.
IEEE Trans. Comput. Soc. Syst., 2021

Complicating the Social Networks for Better Storytelling: An Empirical Study of Chinese Historical Text and Novel.
IEEE Trans. Comput. Soc. Syst., 2021

DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publication.
Soft Comput., 2021

Plug-in over Plug-in Evaluation in Heterogeneous 5G Enabled Networks and Beyond.
IEEE Netw., 2021

Enabling Machine Learning with Service Function Chaining for Security Enhancement at 5G Edges.
IEEE Netw., 2021

A Software-Defined-Networking-Enabled Approach for Edge-Cloud Computing in the Internet of Things.
IEEE Netw., 2021

A survey on incorporating domain knowledge into deep learning for medical image analysis.
Medical Image Anal., 2021

Protected Resource Allocation in Space Division Multiplexing-Elastic Optical Networks with Fluctuating Traffic.
J. Netw. Comput. Appl., 2021

Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot.
J. Netw. Comput. Appl., 2021

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing.
KSII Trans. Internet Inf. Syst., 2021

Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks.
Inf. Sci., 2021

Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system.
Inf. Sci., 2021

A Tutorial on Next Generation Heterogeneous IoT Networks and Node Authentication.
IEEE Internet Things Mag., 2021

Energy-Efficient Deep Reinforced Traffic Grooming in Elastic Optical Networks for Cloud-Fog Computing.
IEEE Internet Things J., 2021

Gate-ID: WiFi-Based Human Identification Irrespective of Walking Directions in Smart Home.
IEEE Internet Things J., 2021

PoisonGAN: Generative Poisoning Attacks Against Federated Learning in Edge Computing Systems.
IEEE Internet Things J., 2021

Context-Aware Adaptive Route Mutation Scheme: A Reinforcement Learning Approach.
IEEE Internet Things J., 2021

Fast Containment of Infectious Diseases With E-Healthcare Mobile Social Internet of Things.
IEEE Internet Things J., 2021

Deep-Reinforcement-Learning-Based User Profile Perturbation for Privacy-Aware Recommendation.
IEEE Internet Things J., 2021

6G-Enabled Short-Term Forecasting for Large-Scale Traffic Flow in Massive IoT Based on Time-Aware Locality-Sensitive Hashing.
IEEE Internet Things J., 2021

A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud.
IEEE Internet Things J., 2021

Aspect-level sentiment analysis using context and aspect memory network.
Neurocomputing, 2021

Energy efficiency with service availability guarantee for Network Function Virtualization.
Future Gener. Comput. Syst., 2021

Fooling intrusion detection systems using adversarially autoencoder.
Digit. Commun. Networks, 2021

Optimizing the Numbers of Queries and Replies in Federated Learning with Differential Privacy.
CoRR, 2021

Too Expensive to Attack: A Joint Defense Framework to Mitigate Distributed Attacks for the Internet of Things Grid.
CoRR, 2021

On the Practicality of Differential Privacy in Federated Learning by Tuning Iteration Times.
CoRR, 2021

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments.
IEEE Access, 2021

A Hybrid Intrusion Detection System Based on Machine Learning under Differential Privacy Protection.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

A Novel Android Malware Detection Method Based on Visible User Interface.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Too Expensive to Attack: Enlarge the Attack Expense through Joint Defense at the Edge.
Proceedings of the 20th IEEE International Conference on Trust, 2021

A Blockchain based Privacy-Preserving Reputation Scheme for Cloud Service.
Proceedings of the ICC 2021, 2021

Data Privacy Protection based on Feature Dilution in Cloud Services.
Proceedings of the IEEE Global Communications Conference, 2021

ICE: Intelligent Caching at the Edge.
Proceedings of the IEEE Global Communications Conference, 2021

Safeguard the Original Data in Federated Learning via Data Decomposition.
Proceedings of the IEEE Global Communications Conference, 2021

A Novel Mobile Core Network Architecture for Satellite-Terrestrial Integrated Network.
Proceedings of the IEEE Global Communications Conference, 2021

Dynamic Routing for Software-Defined LEO Satellite Networks based on ISL Attributes.
Proceedings of the IEEE Global Communications Conference, 2021

Augmented Dual-Shuffle-based Moving Target Defense to Ensure CIA-triad in Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2021

Emotion Classification of Text Based on BERT and Broad Learning System.
Proceedings of the Web and Big Data - 5th International Joint Conference, 2021

Personalized Privacy Protection in Big Data
Springer, ISBN: 978-981-16-3749-0, 2021

2020
A Packet Reception Probability-Based Reliable Routing Protocol for 3D VANET.
IEEE Wirel. Commun. Lett., 2020

Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks.
IEEE Wirel. Commun. Lett., 2020

Energy-Latency Tradeoff for Dynamic Computation Offloading in Vehicular Fog Computing.
IEEE Trans. Veh. Technol., 2020

Link Reliability-Based Adaptive Routing for Multilevel Vehicular Networks.
IEEE Trans. Veh. Technol., 2020

Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management.
IEEE Trans. Netw. Sci. Eng., 2020

Introduction to the Special Section on Network Science for Internet of Things (IoT).
IEEE Trans. Netw. Sci. Eng., 2020

GAN-Driven Personalized Spatial-Temporal Private Data Sharing in Cyber-Physical Social Systems.
IEEE Trans. Netw. Sci. Eng., 2020

Privacy on the Edge: Customizable Privacy-Preserving Context Sharing in Hierarchical Edge Computing.
IEEE Trans. Netw. Sci. Eng., 2020

SentiDiff: Combining Textual Information and Sentiment Diffusion Patterns for Twitter Sentiment Analysis.
IEEE Trans. Knowl. Data Eng., 2020

PASPORT: A Secure and Private Location Proof Generation and Verification Framework.
IEEE Trans. Comput. Soc. Syst., 2020

Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data.
IEEE Trans. Cloud Comput., 2020

Cross-Cloud MapReduce for Big Data.
IEEE Trans. Cloud Comput., 2020

FDFA: A fog computing assisted distributed analytics and detecting system for family activities.
Peer-to-Peer Netw. Appl., 2020

Analysis and Insights for Myths Circulating on Twitter During the COVID-19 Pandemic.
IEEE Open J. Comput. Soc., 2020

Blockchain for secure location verification.
J. Parallel Distributed Comput., 2020

An efficient pipeline processing scheme for programming Protocol-independent Packet Processors.
J. Netw. Comput. Appl., 2020

An enhanced probabilistic fairness-aware group recommendation by incorporating social activeness.
J. Netw. Comput. Appl., 2020

Efficient measurement of round-trip link delays in software-defined networks.
J. Netw. Comput. Appl., 2020

Reliability-aware virtual network function placement in carrier networks.
J. Netw. Comput. Appl., 2020

Detecting false data attacks using machine learning techniques in smart grid: A survey.
J. Netw. Comput. Appl., 2020

Blockchain for Internet of things applications: A review and open issues.
J. Netw. Comput. Appl., 2020

RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection.
J. Netw. Comput. Appl., 2020

Elastic Resilience for Software-Defined Satellite Networking: Challenges, Solutions, and Open Issues.
IT Prof., 2020

Privacy-Preserving Federated Learning in Fog Computing.
IEEE Internet Things J., 2020

APIS: Privacy-Preserving Incentive for Sensing Task Allocation in Cloud and Edge-Cooperation Mobile Internet of Things With SDN.
IEEE Internet Things J., 2020

Adaptive and Extensible Energy Supply Mechanism for UAVs-Aided Wireless-Powered Internet of Things.
IEEE Internet Things J., 2020

A Fog-Based Recommender System.
IEEE Internet Things J., 2020

Alleviating Heterogeneity in SDN-IoT Networks to Maintain QoS and Enhance Security.
IEEE Internet Things J., 2020

An Application Development Framework for Internet-of-Things Service Orchestration.
IEEE Internet Things J., 2020

Decentralized Privacy Using Blockchain-Enabled Federated Learning in Fog Computing.
IEEE Internet Things J., 2020

Efficient Human Activity Recognition Using a Single Wearable Sensor.
IEEE Internet Things J., 2020

WiReader: Adaptive Air Handwriting Recognition Based on Commercial WiFi Signal.
IEEE Internet Things J., 2020

Special issue on natural computation, fuzzy systems and knowledge discovery from the ICNC&FSKD 2017.
Neurocomputing, 2020

A Study of User Activity Patterns and the Effect of Venue Types on City Dynamics Using Location-Based Social Network Data.
ISPRS Int. J. Geo Inf., 2020

Location-Based Social Network's Data Analysis and Spatio-Temporal Modeling for the Mega City of Shanghai, China.
ISPRS Int. J. Geo Inf., 2020

An Inherent Property-Based Rumor Dissemination Model in Online Social Networks.
IEEE Netw. Lett., 2020

HostWatcher: Protecting hosts in cloud data centers through software-defined networking.
Future Gener. Comput. Syst., 2020

A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems.
Future Gener. Comput. Syst., 2020

Security and privacy in 6G networks: New areas and new challenges.
Digit. Commun. Networks, 2020

Attacks and defences on intelligent connected vehicles: a survey.
Digit. Commun. Networks, 2020

Blockchain Meets Cloud Computing: A Survey.
IEEE Commun. Surv. Tutorials, 2020

Secure search for encrypted personal health records from big data NoSQL databases in cloud.
Computing, 2020

Adaptive service function chaining mappings in 5G using deep Q-learning.
Comput. Commun., 2020

Generative adversarial networks enhanced location privacy in 5G networks.
Sci. China Inf. Sci., 2020

Exploiting relay nodes for maximizing wireless underground sensor network lifetime.
Appl. Intell., 2020

Efficient meta-heuristic approaches in solving minimal exposure path problem for heterogeneous wireless multimedia sensor networks in internet of things.
Appl. Intell., 2020

A Data Storage and Sharing Scheme for Cyber-Physical-Social Systems.
IEEE Access, 2020

IEEE Access Special Section Editorial: Artificial Intelligence in Cybersecurity.
IEEE Access, 2020

Data Poison Detection Schemes for Distributed Machine Learning.
IEEE Access, 2020

An Online Pricing Strategy of EV Charging and Data Caching in Highway Service Stations.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Performance analysis of indoor localization based on channel state information ranging model.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020

A Unified Federated Learning Framework for Wireless Communications: towards Privacy, Efficiency, and Security.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Non-Technical Losses Detection in Smart Grids: An Ensemble Data-Driven Approach.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

GAN Enhanced Membership Inference: A Passive Local Attack in Federated Learning.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Dynamic Sample Selection for Federated Learning with Heterogeneous Data in Fog Computing.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Evaluating and Improving Adversarial Attacks on DNN-Based Modulation Recognition.
Proceedings of the IEEE Global Communications Conference, 2020

Scalable and Updatable Attribute-based Privacy Protection Scheme for Big Data Publishing.
Proceedings of the IEEE Global Communications Conference, 2020

An Enhanced Motif Graph Clustering-Based Deep Learning Approach for Traffic Forecasting.
Proceedings of the IEEE Global Communications Conference, 2020

Game Theory for Mobile Location Privacy.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

2019
Malicious Attack Propagation and Source Identification
Advances in Information Security 73, Springer, ISBN: 978-3-030-02178-8, 2019

Defending Against Flow Table Overloading Attack in Software-Defined Networks.
IEEE Trans. Serv. Comput., 2019

Efficient Data Placement and Replication for QoS-Aware Approximate Query Evaluation of Big Data Analytics.
IEEE Trans. Parallel Distributed Syst., 2019

Differential Privacy Oriented Distributed Online Learning for Mobile Social Video Prefetching.
IEEE Trans. Multim., 2019

An Immunization Framework for Social Networks Through Big Data Based Influence Modeling.
IEEE Trans. Dependable Secur. Comput., 2019

Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks.
IEEE Trans. Dependable Secur. Comput., 2019

Impact of Social Network Structures on Uncertain Opinion Formation.
IEEE Trans. Comput. Soc. Syst., 2019

A Feedback Mechanism With Bounded Confidence- Based Optimization Approach for Consensus Reaching in Multiple Attribute Large-Scale Group Decision-Making.
IEEE Trans. Comput. Soc. Syst., 2019

Stability of Cloud-Based UAV Systems Supporting Big Data Acquisition and Processing.
IEEE Trans. Cloud Comput., 2019

Enabling Efficient Service Function Chains at Terrestrial-Satellite Hybrid Cloud Networks.
IEEE Netw., 2019

Wheat ear growth modeling based on a polygon.
Frontiers Inf. Technol. Electron. Eng., 2019

Inference attack in Android Activity based on program fingerprint.
J. Netw. Comput. Appl., 2019

HSIRD: A model for characterizing dynamics of malware diffusion in heterogeneous WSNs.
J. Netw. Comput. Appl., 2019

A reliable reputation computation framework for online items in E-commerce.
J. Netw. Comput. Appl., 2019

Efficient DDoS attacks mitigation for stateful forwarding in Internet of Things.
J. Netw. Comput. Appl., 2019

HRCal: An effective calibration system for heart rate detection during exercising.
J. Netw. Comput. Appl., 2019

Three-dimensional robot localization using cameras in wireless multimedia sensor networks.
J. Netw. Comput. Appl., 2019

Improving Data Utility Through Game Theory in Personalized Differential Privacy.
J. Comput. Sci. Technol., 2019

Editorial of cross-layer design issues, challenges and opportunities for future intelligent heterogeneous networks.
J. Ambient Intell. Humaniz. Comput., 2019

A heuristic line piloting method to disclose malicious taxicab driver's privacy over GPS big data.
Inf. Sci., 2019

Forwarding Rule Multiplexing for Scalable SDN-Based Internet of Things.
IEEE Internet Things J., 2019

Location Privacy Protection in Smart Health Care System.
IEEE Internet Things J., 2019

Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading.
IEEE Internet Things J., 2019

ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms.
IEEE Internet Things J., 2019

Sustainability Analysis for Fog Nodes With Renewable Energy Supplies.
IEEE Internet Things J., 2019

Analysis of Policy-Based Security Management System in Software-Defined Networks.
IEEE Commun. Lett., 2019

Cyber security framework for Internet of Things-based Energy Internet.
Future Gener. Comput. Syst., 2019

Consensus efficiency in group decision making: A comprehensive comparative study and its optimal design.
Eur. J. Oper. Res., 2019

An Overview of Attacks and Defences on Intelligent Connected Vehicles.
CoRR, 2019

Modelling the impact of interference on the energy efficiency of WLANs.
Concurr. Comput. Pract. Exp., 2019

SeShare: Secure cloud data sharing based on blockchain and public auditing.
Concurr. Comput. Pract. Exp., 2019

Data Science and Artificial Intelligence for Communications.
IEEE Commun. Mag., 2019

Data Science and Artificial Intelligence for Communications.
IEEE Commun. Mag., 2019

Efficient solution to the millionaires' problem based on asymmetric commutative encryption scheme.
Comput. Intell., 2019

EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid.
Sci. China Inf. Sci., 2019

Joint Power Control and Channel Allocation for Interference Mitigation Based on Reinforcement Learning.
IEEE Access, 2019

Driver Drowsiness Detection Using Multi-Channel Second Order Blind Identifications.
IEEE Access, 2019

An Energy-Efficient Region Source Routing Protocol for Lifetime Maximization in WSN.
IEEE Access, 2019

An Efficient Privacy-Preserving Mutual Authentication Scheme for Secure V2V Communication in Vehicular Ad Hoc Network.
IEEE Access, 2019

Poisoning Attack in Federated Learning using Generative Adversarial Nets.
Proceedings of the 18th IEEE International Conference On Trust, 2019

HSDC-Net: Secure Anonymous Messaging in Online Social Networks.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Multi-Task Network Anomaly Detection using Federated Learning.
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019

An Economical and High-Quality Encryption Scheme for Cloud Servers with GPUs.
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019

A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration.
Proceedings of the Network and System Security - 13th International Conference, 2019

Policy-based Bigdata Security and QoS Framework for SDN/IoT: An Analytic Approach.
Proceedings of the IEEE INFOCOM 2019, 2019

A Decentralized Private Data Transaction Pricing and Quality Control Method.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Trajectory Prediction of UAV in Smart City using Recurrent Neural Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Segment Routing Optimization for VNF Chaining.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

GAN-DP: Generative Adversarial Net Driven Differentially Privacy-Preserving Big Data Publishing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

PDGAN: A Novel Poisoning Defense Method in Federated Learning Using Generative Adversarial Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Adaptive Detection Method for Packet-In Message Injection Attack in SDN.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

DAPS: A Decentralized Anonymous Payment Scheme with Supervision.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Tiger Tally: Cross-Domain Scheme for Different Authentication Mechanism.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

An Open Identity Authentication Scheme Based on Blockchain.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

PEFL: A Privacy-Enhanced Federated Learning Scheme for Big Data Analytics.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Privacy Aware Recommendation: Reinforcement Learning Based User Profile Perturbation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

RLS-VNE: Repeatable Large-Scale Virtual Network Embedding over Substrate Nodes.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

SDN-Capable IoT Last-Miles: Design Challenges.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Word2Cluster: A New Multi-Label Text Clustering Algorithm with an Adaptive Clusters Number.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Privacy Preserving Fog-Enabled Dynamic Data Aggregation in Mobile Phone Sensing.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

MemNetAR: Memory Network with Adversative Relation for Target-Level Sentiment Classification.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

BQSV: Protecting SDN Controller Cluster's Network Topology View Based on Byzantine Quorum System with Verification Function.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Network Traffic Prediction Based on Deep Belief Network and Spatiotemporal Compressive Sensing in Wireless Mesh Backbone Networks.
Wirel. Commun. Mob. Comput., 2018

Collaborative ensemble learning under differential privacy.
Web Intell., 2018

Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things.
IEEE Wirel. Commun., 2018

An Adaptive Multipath Algorithm to Overcome the Unpredictability of Heterogeneous Wireless Networks for High-Speed Railway.
IEEE Trans. Veh. Technol., 2018

A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018

Improving SDN Scalability With Protocol-Oblivious Source Routing: A System-Level Study.
IEEE Trans. Netw. Serv. Manag., 2018

SERvICE: A Software Defined Framework for Integrated Space-Terrestrial Satellite Communication.
IEEE Trans. Mob. Comput., 2018

Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds.
IEEE Trans. Emerg. Top. Comput., 2018

Rumor Source Identification in Social Networks with Time-Varying Topology.
IEEE Trans. Dependable Secur. Comput., 2018

A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks.
IEEE Trans. Comput. Soc. Syst., 2018

Converged Network-Cloud Service Composition with End-to-End Performance Guarantee.
IEEE Trans. Cloud Comput., 2018

An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks.
EAI Endorsed Trans. Security Safety, 2018

A Collaborative Data Collection Scheme Based on Optimal Clustering for Wireless Sensor Networks.
Sensors, 2018

Managing consensus and self-confidence in multiplicative preference relations in group decision making.
Knowl. Based Syst., 2018

T-Trail: Link Failure Monitoring in Software-Defined Optical Networks.
JOCN, 2018

Data integrity verification of the outsourced big data in the cloud environment: A survey.
J. Netw. Comput. Appl., 2018

Quality-of-sensing aware budget constrained contaminant detection sensor deployment in water distribution system.
J. Netw. Comput. Appl., 2018

MC-VAP: A multi-connection virtual access point for high performance software-defined wireless networks.
J. Netw. Comput. Appl., 2018

Toward efficient parallel routing optimization for large-scale SDN networks using GPGPU.
J. Netw. Comput. Appl., 2018

Influence analysis in social networks: A survey.
J. Netw. Comput. Appl., 2018

Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server.
J. Netw. Comput. Appl., 2018

DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems.
J. Netw. Comput. Appl., 2018

DDSE: A novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks.
J. Netw. Comput. Appl., 2018

Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks.
IEEE Internet Things J., 2018

Guest Editorial Special Issue on Multimedia Big Data in Internet of Things.
IEEE Internet Things J., 2018

Privacy issues in social networks and analysis: a comprehensive survey.
IET Networks, 2018

Tuna: An Efficient and Practical Scheme for Wireless Access Point in 5G Networks Virtualization.
IEEE Commun. Lett., 2018

Social networking big data: Opportunities, solutions, and challenges.
Future Gener. Comput. Syst., 2018

Research on the Security of Blockchain Data: A Survey.
CoRR, 2018

Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective.
IEEE Commun. Mag., 2018

Traffic Engineering in Information-Centric Networking: Opportunities, Solutions and Challenges.
IEEE Commun. Mag., 2018

Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server.
Clust. Comput., 2018

Parallel and Progressive Approaches for Skyline Query Over Probabilistic Incomplete Database.
IEEE Access, 2018

A Novel Trust Evaluation Mechanism for Collaborative Filtering Recommender Systems.
IEEE Access, 2018

Efficient Performance Monitoring for Ubiquitous Virtual Networks Based on Matrix Completion.
IEEE Access, 2018

Profit-Aware Distributed Online Scheduling for Data-Oriented Tasks in Cloud Datacenters.
IEEE Access, 2018

A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View.
IEEE Access, 2018

Multi-Service Resource Allocation in Future Network With Wireless Virtualization.
IEEE Access, 2018

IEEE Access Special Section Editorial: Green Cloud and Fog Computing: Energy Efficiency and Sustainability Aware Infrastructures, Protocols, and Applications.
IEEE Access, 2018

MTF: Mitigating Link Flooding Attacks in Delay Tolerant Networks.
Proceedings of the 2018 IEEE SmartWorld, 2018

An Offloading Approach in Fog Computing Environment.
Proceedings of the 2018 IEEE SmartWorld, 2018

Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks.
Proceedings of the Network and System Security - 12th International Conference, 2018

Empirical study on taxi's mobility nature in dense urban area.
Proceedings of the IEEE INFOCOM 2018, 2018

Temporal-Sparsity Aware Service Recommendation Method via Hybrid Collaborative Filtering Techniques.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018

New Algorithm for Secure Outsourcing of Modular Exponentiation with Optimal Checkability Based on Single Untrusted Server.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Analyzing and Modelling the Interference Impact on Energy Efficiency of WLANs.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Energy-Efficient Virtual Network Function Placement in Telecom Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Green Social CPS Based E-Healthcare Systems to Control the Spread of Infectious Diseases.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Deadline-Aware Coflow Scheduling Approach for Big Data Applications.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Improving Data Utility through Game Theory in Personalized Differential Privacy.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

High Energy Efficiency Transmission in MIMO Satellite Communications.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An SMDP-Based Service Function Allocation Scheme for Mobile Edge Clouds.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Trust-Grained Personalized Privacy-Preserving Scheme for Big Social Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Virtualization of Table Resources in Programmable Data Plane with Global Consideration.
Proceedings of the IEEE Global Communications Conference, 2018

Towards QoS and Security in Software-Driven Heterogeneous Autonomous Networks.
Proceedings of the IEEE Global Communications Conference, 2018

FBI: Friendship Learning-Based User Identification in Multiple Social Networks.
Proceedings of the IEEE Global Communications Conference, 2018

SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification.
Proceedings of the IEEE Global Communications Conference, 2018

High Quality Participant Recruitment of Mobile Crowdsourcing over Big Data.
Proceedings of the IEEE Global Communications Conference, 2018

Automatic Selection of Security Service Function Chaining Using Reinforcement Learning.
Proceedings of the IEEE Globecom Workshops, 2018

Solving Selfish Routing in Route-by-Name Information-Centric Network Architectures.
Proceedings of the IEEE Global Communications Conference, 2018

AQ-DP: A New Differential Privacy Scheme Based on Quasi-Identifier Classifying in Big Data.
Proceedings of the IEEE Global Communications Conference, 2018

Customized Data Sharing Scheme Based on Blockchain and Weighted Attribute.
Proceedings of the IEEE Global Communications Conference, 2018

Efficient Mappings of Service Function Chains at Terrestrial-Satellite Hybrid Cloud Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Smart Water Flosser: A Novel Smart Oral Cleaner with IMU Sensor.
Proceedings of the IEEE Global Communications Conference, 2018

Inference Attack in Android Activity based on Program Fingerprint.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Full Cycle Campus Life of College Students: A Big Data Case in China.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018

A survey on big data stream processing in SDN supported cloud environment.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
A Scalable and Smart Hierarchical Wireless Communication Architecture Based on Network/User Separation.
IEEE Wirel. Commun., 2017

Enhancing Vehicular Communication Using 5G-Enabled Smart Collaborative Networking.
IEEE Wirel. Commun., 2017

A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment.
IEEE Trans. Parallel Distributed Syst., 2017

Impairment- and Splitting-Aware Cloud-Ready Multicast Provisioning in Elastic Optical Networks.
IEEE/ACM Trans. Netw., 2017

Mobile Live Video Streaming Optimization via Crowdsourcing Brokerage.
IEEE Trans. Multim., 2017

Resource Allocation in Space Multiaccess Systems.
IEEE Trans. Aerosp. Electron. Syst., 2017

HetNet: A Flexible Architecture for Heterogeneous Satellite-Terrestrial Networks.
IEEE Netw., 2017

Online multi-objective optimization for live video forwarding across video data centers.
J. Vis. Commun. Image Represent., 2017

Congestion-Aware Local Reroute for Fast Failure Recovery in Software-Defined Networks.
JOCN, 2017

A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion.
J. Netw. Comput. Appl., 2017

Modeling and performance analysis for multimedia data flows scheduling in software defined networks.
J. Netw. Comput. Appl., 2017

Social influence modeling using information theory in mobile social networks.
Inf. Sci., 2017

FogRoute: DTN-Based Data Dissemination Model in Fog Computing.
IEEE Internet Things J., 2017

How to shutdown a cloud: a DDoS attack in a private infrastructure-as-a-service cloud.
Int. J. Auton. Adapt. Commun. Syst., 2017

Local Fast Reroute With Flow Aggregation in Software Defined Networks.
IEEE Commun. Lett., 2017

A Sleeping and Offloading Optimization Scheme for Energy-Efficient WLANs.
IEEE Commun. Lett., 2017

Editorial: special issue on "big data security and privacy".
Digit. Commun. Networks, 2017

The structure of communities in scale-free networks.
Concurr. Comput. Pract. Exp., 2017

An energy-aware virtual machine scheduling method for service QoS enhancement in clouds over big data.
Concurr. Comput. Pract. Exp., 2017

Networking for Big Data: A Survey.
IEEE Commun. Surv. Tutorials, 2017

Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Commun. Surv. Tutorials, 2017

Locator/Identifier Split Networking: A Promising Future Internet Architecture.
IEEE Commun. Surv. Tutorials, 2017

Enhancing Crowd Collaborations for Software Defined Vehicular Networks.
IEEE Commun. Mag., 2017

A Novel Multipath-Transmission Supported Software Defined Wireless Network Architecture.
IEEE Access, 2017

Scoring Users' Privacy Disclosure Across Multiple Online Social Networks.
IEEE Access, 2017

Network Traffic Prediction Based on Deep Belief Network in Wireless Mesh Backbone Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Amplified Locality-Sensitive Hashing for Privacy-Preserving Distributed Service Recommendation.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Cloud Service Enhanced Method Supporting Context-Aware Applications.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Towards an Analysis of Traffic Shaping and Policing in Fog Networks Using Stochastic Fluid Models.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Distance-based location privacy protection in social networks.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

FuzzyDP: Fuzzy-based big data publishing against inquiry attacks.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Preferential attachment and the spreading influence of users in online social networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

On the two time scale characteristics of wireless high speed railway networks.
Proceedings of the IEEE International Conference on Communications, 2017

Big data set privacy preserving through sensitive attribute-based grouping.
Proceedings of the IEEE International Conference on Communications, 2017

Modeling software defined satellite networks using queueing theory.
Proceedings of the IEEE International Conference on Communications, 2017

Loss-aware adaptive scalable transmission in wireless high-speed railway networks.
Proceedings of the IEEE International Conference on Communications, 2017

Flow Entry Sharing in Protection Design for Software Defined Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Fuzzy Multi-Attribute Utility Based Network Selection Approach for High-Speed Railway Scenario.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Reliability of Cloud Controlled Multi-UAV Systems for On-Demand Services.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Resource-Efficient Virtual Network Function Placement in Operator Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Hybrid Location Privacy Protection Scheme in Big Data Environment.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

HCaching: High-Speed Caching for Information-Centric Networking.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Joint Virtual Network Function Selection and Traffic Steering in Telecom Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Are current resources in SDN allocated to maximum performance and minimize costs and maintaining QoS problems?
Proceedings of the Australasian Computer Science Week Multiconference, 2017

Privacy preserving in big data sets through multiple shuffle.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Link State Prediction-Based Reliable Transmission for High-Speed Railway Networks.
IEEE Trans. Veh. Technol., 2016

Towards Practical and Near-Optimal Coflow Scheduling for Data Center Networks.
IEEE Trans. Parallel Distributed Syst., 2016

Graph Theory-Based QoE-Driven Cooperation Stimulation for Content Dissemination in Device-to-Device Communication.
IEEE Trans. Emerg. Top. Comput., 2016

A Game-Theoretic Resource Allocation Approach for Intercell Device-to-Device Communications in Cellular Networks.
IEEE Trans. Emerg. Top. Comput., 2016

Joint Optimization of Task Scheduling and Image Placement in Fog Computing Supported Software-Defined Embedded System.
IEEE Trans. Computers, 2016

A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking.
IEEE Trans. Computers, 2016

Reliability Evaluation for Clustered WSNs under Malware Propagation.
Sensors, 2016

DDoS attacks on data plane of software-defined network: are they possible?
Secur. Commun. Networks, 2016

A scalable and automatic mechanism for resource allocation in self-organizing cloud.
Peer-to-Peer Netw. Appl., 2016

Big data for networking [Guest Editorial].
IEEE Netw., 2016

FUIR: Fusing user and item information to deal with data sparsity by using side information in recommendation systems.
J. Netw. Comput. Appl., 2016

Traffic matrix prediction and estimation based on deep learning in large-scale IP backbone networks.
J. Netw. Comput. Appl., 2016

Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review.
IEEE Internet Things J., 2016

Performance Analysis of Software-Defined Network Switch Using M/Geo/1 Model.
IEEE Commun. Lett., 2016

Incentivizing Users of Data Centers Participate in The Demand Response Programs via Time-Varying Monetary Rewards.
CoRR, 2016

Cloud Security.
IEEE Cloud Comput., 2016

Special Issue on Big Data from networking perspective.
Big Data Res., 2016

Interference-Aware Coordinated Power Allocation in Autonomous Wi-Fi Environment.
IEEE Access, 2016

Editorial for IEEE Access Special Section on Theoretical Foundations for Big Data Applications: Challenges and Opportunities.
IEEE Access, 2016

Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data.
IEEE Access, 2016

A General QoS Aware Flow-Balancing and Resource Management Scheme in Distributed Software-Defined Networks.
IEEE Access, 2016

When Will You Have a New Mobile Phone? An Empirical Answer From Big Data.
IEEE Access, 2016

Bike-Sharing System: A Big-Data Perspective.
Proceedings of the Smart Computing and Communication, 2016

An Evolutionary Approach for Short-Term Traffic Flow Forecasting Service in Intelligent Transportation System.
Proceedings of the Smart Computing and Communication, 2016

Complex network theoretical analysis on information dissemination over vehicular networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Information-agnostic coflow scheduling with optimal demotion thresholds.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

SAT-GRD: An ID/Loc split network architecture interconnecting satellite and ground networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Time cumulative complexity modeling and analysis for space-based networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Dynamic Pricing Method for Carpooling Service Based on Coalitional Game Analysis.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

OSaaS: Online Shopping as a Service to Escalate E-Commerce in Developing Countries.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Breaking the Split Incentive Hurdle via Time-Varying Monetary Rewards.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

An Adaptive Cloudlet Placement Method for Mobile Applications over GPS Big Data.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Traffic Matrix Prediction and Estimation Based on Deep Learning for Data Center Networks.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

Achieving Fast and Lightweight SDN Updates with Segment Routing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Analysis of the Spreading Influence Variations for Online Social Users under Attacks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

QoS Correlation-Aware Service Composition for Unified Network-Cloud Service Provisioning.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Efficient and Low-Delay Task Scheduling for Big Data Clusters in a Theoretical Perspective.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Popularity-Based Cache Consistency Mechanism for Information-Centric Networking.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Privacy protection: A community-structured evolutionary game approach.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Trustable service rating in social networks: A peer prediction method.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

A Virtual Machine Scheduling Method for Trade-Offs Between Energy and Performance in Cloud Environment.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

Cost Optimal Resource Provisioning for Live Video Forwarding Across Video Data Centers.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016

Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Delay Tolerant Networks
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-18108-0, 2015

A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization.
IEEE Trans. Parallel Distributed Syst., 2015

Malware Propagation in Large-Scale Networks.
IEEE Trans. Knowl. Data Eng., 2015

K-Center: An Approach on the Multi-Source Identification of Information Diffusion.
IEEE Trans. Inf. Forensics Secur., 2015

Consensus Building in a Local Context for the AHP-GDM With the Individual Numerical Scale and Prioritization Method.
IEEE Trans. Fuzzy Syst., 2015

A Distributed Gateway Selection Algorithm for UAV Networks.
IEEE Trans. Emerg. Top. Comput., 2015

SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors.
IEEE Trans. Comput. Soc. Syst., 2015

An Improved Stochastic Modeling of Opportunistic Routing in Vehicular CPS.
IEEE Trans. Computers, 2015

Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace.
IEEE Trans. Computers, 2015

Special Issue on networking aspects in Big Data.
Int. J. Parallel Emergent Distributed Syst., 2015

Modeling malicious activities in cyber space.
IEEE Netw., 2015

Networking for big data: part 2 [Guest Editorial].
IEEE Netw., 2015

Learning Complementary Saliency Priors for Foreground Object Segmentation in Complex Scenes.
Int. J. Comput. Vis., 2015

Optimal VM placement in data centres with architectural and resource constraints.
Int. J. Auton. Adapt. Commun. Syst., 2015

A profiling based task scheduling approach for multicore network processors.
Concurr. Comput. Pract. Exp., 2015

Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Dynamic access point association using Software Defined Networking.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

Enabling Efficient and Secure Outsourcing of Large Matrix Multiplications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Stability Analysis and Resource Allocation for Space-Based Multi-Access Systems.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

vGraph: Graph Virtualization towards Big Data.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

An Energy-Aware QoS Enhanced Method for Service Computing across Clouds and Data Centers.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

Big Data Sensing and Service: A Tutorial.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015

2014
Distributed Denial of Service Attack and Defense.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-9491-1, 2014

Can We Beat DDoS Attacks in Clouds?
IEEE Trans. Parallel Distributed Syst., 2014

To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing.
IEEE Trans. Parallel Distributed Syst., 2014

On the Multicast Lifetime of WANETs with Multibeam Antennas: Formulation, Algorithms, and Analysis.
IEEE Trans. Computers, 2014

Distributed Denial of Service (DDoS) detection by traffic pattern analysis.
Peer-to-Peer Netw. Appl., 2014

Networking for big data [Guest Editorial].
IEEE Netw., 2014

Are the popular users always important for information dissemination in online social networks?
IEEE Netw., 2014

Guest Editorial.
J. Multim., 2014

Security and Privacy in Online Social Networks: A Survey.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2014

An Effective and Feasible Traceback Scheme in Mobile Internet Environment.
IEEE Commun. Lett., 2014

Smartphone Malware and Its Propagation Modeling: A Survey.
IEEE Commun. Surv. Tutorials, 2014

Propagation model of smartphone worms based on semi-Markov process and social relationship graph.
Comput. Secur., 2014

Containing smartphone worm propagation with an influence maximization algorithm.
Comput. Networks, 2014

Type-aware task placement in geo-distributed data centers with low OPEX using data center resizing.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Network dynamics of mobile social networks.
Proceedings of the IEEE International Conference on Communications, 2014

Detection on application layer DDoS using random walk model.
Proceedings of the IEEE International Conference on Communications, 2014

A clusterized firewall framework for cloud computing.
Proceedings of the IEEE International Conference on Communications, 2014

Byzantine-resilient secure software-defined networks with multiple controllers.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration.
IEEE Trans. Parallel Distributed Syst., 2013

Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks.
IEEE Trans. Mob. Comput., 2013

Secure RFID Tag Ownership Transfer Based on Quadratic Residues.
IEEE Trans. Inf. Forensics Secur., 2013

Linguistic Computational Model Based on 2-Tuples and Intervals.
IEEE Trans. Fuzzy Syst., 2013

A novel model for user clicks identification based on hidden semi-Markov.
J. Netw. Comput. Appl., 2013

A survey and tutorial of wireless relay network protocols based on network coding.
J. Netw. Comput. Appl., 2013

Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones.
J. Comput. Syst. Sci., 2013

Numerical scales generated individually for analytic hierarchy process.
Eur. J. Oper. Res., 2013

DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Modeling Malware Propagation in Smartphone Social Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A hierarchical pea-based anomaly detection model.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

A general cloud firewall framework with dynamic resource allocation.
Proceedings of IEEE International Conference on Communications, 2013

Mining Mechanism of Top-k Influential Nodes Based on Voting Algorithm in Mobile Social Networks.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

A dynamical Deterministic Packet Marking scheme for DDoS traceback.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
On the Stress Function-Based OWA Determination Method With Optimization Criteria.
IEEE Trans. Syst. Man Cybern. Part B, 2012

Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient.
IEEE Trans. Parallel Distributed Syst., 2012

Securing Recommendations in Grouped P2P E-Commerce Trust Model.
IEEE Trans. Netw. Serv. Manag., 2012

Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks.
IEEE Trans. Inf. Forensics Secur., 2012

A Dual-Channel Time-Spread Echo Method for Audio Watermarking.
IEEE Trans. Inf. Forensics Secur., 2012

M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models.
J. Netw. Comput. Appl., 2012

An interior point trust region method for nonnegative matrix factorization.
Neurocomputing, 2012

Least square completion and inconsistency repair methods for additively consistent fuzzy preference relations.
Fuzzy Sets Syst., 2012

Grid transaction management and an efficient development kit.
Comput. Syst. Sci. Eng., 2012

A minimum disclosure approach to authentication and privacy in RFID systems.
Comput. Networks, 2012

An efficient deadlock prevention approach for service oriented transaction processing.
Comput. Math. Appl., 2012

Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics.
Comput. J., 2012

Service-Oriented Wireless Sensor Networks and an Energy-Aware Mesh Routing Algorithm.
Ad Hoc Sens. Wirel. Networks, 2012

AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Can we beat legitimate cyber behavior mimicking attacks from botnets?
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Why it is Hard to Fight against Cyber Criminals?
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

DDoS discrimination by Linear Discriminant Analysis (LDA).
Proceedings of the International Conference on Computing, Networking and Communications, 2012

2011
CM-Based Blind Equalization of Time-Varying SIMO-FIR Channel With Single Pulsation Estimation.
IEEE Trans. Veh. Technol., 2011

Traceback of DDoS Attacks Using Entropy Variations.
IEEE Trans. Parallel Distributed Syst., 2011

Selecting the Individual Numerical Scale and Prioritization Method in the Analytic Hierarchy Process: A 2-Tuple Fuzzy Linguistic Approach.
IEEE Trans. Fuzzy Syst., 2011

Orthogonal feedback scheme for network coding.
J. Netw. Comput. Appl., 2011

Survey of network coding-aware routing protocols in wireless networks.
J. Netw. Comput. Appl., 2011

A Shadow-Like Task Migration Model Based on Context Semantics for Mobile and Pervasive Environments.
Comput. Informatics, 2011

On the maximum throughput of two-hop wireless network coding.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

A Survey on Latest Botnet Attack and Defense.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Utilizing Intelligent Middleware for Reconfiguration of Applications on Android.
Proceedings of the Convergence and Hybrid Information Technology, 2011

Non-monotone averaging aggregation.
Proceedings of the FUZZ-IEEE 2011, 2011

Multicast Lifetime Maximization Using Network Coding in Lossy Wireless Ad Hoc Networks.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

2010
Efficient Web Browsing with Perfect Anonymity Using Page Prefetching.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010

2009
Computing the Numerical Scale of the Linguistic Term Set for the 2-Tuple Fuzzy Linguistic Representation Model.
IEEE Trans. Fuzzy Syst., 2009

Improving the QoS for information discovery in autonomic wireless sensor networks.
Pervasive Mob. Comput., 2009

Effective metric for detecting distributed denial-of-service attacks based on information divergence.
IET Commun., 2009

Linguistic multiperson decision making based on the use of multiple preference relations.
Fuzzy Sets Syst., 2009

Discriminating DDoS Flows from Flash Crowds Using Information Distance.
Proceedings of the Third International Conference on Network and System Security, 2009

Effective DDoS Attacks Detection Using Generalized Entropy Metric.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

2008
Information theory based detection against network behavior mimicking DDoS attacks.
IEEE Commun. Lett., 2008

Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

The Crossroads Approach to Information Discovery in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

A Transformation Model for Heterogeneous Servers.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

2007
An Enhanced Parallel Downloading Algorithm for BT.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007

A Resource-Search and Routing Algorithm within PCDN Autonomy Area.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

Novel Data Management Algorithms in Peer-to-Peer Content Distribution Networks.
Proceedings of the Knowledge Science, 2007

A Parallel Downloading Algorithm for Redundant Networks.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

Massive Data Delivery in Unstructured Peer-to-Peer Networks with Network Coding.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Performance optimization for energy-aware adaptive checkpointing in embedded real-time systems.
Proceedings of the Conference on Design, Automation and Test in Europe, 2006

Online Algorithm for Application Layer Anycast.
Proceedings of the Advances in Intelligent IT, 2006

2005
A Mesh Based Anycast Routing Protocol for Ad Hoc Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

An Efficient Reliable Architecture for Application Layer Anycast Service.
Proceedings of the Distributed and Parallel Computing, 2005

2004
A Novel Middleware Based Web Database Model.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004

Minicast: A Multicast-Anycast Protocol for Message Delivery.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

Load Balance Algorithms for Anycast.
Proceedings of the iiWAS'2004, 2004

2003
Self-Adaptive Clock Synchronization for Computational Grid.
J. Comput. Sci. Technol., 2003

Fault-Tolerant Servers for Anycast Communication.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

A Load Balancing Algorithm for Web Based Server Grids.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Self-Adaptive Clock Synchronization Based on Clock Precision Difference.
Proceedings of the Computer Science 2003, 2003

2002
An Efficient Algorithm for Application-Layer Anycasting.
Proceedings of the Distributed Communities on the Web, 4th International Workshop, 2002


  Loading...