Shui Yu
#158,759
Most Influential Person Now
Shui Yu's AcademicInfluence.com Rankings
Shui Yucomputer-science Degrees
Computer Science
#8947
World Rank
#9403
Historical Rank
Cloud Computing
#39
World Rank
#40
Historical Rank
Database
#5942
World Rank
#6161
Historical Rank

Download Badge
Computer Science
Shui Yu's Degrees
- PhD Computer Science University of Technology Sydney
- Bachelors Computer Science University of Technology Sydney
Similar Degrees You Can Earn
Why Is Shui Yu Influential?
(Suggest an Edit or Addition)Shui Yu's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Joint Optimization of Task Scheduling and Image Placement in Fog Computing Supported Software-Defined Embedded System (2016) (336)
- A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment (2017) (304)
- Computing the Numerical Scale of the Linguistic Term Set for the 2-Tuple Fuzzy Linguistic Representation Model (2009) (292)
- CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding (2012) (276)
- A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View (2018) (274)
- Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient (2012) (264)
- Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data (2016) (252)
- Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing (2014) (247)
- Can We Beat DDoS Attacks in Clouds? (2014) (239)
- Traceback of DDoS Attacks Using Entropy Variations (2011) (221)
- Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review (2016) (180)
- Networking for Big Data: A Survey (2017) (170)
- Influence analysis in social networks: A survey (2018) (169)
- Linguistic Computational Model Based on 2-Tuples and Intervals (2013) (169)
- Smartphone Malware and Its Propagation Modeling: A Survey (2014) (165)
- Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies (2017) (154)
- Social influence modeling using information theory in mobile social networks (2017) (153)
- Linguistic multiperson decision making based on the use of multiple preference relations (2009) (140)
- Blockchain Meets Cloud Computing: A Survey (2020) (125)
- Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data (2020) (124)
- Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds (2018) (123)
- Least square completion and inconsistency repair methods for additively consistent fuzzy preference relations (2012) (109)
- Malware Propagation in Large-Scale Networks (2015) (106)
- Selecting the Individual Numerical Scale and Prioritization Method in the Analytic Hierarchy Process: A 2-Tuple Fuzzy Linguistic Approach (2011) (104)
- SERvICE: A Software Defined Framework for Integrated Space-Terrestrial Satellite Communication (2018) (104)
- A Dual-Channel Time-Spread Echo Method for Audio Watermarking (2012) (102)
- EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid (2019) (101)
- Discriminating DDoS attack traffic from flash crowd through packet arrival patterns (2011) (97)
- SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors (2015) (93)
- Information theory based detection against network behavior mimicking DDoS attacks (2008) (91)
- To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks (2014) (88)
- CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment (2011) (85)
- Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace (2015) (84)
- Discriminating DDoS Flows from Flash Crowds Using Information Distance (2009) (84)
- Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks (2018) (83)
- DDSE: A novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks (2018) (81)
- A Survey on Latest Botnet Attack and Defense (2011) (81)
- A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems (2017) (80)
- NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users (2017) (80)
- Network Traffic Prediction Based on Deep Belief Network in Wireless Mesh Backbone Networks (2017) (77)
- Cyber security framework for Internet of Things-based Energy Internet (2018) (69)
- Rumor Source Identification in Social Networks with Time-Varying Topology (2018) (67)
- Consensus Building in a Local Context for the AHP-GDM With the Individual Numerical Scale and Prioritization Method (2015) (66)
- Survey of network coding-aware routing protocols in wireless networks (2011) (65)
- Resource Allocation in Space Multiaccess Systems (2017) (65)
- FogRoute: DTN-Based Data Dissemination Model in Fog Computing (2017) (62)
- Defending Against Flow Table Overloading Attack in Software-Defined Networks (2019) (62)
- Scoring Users’ Privacy Disclosure Across Multiple Online Social Networks (2017) (60)
- Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks (2008) (59)
- Locator/Identifier Split Networking: A Promising Future Internet Architecture (2017) (59)
- Data integrity verification of the outsourced big data in the cloud environment: A survey (2018) (57)
- Towards Practical and Near-Optimal Coflow Scheduling for Data Center Networks (2016) (55)
- A Game-Theoretic Resource Allocation Approach for Intercell Device-to-Device Communications in Cellular Networks (2016) (53)
- A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking (2016) (53)
- Numerical scales generated individually for analytic hierarchy process (2013) (51)
- Distributed Denial of Service Attack and Defense (2013) (50)
- Energy-Latency Tradeoff for Dynamic Computation Offloading in Vehicular Fog Computing (2020) (50)
- DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics (2013) (49)
- Performance Analysis of Software-Defined Network Switch Using $M/Geo/1$ Model (2016) (47)
- Modeling malicious activities in cyber space (2015) (47)
- Distributed Denial of Service (DDoS) detection by traffic pattern analysis (2014) (44)
- K-Center: An Approach on the Multi-Source Identification of Information Diffusion (2015) (44)
- Secure RFID Tag Ownership Transfer Based on Quadratic Residues (2013) (43)
- Learning Complementary Saliency Priors for Foreground Object Segmentation in Complex Scenes (2014) (43)
- Can we beat legitimate cyber behavior mimicking attacks from botnets? (2012) (43)
- A Distributed Gateway Selection Algorithm for UAV Networks (2015) (42)
- An Immunization Framework for Social Networks Through Big Data Based Influence Modeling (2019) (42)
- A survey and tutorial of wireless relay network protocols based on network coding (2013) (41)
- Cloud Security (2016) (40)
- Impairment- and Splitting-Aware Cloud-Ready Multicast Provisioning in Elastic Optical Networks (2017) (40)
- Traffic matrix prediction and estimation based on deep learning in large-scale IP backbone networks (2016) (39)
- Delay Tolerant Networks (2015) (39)
- Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones (2013) (38)
- Managing consensus and self-confidence in multiplicative preference relations in group decision making (2018) (38)
- Compatibility-Aware Web API Recommendation for Mashup Creation via Textual Description Mining (2021) (38)
- Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks (2013) (37)
- Network Traffic Prediction Based on Deep Belief Network and Spatiotemporal Compressive Sensing in Wireless Mesh Backbone Networks (2018) (37)
- A scalable and automatic mechanism for resource allocation in self-organizing cloud (2016) (36)
- A minimum disclosure approach to authentication and privacy in RFID systems (2012) (36)
- Big Data Concepts, Theories, and Applications (2016) (36)
- Congestion-aware local reroute for fast failure recovery in software-defined networks (2017) (36)
- Byzantine-resilient secure software-defined networks with multiple controllers (2014) (35)
- Traffic Matrix Prediction and Estimation Based on Deep Learning for Data Center Networks (2016) (35)
- Propagation model of smartphone worms based on semi-Markov process and social relationship graph (2014) (35)
- FUIR: Fusing user and item information to deal with data sparsity by using side information in recommendation systems (2016) (34)
- An Adaptive Cloudlet Placement Method for Mobile Applications over GPS Big Data (2016) (34)
- Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration (2013) (34)
- DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems (2018) (33)
- Improving SDN Scalability With Protocol-Oblivious Source Routing: A System-Level Study (2018) (33)
- Source-based filtering scheme against DDOS attacks (2008) (31)
- A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion (2017) (31)
- A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization (2015) (31)
- GAN-Driven Personalized Spatial-Temporal Private Data Sharing in Cyber-Physical Social Systems (2020) (30)
- A general cloud firewall framework with dynamic resource allocation (2013) (30)
- Stability of Cloud-Based UAV Systems Supporting Big Data Acquisition and Processing (2019) (30)
- Reliability Evaluation for Clustered WSNs under Malware Propagation (2016) (29)
- Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks (2012) (28)
- Converged Network-Cloud Service Composition with End-to-End Performance Guarantee (2018) (27)
- Local Fast Reroute With Flow Aggregation in Software Defined Networks (2017) (27)
- Detection on application layer DDoS using random walk model (2014) (27)
- SeShare: Secure cloud data sharing based on blockchain and public auditing (2019) (27)
- An energy‐aware virtual machine scheduling method for service QoS enhancement in clouds over big data (2017) (26)
- Fog Computing and Its Applications in 5G (2017) (26)
- Privacy issues in social networks and analysis: a comprehensive survey (2017) (26)
- Privacy on the Edge: Customizable Privacy-Preserving Context Sharing in Hierarchical Edge Computing (2020) (26)
- A Novel Multipath-Transmission Supported Software Defined Wireless Network Architecture (2017) (25)
- Blockchain for secure location verification (2020) (24)
- Effective DDoS Attacks Detection Using Generalized Entropy Metric (2009) (24)
- Dynamic access point association using Software Defined Networking (2015) (23)
- DDoS discrimination by Linear Discriminant Analysis (LDA) (2012) (22)
- A Weighted Threshold Secret Sharing Scheme for Remote Sensing Images Based on Chinese Remainder Theorem (2019) (22)
- An Improved Stochastic Modeling of Opportunistic Routing in Vehicular CPS (2015) (22)
- Improving Data Utility Through Game Theory in Personalized Differential Privacy (2019) (21)
- Enabling Efficient and Secure Outsourcing of Large Matrix Multiplications (2014) (21)
- Containing smartphone worm propagation with an influence maximization algorithm (2014) (21)
- Complex network theoretical analysis on information dissemination over vehicular networks (2016) (21)
- Privacy Preservation in Smart Cities (2019) (20)
- Link State Prediction-Based Reliable Transmission for High-Speed Railway Networks (2016) (20)
- CM-Based Blind Equalization of Time-Varying SIMO-FIR Channel With Single Pulsation Estimation (2011) (19)
- An Effective and Feasible Traceback Scheme in Mobile Internet Environment (2014) (19)
- Browsing behavior mimicking attacks on popular web sites for large botnets (2011) (19)
- Big data set privacy preserving through sensitive attribute-based grouping (2017) (19)
- A dynamical Deterministic Packet Marking scheme for DDoS traceback (2013) (18)
- Energy-Efficient Virtual Network Function Placement in Telecom Networks (2018) (18)
- A Dynamic Pricing Method for Carpooling Service Based on Coalitional Game Analysis (2016) (18)
- Control layer resource management in SDN-IoT networks using multi-objective constraint (2016) (18)
- A General QoS Aware Flow-Balancing and Resource Management Scheme in Distributed Software-Defined Networks (2016) (17)
- Social networking big data: Opportunities, solutions, and challenges (2018) (17)
- Graph Theory-Based QoE-Driven Cooperation Stimulation for Content Dissemination in Device-to-Device Communication (2016) (16)
- Are the popular users always important for information dissemination in online social networks? (2014) (16)
- Achieving Fast and Lightweight SDN Updates with Segment Routing (2016) (16)
- On the Stress Function-Based OWA Determination Method With Optimization Criteria (2012) (16)
- Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system (2021) (16)
- Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud (2017) (16)
- Big Data Sensing and Service: A Tutorial (2015) (16)
- Efficient Data Placement and Replication for QoS-Aware Approximate Query Evaluation of Big Data Analytics (2019) (15)
- Resource-Efficient Virtual Network Function Placement in Operator Networks (2017) (15)
- DDoS Attack Detection (2014) (15)
- Efficient Web Browsing with Perfect Anonymity Using Page Prefetching (2010) (15)
- Modeling and performance analysis for multimedia data flows scheduling in software defined networks (2017) (15)
- A Scalable and Smart Hierarchical Wireless Communication Architecture Based on Network/User Separation (2017) (15)
- Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics (2012) (14)
- SAT-GRD: An ID/Loc split network architecture interconnecting satellite and ground networks (2016) (14)
- M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models (2012) (13)
- OSaaS: Online Shopping as a Service to Escalate E-Commerce in Developing Countries (2016) (13)
- Modeling Malware Propagation in Smartphone Social Networks (2013) (13)
- Networking for Big Data (2015) (13)
- An Efficient Algorithm for Application-Layer Anycasting (2002) (12)
- The structure of communities in scale‐free networks (2017) (12)
- Research on the Security of Blockchain Data: A Survey (2018) (12)
- Optimal VM placement in data centres with architectural and resource constraints (2015) (12)
- On the maximum throughput of two-hop wireless network coding (2011) (12)
- Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks (2019) (12)
- A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks (2018) (12)
- A clusterized firewall framework for cloud computing (2014) (11)
- A Hybrid Location Privacy Protection Scheme in Big Data Environment (2017) (11)
- Cross-Cloud MapReduce for Big Data (2020) (11)
- A Popularity-Based Cache Consistency Mechanism for Information-Centric Networking (2016) (11)
- Toward efficient parallel routing optimization for large-scale SDN networks using GPGPU (2018) (10)
- Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server (2018) (10)
- Information-agnostic coflow scheduling with optimal demotion thresholds (2016) (10)
- Parallel and Progressive Approaches for Skyline Query Over Probabilistic Incomplete Database (2018) (10)
- Mobile Live Video Streaming Optimization via Crowdsourcing Brokerage (2017) (9)
- Securing Recommendations in Grouped P2P E-Commerce Trust Model (2012) (9)
- A Virtual Machine Scheduling Method for Trade-Offs Between Energy and Performance in Cloud Environment (2016) (9)
- Secure search for encrypted personal health records from big data NoSQL databases in cloud (2019) (9)
- When Will You Have a New Mobile Phone? An Empirical Answer From Big Data (2016) (9)
- Privacy preserving in big data sets through multiple shuffle (2017) (9)
- Mining Mechanism of Top-k Influential Nodes Based on Voting Algorithm in Mobile Social Networks (2013) (9)
- Improving the QoS for information discovery in autonomic wireless sensor networks (2009) (9)
- On the Multicast Lifetime of WANETs with Multibeam Antennas: Formulation, Algorithms, and Analysis (2014) (9)
- Quality-of-sensing aware budget constrained contaminant detection sensor deployment in water distribution system (2018) (9)
- Profit-Aware Distributed Online Scheduling for Data-Oriented Tasks in Cloud Datacenters (2018) (9)
- Joint Virtual Network Function Selection and Traffic Steering in Telecom Networks (2017) (9)
- Interference-Aware Coordinated Power Allocation in Autonomous Wi-Fi Environment (2016) (9)
- A Sleeping and Offloading Optimization Scheme for Energy-Efficient WLANs (2017) (8)
- Non-monotone averaging aggregation (2011) (8)
- Fast Containment of Infectious Diseases With E-Healthcare Mobile Social Internet of Things (2021) (8)
- Reliability of Cloud Controlled Multi-UAV Systems for On-Demand Services (2017) (8)
- Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper) (2017) (8)
- A survey on big data stream processing in SDN supported cloud environment (2018) (8)
- IPANM: Incentive Public Auditing Scheme for Non-Manager Groups in Clouds (2022) (8)
- Green Social CPS Based E-Healthcare Systems to Control the Spread of Infectious Diseases (2018) (7)
- HostWatcher: Protecting hosts in cloud data centers through software-defined networking (2017) (7)
- New Algorithm for Secure Outsourcing of Modular Exponentiation with Optimal Checkability Based on Single Untrusted Server (2018) (7)
- A Transformation Model for Heterogeneous Servers (2008) (7)
- QoS Correlation-Aware Service Composition for Unified Network-Cloud Service Provisioning (2016) (7)
- Full Cycle Campus Life of College Students: A Big Data Case in China (2018) (7)
- Modeling software defined satellite networks using queueing theory (2017) (7)
- Data Science and Artificial Intelligence for Communications (2019) (7)
- Tuna: An Efficient and Practical Scheme for Wireless Access Point in 5G Networks Virtualization (2018) (7)
- Inference Attack in Android Activity based on Program Fingerprint (2018) (7)
- Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server (2018) (7)
- An Overview of DDoS Attacks (2014) (7)
- Editorial for IEEE Access Special Section on Theoretical Foundations for Big Data Applications: Challenges and Opportunities (2016) (6)
- DDoS attacks on data plane of software-defined network: are they possible? (2016) (6)
- Online multi-objective optimization for live video forwarding across video data centers (2017) (6)
- Performance optimization for energy-aware adaptive checkpointing in embedded real-time systems (2006) (6)
- Networking for big data [Guest Editorial] (2014) (6)
- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology (2013) (6)
- T-trail: link failure monitoring in software-defined optical networks (2018) (6)
- Temporal-Sparsity Aware Service Recommendation Method via Hybrid Collaborative Filtering Techniques (2018) (6)
- Shui Yu Distributed Denial of Service Attack and Defence (2013) (6)
- Stochastic modeling and analysis of opportunistic computing in intermittent mobile cloud (2013) (6)
- Attack Source Traceback (2014) (6)
- Network dynamics of mobile social networks (2014) (6)
- Securing Cloud Data Using a Pirate Scheme (2017) (5)
- Amplified Locality-Sensitive Hashing for Privacy-Preserving Distributed Service Recommendation (2017) (5)
- Analyzing and Modelling the Interference Impact on Energy Efficiency of WLANs (2018) (5)
- Are current resources in SDN allocated to maximum performance and minimize costs and maintaining QoS problems? (2017) (5)
- Loss-aware adaptive scalable transmission in wireless high-speed railway networks (2017) (5)
- Privacy protection: A community-structured evolutionary game approach (2016) (5)
- Why it is Hard to Fight against Cyber Criminals? (2012) (5)
- DDoS Attack and Defence in Cloud (2014) (5)
- Security and Privacy in Online Social Networks: A Survey (2014) (5)
- Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management (2020) (4)
- An efficient deadlock prevention approach for service oriented transaction processing (2012) (4)
- Self-adaptive clock synchronization for computational grid (2003) (4)
- Empirical study on taxi's mobility nature in dense urban area (2018) (4)
- A Cross-Authentication Model for Heterogeneous Domains in Active Networks (2007) (4)
- Bike-Sharing System: A Big-Data Perspective (2016) (4)
- Flow Entry Sharing in Protection Design for Software Defined Networks (2017) (4)
- Massive Data Delivery in Unstructured Peer-to-Peer Networks with Network Coding (2007) (4)
- Anonymous web browsing through predicted pages (2010) (4)
- HCaching: High-Speed Caching for Information-Centric Networking (2017) (4)
- Time cumulative complexity modeling and analysis for space-based networks (2016) (4)
- Efficient solution to the millionaires' problem based on asymmetric commutative encryption scheme (2019) (4)
- A Data Storage and Sharing Scheme for Cyber-Physical-Social Systems (2020) (4)
- Incentivizing Users of Data Centers Participate in The Demand Response Programs via Time-Varying Monetary Rewards (2016) (4)
- A hierarchical pea-based anomaly detection model (2013) (3)
- An Energy-Aware QoS Enhanced Method for Service Computing across Clouds and Data Centers (2015) (3)
- Special Issue on Big Data from networking perspective (2016) (3)
- Modelling the impact of interference on the energy efficiency of WLANs (2019) (3)
- IEEE Access Special Section Editorial: Green Cloud and Fog Computing: Energy Efficiency and Sustainability Aware Infrastructures, Protocols, and Applications (2018) (3)
- Guest Editorial: Security Architecture and Technologies for 5G (2018) (3)
- Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem (2018) (3)
- Introduction to the Special Section on Network Science for Internet of Things (IoT) (2020) (3)
- Fuzzy Multi-Attribute Utility Based Network Selection Approach for High-Speed Railway Scenario (2017) (3)
- Game Theory for Mobile Location Privacy (2020) (3)
- An Open Identity Authentication Scheme Based on Blockchain (2019) (3)
- FDFA: A fog computing assisted distributed analytics and detecting system for family activities (2019) (3)
- Self-Adaptive Clock Synchronization Based on Clock Precision Difference (2003) (3)
- Trustable service rating in social networks: A peer prediction method (2016) (3)
- An architecture of Internet based data processing based on multicast and anycast protocols (2003) (3)
- HSDC–Net: Secure Anonymous Messaging in Online Social Networks (2019) (3)
- Stability Analysis and Resource Allocation for Space-Based Multi-Access Systems (2014) (3)
- A reliable reputation computation framework for online items in E-commerce (2019) (3)
- Delay Tolerant Networks Based Applications (2015) (3)
- An interior point trust region method for nonnegative matrix factorization (2012) (3)
- Big Data Storage Security (2016) (3)
- High Energy Efficiency Transmission in MIMO Satellite Communications (2018) (2)
- On the two time scale characteristics of wireless high speed railway networks (2017) (2)
- FuzzyDP: Fuzzy-based big data publishing against inquiry attacks (2017) (2)
- An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks (2017) (2)
- Analysis of the Spreading Influence Variations for Online Social Users under Attacks (2016) (2)
- A Parallel Downloading Algorithm for Redundant Networks (2007) (2)
- Efficient Performance Monitoring for Ubiquitous Virtual Networks Based on Matrix Completion (2018) (2)
- Editorial of cross-layer design issues, challenges and opportunities for future intelligent heterogeneous networks (2018) (2)
- Routing Protocols in Delay Tolerant Networks (2015) (2)
- An Evolutionary Approach for Short-Term Traffic Flow Forecasting Service in Intelligent Transportation System (2016) (2)
- Orthogonal feedback scheme for network coding (2011) (2)
- Distance-based location privacy protection in social networks (2017) (2)
- SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System (2015) (2)
- Can We Beat DDoS Attacks in Clouds ? ( Supplementary Material ) (2013) (2)
- A Load Balancing Algorithm for Web Based Server Grids (2003) (2)
- Editorial: special issue on "big data security and privacy" (2017) (2)
- A Novel Middleware Based Web Database Model (2004) (2)
- Utilizing Intelligent Middleware for Reconfiguration of Applications on Android (2011) (2)
- Type-aware task placement in geo-distributed data centers with low OPEX using data center resizing (2014) (2)
- Malicious Networks for DDoS Attacks (2014) (2)
- A Trust-Grained Personalized Privacy-Preserving Scheme for Big Social Data (2018) (2)
- An Online Pricing Strategy of EV Charging and Data Caching in Highway Service Stations (2020) (2)
- Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach (2015) (2)
- Privacy Protected Routing in Delay Tolerant Networks (2015) (1)
- The Crossroads Approach to Information Discovery in Wireless Sensor Networks (2008) (1)
- A Novel Monotonic Fixed-Point Algorithm for l1-Regularized Least Square Vector and Matrix Problem (2011) (1)
- AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs (2012) (1)
- Service-Oriented Wireless Sensor Networks and an Energy-Aware Mesh Routing Algorithm (2012) (1)
- Networking for big data: part 2 [Guest Editorial] (2015) (1)
- Preferential attachment and the spreading influence of users in online social networks (2017) (1)
- Tiger Tally: Cross-Domain Scheme for Different Authentication Mechanism (2019) (1)
- A Deadline-Aware Coflow Scheduling Approach for Big Data Applications (2018) (1)
- Big data for networking [Guest Editorial] (2016) (1)
- Traceback of DDoS Attacks Using (2011) (1)
- A Cloud Service Enhanced Method Supporting Context-Aware Applications (2017) (1)
- How to shutdown a cloud: a DDoS attack in a private infrastructure-as-a-service cloud (2017) (1)
- Smart Water Flosser: A Novel Smart Oral Cleaner with IMU Sensor (2018) (1)
- An Efficient Reliable Architecture for Application Layer Anycast Service (2005) (1)
- IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems (2022) (1)
- Policy-based Bigdata Security and QoS Framework for SDN/IoT: An Analytic Approach (2019) (1)
- Too Expensive to Attack: A Joint Defense Framework to Mitigate Distributed Attacks for the Internet of Things Grid (2021) (1)
- HRCal: An effective calibration system for heart rate detection during exercising (2019) (1)
- A Mesh Based Anycast Routing Protocol for Ad Hoc Networks (2005) (1)
- vGraph: Graph Virtualization towards Big Data (2015) (1)
- A profiling based task scheduling approach for multicore network processors (2015) (1)
- Efficient and Low-Delay Task Scheduling for Big Data Clusters in a Theoretical Perspective (2016) (1)
- Towards QoS and Security in Software-Driven Heterogeneous Autonomous Networks (2018) (1)
- Message from the program chairs of BigDataSecurity 2015 (2015) (0)
- Special Issue on networking aspects in Big Data (2015) (0)
- Reliable Aggregation on Network Traffic for Web Based Knowledge Discovery (2012) (0)
- Minicast: A Multicast-Anycast Protocol for Message Delivery (2004) (0)
- Data Dissemination in Delay Tolerant Networks with Geographic Information (2020) (0)
- On the Multicast Lifetime of WANETs with Directional Multibeam Antennas (2011) (0)
- Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks (2016) (0)
- Online Algorithm for Application Layer Anycast (2006) (0)
- Modeling and tracing events in RFID-enabled supply chains (2016) (0)
- ◾ A User Data Profile-Aware Policy-Based Network Management Framework in the Era of Big Data (2015) (0)
- Social Characteristics Based Multiple Dimensional Routing Protocol in Human Associated Delay Tolerant Networks (2015) (0)
- Optimistic Algorithmic Approaches for Traffic Engineering Policies of Congestion and Traffic Distribution in the Networks (2018) (0)
- Message from ICESS2013 Chairs (2013) (0)
- Message from the Program Chairs of CSCloud 2016 (2016) (0)
- Cost Optimal Resource Provisioning for Live Video Forwarding Across Video Data Centers (2016) (0)
- Multicast Lifetime Maximization Using Network Coding in Lossy Wireless Ad Hoc Networks (2011) (0)
- Best Readings in Communications and Information Systems Security (2013) (0)
- NFSP 2013: message from the chairs (2013) (0)
- Message from the GreenCom2015 Chairs (2016) (0)
- Breaking the Split Incentive Hurdle via Time-Varying Monetary Rewards (2016) (0)
- Message from TrustCom Workshop/Symposium Chairs (2012) (0)
- Establishing secure and efficient encrypted connectivity for random cloud tenants (2017) (0)
- A Shadow-Like Task Migration Model Based on Context Semantics for Mobile and Pervasive Environments (2011) (0)
- Solving Selfish Routing in Route-by-Name Information-Centric Network Architectures (2018) (0)
- Network Configuration and Flow Scheduling for Big Data Applications (2015) (0)
This paper list is powered by the following services: