Dr Shui Yu

STAFF PROFILE

Contact

Publications

Filter by

2018

SERvICE: a software defined framework for integrated space-terrestrial satellite communication

T Li, H Zhou, H Luo, S Yu

(2018), Vol. 17, pp. 703-716, IEEE transactions on mobile computing, Piscataway, N.J., C1

journal

Improving SDN scalability with protocol-oblivious source routing: a system-level study

S Li, K Han, N Ansari, Q Bao, D Hu, J Liu, S Yu, Z Zhu

(2018), Vol. 15, pp. 275-288, IEEE transactions on network and service management, Piscataway, N.J., C1

journal

Tuna: an efficient and practical scheme for wireless access point in 5G networks virtualization

X Wang, C Xu, G Zhao, S Yu

(2018), Vol. 22, pp. 748-751, IEEE communications letters, Piscataway, N.J., C1

journal

Quality-of-sensing aware budget constrained contaminant detection sensor deployment in water distribution system

D Zeng, S Zhang, L Gu, S Yu, Z Fu

(2018), Vol. 103, pp. 274-279, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

DDSE: a novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks

L Cui, H Hu, S Yu, Q Yan, Z Ming, Z Wen, N Lu

(2018), Vol. 103, pp. 119-130, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

DIPOR: an IDA-based dynamic proof of retrievability scheme for cloud storage systems

A Fu, Y Li, S Yu, Y Yu, G Zhang

(2018), Vol. 104, pp. 97-106, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Rumor source identification in social networks with time-varying topology

J Jiang, S Wen, S Yu, Y Xiang, W Zhou

(2018), Vol. 15, pp. 166-179, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal

Network traffic prediction based on deep belief network and spatiotemporal compressive sensing in wireless mesh backbone networks

L Nie, X Wang, L Wan, S Yu, H Song, D Jiang

(2018), Vol. 2018, pp. 1-10, Wireless communications and mobile computing, Cairo, Egypt, C1

journal

Multistage signaling game-based optimal detection strategies for suppressing malware diffusion in fog-cloud-based IoT networks

S Shen, L Huang, H Zhou, S Yu, E Fan, Q Cao

(2018), Vol. 5, pp. 1043-1054, IEEE Internet of things journal, Piscataway, N.J., C1

journal

Cyber security framework for Internet of Things-based Energy Internet

A Sani, D Yuan, J Jin, L Gao, S Yu, Z Dong

(2018), Future Generation Computer Systems, Amsterdam, The Netherlands, C1

journal

Parallel and progressive approaches for skyline query over probabilistic incomplete database

Y Zeng, K Li, S Yu, Y Zhou, K Li

(2018), Vol. 6, pp. 13289-13301, IEEE access, Piscataway, N.J., C1

journal

Profit-aware distributed online scheduling for data-oriented tasks in cloud datacenters

W Lu, P Lu, Q Sun, S Yu, Z Zhu

(2018), Vol. 6, pp. 15629-15642, IEEE Access, Piscataway, N.J., C1

journal

A survey on security threats and defensive techniques of machine learning: a data driven view

Q Liu, P Li, W Zhao, W Cai, S Yu, V Leung

(2018), Vol. 6, pp. 12103-12117, IEEE access, Piscataway, N.J., C1

journal

Influence analysis in social networks: a survey

S Peng, Y Zhou, L Cao, S Yu, J Niu, W Jia

(2018), Vol. 106, pp. 17-32, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Collaborative ensemble learning under differential privacy

T Xiang, Y Li, X Li, S Zhong, S Yu

(2018), Vol. 16, pp. 73-87, Web intelligence, Amsterdam, Netherlands, C1

journal

Privacy issues in social networks and analysis: a comprehensive survey

V Pham, S Yu, K Sood, L Cui

(2018), Vol. 7, pp. 74-84, IET networks, Piscataway, N.J., C1

journal

Efficient performance monitoring for ubiquitous virtual networks based on matrix completion

X Wang, C Xu, G Zhao, K Xie, S Yu

(2018), Vol. 6, pp. 14524-14536, IEEE access, Piscataway, N.J., C1

journal

Toward efficient parallel routing optimization for large-scale SDN networks using GPGPU

X Wang, Q Zhang, J Ren, S Xu, S Wang, S Yu

(2018), Vol. 113, pp. 1-13, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

A hybrid location privacy protection scheme in big data environment

M Nosouhi, V Pham, S Yu, Y Xiang, M Warren

(2018), pp. 1-6, GLOBECOM 2017 : Global hub: connecting east and west : Proceedings of the 2017 IEEE Global Communications Conference, Singapore, E1

conference

T-trail: link failure monitoring in software-defined optical networks

Z Cheng, X Zhang, S Shen, S Yu, J Ren, R Lin

(2018), Vol. 10, pp. 344-352, Journal of optical communications and networking, Washington, D.C., C1

journal

Reliability of cloud controlled multi-UAV systems for on-demand services

J Wang, C Jiang, Z Ni, S Guan, S Yu, Y Ren

(2018), pp. 1-6, GLOBECOM 2017 : Proceedings of the 2017 IEEE Global Communications Conference, Singapore, E1

conference

Resource-efficient virtual network function placement in operator networks

X Song, X Zhang, S Yu, S Jiao, Z Xu

(2018), pp. 1-7, GLOBECOM 2017 : Proceedings of the 2017 IEEE Global Communications Conference, Singapore, E1

conference

HCaching: high-speed caching for information-centric networking

H Li, H Zhou, W Quan, B Feng, H Zhang, S Yu

(2018), pp. 1-6, GLOBECOM 2017 : Proceedings of the 2017 IEEE Global Communications Conference, Singapore, E1

conference

Flow entry sharing in protection design for software defined networks

X Zhang, S Yu, Z Xu, Y Li, Z Cheng, W Zhou

(2018), pp. 1-7, GLOBECOM 2017 : Global hub: connecting east and west : Proceedings of the 2017 IEEE Global Communications Conference, Singapore, E1

conference

Fuzzy multi-attribute utility based network selection approach for high-speed railway scenario

X Yan, P Dong, T Zheng, H Zhang, S Yu

(2018), pp. 1-6, GLOBECOM 2017 : Proceedings of the 2017 IEEE Global Communications Conference, Singapore, E1

conference

Joint Virtual Network Function Selection and Traffic Steering in Telecom Networks

S Jiao, X Zhang, S Yu, X Song, Z Xu

(2018), Vol. 2018-January, pp. 1-7, 2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings, E1

conference

A practical byzantine-based approach for faulty switch tolerance in software-defined networks

B Yuan, H Jin, D Zou, L Yang, S Yu

(2018), Vol. 15, pp. 825-839, IEEE Transactions on Network and Service Management, Piscataway, N.J., C1

journal

Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server

A Fu, S Li, S Yu, Y Zhang, Y Sun

(2018), Vol. 118, pp. 102-112, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server

A Fu, Y Zhu, G Yang, S Yu, Y Yu

(2018), Vol. 21, pp. 1933-1947, Cluster computing, New York, N.Y., C1

journal

A hybrid privacy protection scheme in cyber-physical social networks

Y Qu, S Yu, L Gao, W Zhou, S Peng

(2018), Vol. 5, pp. 773-784, IEEE Transactions on Computational Social Systems, Piscataway, N.J., C1

journal

A novel trust evaluation mechanism for collaborative filtering recommender systems

Y Xiao, Q Pei, X Liu, S Yu

(2018), pp. 1-15, IEEE access, Piscataway, N.J., C1

journal
2017

An energy-aware virtual machine scheduling method for service QoS enhancement in clouds over big data

W Dou, X Xu, S Meng, X Zhang, C Hu, S Yu, J Yang

(2017), Vol. 29, pp. 1-20, Concurrency and computation: practice and experience, Chichester, Eng., C1

journal

A parallel random forest algorithm for big data in a spark cloud computing environment

J Chen, K Li, Z Tang, K Bilal, S Yu, C Weng, K Li

(2017), Vol. 28, pp. 919-933, IEEE transactions on parallel and distributed systems, Piscataway, NJ, C1

journal

The structure of communities in scale-free networks

J Jiang, S Wen, S Yu, Y Xiang, W Zhou, H Hassan

(2017), Vol. 29, pp. 1-16, Concurrency and computation: practice and experience, Chichester, Eng., C1

journal

Social influence modeling using information theory in mobile social networks

S Peng, A Yang, L Cao, S Yu, D Xie

(2017), Vol. 379, pp. 146-159, Information sciences, Amsterdam, The Netherlands, C1

journal

Identifying propagation sources in networks: state-of-the-art and comparative studies

J Jiang, S Wen, S Yu, Y Xiang, W Zhou

(2017), Vol. 19, pp. 465-481, IEEE communications surveys & tutorials, Piscataway, N.J., C1

journal

An evolutionary approach for short-term traffic flow forecasting service in intelligent transportation system

F Fei, S Li, W Dou, S Yu

(2017), Vol. 10135, pp. 477-486, SmartCom 2016 : Proceedings of the 1st International Conference on Smart Computing and Communication, Shenzhen, China, E1

conference

Online multi-objective optimization for live video forwarding across video data centers

W Liu, Y Gao, H Ma, S Yu, J Nie

(2017), Vol. 48, pp. 502-513, Journal of visual communication and image representation, Maryland Heights, Mo., C1

journal

Bike-sharing system: a big-data perspective

Z Jia, G Xie, J Gao, S Yu

(2017), Vol. 10135, pp. 548-557, SmartCom 2016 : Proceedings of the 1st International Conference on Smart Computing and Communication 2016, Shenzhen, China, E1

conference

Modeling and performance analysis for multimedia data flows scheduling in software defined networks

J Huang, L Xu, Q Duan, C Xing, J Luo, S Yu

(2017), Vol. 83, pp. 89-100, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

A dynamic pricing method for carpooling service based on coalitional game analysis

S Li, F Fei, D Ruihan, S Yu, W Dou

(2017), pp. 78-85, HPCC/SmartCity/DSS 2016 : Proceedings of the joint 18th IEEE International Conference on High Performance Computing and Communications, 14th IEEE International Conference on Smart City and 2nd IEEE International Conference on Data Science and Systems, Sydney, New South Wales, E1

conference

Networking for big data: a survey

S Yu, M Liu, W Dou, X Liu, S Zhou

(2017), Vol. 19, pp. 531-549, IEEE communications surveys and tutorials, Piscataway, N.J., C1

journal

Privacy preserving in big data sets through multiple shuffle

Y Qu, J Xu, S Yu

(2017), ACSW17 : Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Victoria, E1

conference

Fog computing and its applications in 5G

L Gao, T Luan, B Liu, W Zhou, S Yu

(2017), pp. 571-593, 5G mobile communications, [Cham], Switzerland, B1

chapter

FogRoute: DTN-based data dissemination model in fog computing

L Gao, T Luan, S Yu, W Zhou, B Liu

(2017), Vol. 4, pp. 225-235, IEEE internet of things journal, Piscataway, N.J., C1

journal

Are current resources in SDN allocated to maximum performance and minimize costs and maintaining QoS problems?

K Sood, S Yu, Y Xiang

(2017), pp. 1-6, ACSW 2017 : Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Victoria, E1

conference

A scalable and smart hierarchical wireless communication architecture based on network/user separation

H Zhang, P Dong, S Yu, J Song

(2017), Vol. 24, pp. 18-24, IEEE wireless communications, Piscataway, N.J., C1

journal

How to shutdown a cloud: a DDoS attack in a private infrastructure-as-a-service cloud

M Liu, W Dou, S Yu

(2017), Vol. 10, pp. 1-14, International journal of autonomous and adaptive communications systems, Olney, Eng., C1

journal

A novel multipath-transmission supported software defined wireless network architecture

C Xu, W Jin, G Zhao, H Tianfield, S Yu, Y Qu

(2017), Vol. 5, pp. 2111-2125, IEEE access, Piscataway, United States, C1

journal

Traffic matrix prediction and estimation based on deep learning for data center networks

L Nie, D Jiang, L Guo, S Yu, H Song

(2017), pp. 1-6, GC Wkshps 2016 : Proceedings of the 2016 IEEE Globecom Workshops, Washington, D.C., E1

conference

Big data set privacy preserving through sensitive attribute-based grouping

Y Qu, S Yu, L Gao, J Niu

(2017), pp. 4887-4892, ICC 2017 : Proceedings of the 2017 IEEE International Conference on Communications, Paris, France, E1

conference

Studying the global spreading influence and local connections of users in online social networks

J Jiang, Y Qu, S Yu, W Zhou, W Wu

(2017), pp. 431-435, CIT 2016 : Proceedings of the 16th IEEE International Conference on Computer and Information Technology, Nadi, Fiji, E1

conference

Local fast reroute with flow aggregation in software defined networks

X Zhang, Z Cheng, R Lin, L He, S Yu, H Luo

(2017), Vol. 21, pp. 785-788, IEEE communications letters, Piscataway, United States, C1

journal

A sleeping and offloading optimization scheme for energy-efficient WLANs

C Xu, Z Han, G Zhao, S Yu

(2017), Vol. 21, pp. 877-880, IEEE communications letters, Piscataway, United States, C1

journal

A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion

S Shen, H Ma, E Fan, K Hu, S Yu, J Liu, Q Cao

(2017), Vol. 91, pp. 26-35, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Impairment- and splitting-aware cloud-ready multicast provisioning in elastic optical networks

Z Zhu, X Liu, Y Wang, W Lu, L Gong, S Yu, N Ansari

(2017), Vol. 25, pp. 1220-1234, IEEE/ACM transactions on networking, Piscataway, N.J., C1

journal

Network traffic prediction based on deep belief network in wireless mesh backbone networks

L Nie, D Jiang, S Yu, H Song

(2017), pp. 1-5, WCNC 2017 : Proceedings of the IEEE Wireless Communications and Networking Conference, San Francisco, California, E1

conference

HostWatcher: protecting hosts in cloud data centers through software-defined networking

B Yuan, D Zou, H Jin, S Yu, L Yang

(2017), pp. 1-9, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Trustable service rating in social networks: a peer prediction method

J Du, C Jiang, J Wang, S Yu, Y Ren

(2017), pp. 415-419, GlobalSIP 2016 : Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, Washington, D.C., E1

conference

Privacy protection: a community-structured evolutionary game approach

J Du, C Jiang, S Yu, K Chen, Y Ren

(2017), pp. 1007-1011, GlobalSIP 2016 : Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, Washington, D.C., E1

conference

Resource allocation in space multiaccess systems

J Du, C Jiang, J Wang, Y Ren, S Yu, Z Han

(2017), Vol. 53, pp. 598-618, IEEE transactions on aerospace and electronic systems, Piscataway, N.J., C1

journal

Scoring users' privacy disclosure across multiple online social networks

E Aghasian, S Garg, L Gao, S Yu, J Montgomery

(2017), Vol. 5, pp. 13118-13130, IEEE access, Piscataway, N.J., C1

journal

Enhancing crowd collaborations for software defined vehicular networks

W Quan, Y Liu, H Zhang, S Yu

(2017), Vol. 55, pp. 80-86, IEEE communications magazine, Piscataway, N.J., C1

journal

A virtual machine scheduling method for trade-offs between energy and performance in cloud environment

X Xu, W Wang, T Wu, W Dou, S Yu

(2017), pp. 246-251, CBD 2016 : Proceedings of the 2016 International Conference on Advanced Cloud and Big Data, Chengdu, China, E1

conference

An immunization framework for social networks through big data based influence modeling

S Peng, G Wang, Y Zhou, C Wan, C Wang, S Yu

(2017), pp. 1-13, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal

Locator/identifier split networking: a promising future internet architecture

B Feng, H Zhang, H Zhou, S Yu

(2017), Vol. 19, pp. 2927-2948, IEEE communications surveys and tutorials, Piscataway, N.J., C1

journal

A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems

X Xu, X Zhang, M Khan, W Dou, S Xue, S Yu

(2017), pp. 1-11, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Mobile live video streaming optimization via crowdsourcing brokerage

T Wu, W Dou, Q Ni, S Yu, G Chen

(2017), Vol. 19, pp. 2267-2281, IEEE transactions on multimedia, Piscataway, N.J., C1

journal

Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data

H Li, Y Yang, Y Dai, J Bai, S Yu, Y Xiang

(2017), IEEE transactions on cloud computing, Piscataway, N.J., C1

journal

Congestion-aware local reroute for fast failure recovery in software-defined networks

Z Cheng, X Zhang, Y Li, S Yu, R Lin, L He

(2017), Vol. 9, pp. 934-944, Journal of optical communications and networking, Washington, D.C., C1

journal

Home location protection in mobile social networks: a community based method (short paper)

B Liu, W Zhou, S Yu, K Wang, Y Wang, Y Xiang, J Li

(2017), pp. 694-704, ISPEC 2017 : Information Security Practice and Experience 13th International Conference, ISPEC 2017 Melbourne, VIC, Australia, December 13?15, 2017 Proceedings, Melbourne, Victoria, E1

conference

Amplified locality-sensitive hashing for privacy-preserving distributed service recommendation

L Qi, W Dou, X Zhang, S Yu

(2017), Vol. 10656 LNCS, pp. 280-297, SpaCCS 2017 : Proceedings of the 10th Security, Privacy, and Anonymity in Computation, Communication, and Storage International Conference, Guangzhou, China, E1

conference

HetNet: a flexible architecture for heterogeneous satellite-terrestrial networks

B Feng, H Zhou, H Zhang, G Li, H Li, S Yu, H Chao

(2017), Vol. 31, pp. 86-92, IEEE network, Piscataway, N.J., C1

journal

FuzzyDP: Fuzzy-based Big Data Publishing Against Inquiry Attacks

Youyang Qu, Shui Yu, Longxiang Gao, Sancheng Peng, Yong Xiang, Liang Xiao

(2017), pp. 7-12, 2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), Atlanta, GA, E1

conference

Enhancing vehicular communication using 5G-enabled smart collaborative networking

P Dong, T Zheng, S Yu, H Zhang, X Yan

(2017), Vol. 24, pp. 72-79, IEEE wireless communications, Piscataway, N.J., C1

journal

Preferential attachment and the spreading influence of users in online social networks

J Jiang, L Gao, S Yu, J Jin, D Yuan

(2017), pp. 1-6, IEEE/CIC International Conference on Communications in China (ICCC), Qingdao, China, E1

conference

Towards an analysis of traffic shaping and policing in fog networks using stochastic fluid models

J jiang, L Gao, J jin, H luan, S yu, D yuan, Y xiang, D yuan

(2017), pp. 1-9, MobiQuitous 2017 : Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Melbourne, Vic., E1

conference

Distance-based location privacy protection in social networks

M Nosouhi, Y Qu, S Yu, Y Xiang, D Manuel

(2017), pp. 396-401, ITNAC 2017: Proceedings of the 27th International Telecommunication Networks and Applications Conference, Melbourne, Australia, E1

conference
2016

A scalable and automatic mechanism for resource allocation in self-organizing cloud

X Wu, M Liu, W Dou, L Gao, S Yu

(2016), Vol. 9, pp. 28-41, Peer-to-peer networking and applications, Berlin, Germany, C1

journal

A feasible IP traceback framework through dynamic deterministic packet marking

S Yu, W Zhou, S Guo, M Guo

(2016), Vol. 65, pp. 1418-1427, IEEE transactions on computers, Piscataway, N.J., C1

journal

Reliability evaluation for clustered WSNs under malware propagation

S Shen, L Huang, J Liu, A Champion, S Yu, Q Cao

(2016), Vol. 16, pp. 1-16, Sensors, Basel, Switzerland, C1

journal

FUIR: Fusing user and item information to deal with data sparsity by using side information in recommendation systems

J Niu, L Wang, X Liu, S Yu

(2016), Vol. 70, pp. 41-50, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Big data storage security

M Wen, S Yu, J Li, H Li, K Lu

(2016), pp. 237-255, Big data concepts, theories, and applications, Berlin, Germany, B1

chapter

Cost optimal resource provisioning for live video forwarding across video data centers

Y Gao, Ma, Liu, S Yu

(2016), Vol. 9784, pp. 27-38, Big data computing and communications: second international conference, BigCom 2016, Shenyang, China, July 29-31, 2016. Proceedings, Cham, Switzerland, B1

chapter

Big privacy: challenges and opportunities of privacy study in the age of big data

S Yu

(2016), Vol. 4, pp. 2751-2763, IEEE access, Piscataway, N.J., C1

journal

Software-defined wireless networking opportunities and challenges for internet-of-things: a review

K Sood, S Yu, Y Xiang

(2016), Vol. 3, pp. 453-463, IEEE internet of things journal, Piscataway, N.J., C1

journal

SAT-GRD: An ID/Loc split network architecture interconnecting satellite and ground networks

B Feng, H Zhou, G Li, H Li, S Yu

(2016), pp. 1-6, ICC 2016 : Proceedings of the 2016 IEEE International Conference on Communications, Kuala Lumpur, Malaysia, E1

conference

Time cumulative complexity modeling and analysis for space-based networks

J Du, C Jiang, S Yu, Y Ren

(2016), pp. 1-6, ICC 2016 : Proceedings of the 2016 IEEE International Conference on Communications, Kuala Lumpur, Malaysia, E1

conference

Information-agnostic coflow scheduling with optimal demotion thresholds

Y Gao, H Yu, S Luo, S Yu

(2016), pp. 1-6, ICC 2016 : Proceedings of the 2016 IEEE International Conference on Communications, Kuala Lumpur, Malaysia, E1

conference

Complex network theoretical analysis on information dissemination over vehicular networks

J Wang, C Jiang, L Gao, S Yu, Z Han, Y Ren

(2016), pp. 1-6, ICC 2016. Preceedings of the IEEE International Conference on Communications, Kuala Lumpur, Malaysia, E1

conference

Interference-Aware Coordinated Power Allocation in Autonomous Wi-Fi Environment

Y Zhang, C Jiang, Z Han, S Yu, J Yuan

(2016), Vol. 4, pp. 3489-3500, IEEE Access: Green Communications and Networking for 5G Wireless, Piscataway, N. J., C1

journal

A game-theoretic resource allocation approach for intercell device-to-device communications in cellular networks

J Huang, Y Yin, Y Zhao, Q Duan, W Wang, S Yu

(2016), Vol. 4, pp. 475-486, IEEE transactions on emerging topics in computing, Piscataway, N.J., C1

journal

Performance analysis of software-defined network switch using M/Geo/1 model

K Sood, S Yu, Y Xiang

(2016), Vol. 20, pp. 2522-2525, IEEE communications letters, Piscataway, N.J., C1

journal

Towards practical and near-optimal coflow scheduling for data center networks

S Luo, H Yu, Y Zhao, S Wang, S Yu, L Li

(2016), Vol. 27, pp. 3366-3380, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

Traffic matrix prediction and estimation based on deep learning in large-scale IP backbone networks

L Nie, D Jiang, L Guo, S Yu

(2016), Vol. 76, pp. 16-22, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Control layer resource management in SDN-IoT networks using multi-objective constraint

K Sood, S Yu, Y Xiang, S Peng

(2016), pp. 71-76, ICIEA 2016: Proceedings of the IEEE 11th Conference on Industrial Electronics and Applications, Hefei, China, E1

conference

Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system

D Zeng, L Gu, S Guo, Z Cheng, S Yu

(2016), Vol. 65, pp. 3702-3712, IEEE transactions on computers, Piscataway, N.J., C1

journal

DDoS attacks on data plane of software-defined network: are they possible?

X Wu, M Liu, W Dou, S Yu

(2016), Vol. 9, pp. 5444-5459, Security and communication networks, Chichester, Eng., C1

journal

Link state prediction-based reliable transmission for high-speed railway networks

H Zhang, W Quan, J Song, Z Jiang, S Yu

(2016), Vol. 65, pp. 9617-9629, IEEE Transactions on Vehicular Technology, Piscataway, N.J., C1

journal

A general QoS aware flow-balancing and resource management scheme in distributed software-defined networks

K Sood, S Yu, Y Xiang, H Cheng

(2016), Vol. 4, pp. 7176-7185, IEEE access, Piscataway, N.J., C1

journal

When will you have a new mobile phone? An empirical answer from big data

Q Ma, S Zhang, W Zhou, S Yu, C Wang

(2016), Vol. 4, pp. 10147-10157, IEEE access, Piscataway, N.J., C1

journal

Achieving fast and lightweight SDN updates with segment routing

L Luo, H Yu, S Luo, M Zhang, S Yu

(2016), pp. 1-6, GLOBECOM 2016: Proceedings of the 59th IEEE Global Communications Conference, Washington, D.C., E1-1

conference

Analysis of the spreading influence variations for online social users under attacks

J Jiang, S Wen, S Yu, W Zhou, Y Qian

(2016), pp. 1238-1244, GLOBECOM 2016: Proceedings of the 59th IEEE Global Communications Conference, Washington, D.C., E1-1

conference

A popularity-based cache consistency mechanism for information-centric networking

B Feng, H Zhou, H Zhang, J Jiang, S Yu

(2016), pp. 1-6, GLOBECOM 2016: Proceedings of the 59th IEEE Global Communications Conference, Washington, D.C., E1-1

conference

An adaptive cloudlet placement method for mobile applications over GPS big data

H Xiang, X Xu, H Zheng, S Li, T Wu, W Dou, S Yu

(2016), pp. 1057-1062, GLOBECOM 2016: Proceedings of the 59th IEEE Global Communications Conference, Washington, D.C., E1-1

conference

QoS correlation-aware service composition for unified network-cloud service provisioning

J Huang, S Li, Q Duan, R Yu, S Yu

(2016), pp. 4787-4792, GLOBECOM 2016: Proceedings of the 59th IEEE Global Communications Conference, Washington, D.C., E1-1

conference

Efficient and low-delay task scheduling for big data clusters in a theoretical perspective

Y Gao, H Yu, S Luo, S Yu

(2016), pp. 2242-2247, GLOBECOM 2016: Proceedings of the 59th IEEE Global Communications Conference, Washington, D.C., E1-1

conference

Breaking the split incentive hurdle via time-varying monetary rewards

Y Zhan, D Xu, H Yu, S Yu

(2016), pp. 1459-1464, GLOBECOM 2016: Proceedings of the 59th IEEE Global Communications Conference, Washington, D.C., E1-1

conference

OSaaS: online shopping as a service to escalate e-commerce in developing countries

M Khan, X Xu, W Dou, S Yu

(2016), pp. 1402-1409, HPCC/SmartCity/DSS 2016 : Proceedings of the 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems Combined Conference, Sydney, New South Wales, E1-1

conference
2015

A profiling based task scheduling approach for multicore network processors

F Tang, I You, C Tang, S Yu

(2015), Vol. 27, pp. 855-869, Concurrency computation : practice and experience, London, England, C1

journal

Malware propagation in large-scale networks

S Yu, G Gu, A Barnawi, S Guo, I Stojmenovic

(2015), Vol. 27, pp. 170-179, IEEE transactions on knowledge and data engineering, Piscataway, N.J., C1

journal

Fool me if you can: mimicking attacks and anti-attacks in cyberspace

S Yu, S Guo, I Stojmenovic

(2015), Vol. 64, pp. 139-151, IEEE Transactions on Computers, Piscataway, N.J., C1

journal

Learning complementary saliency priors for foreground object segmentation in complex scenes

Y Tian, J Li, S Yu, T Huang

(2015), Vol. 111, pp. 153-170, International journal of computer vision, Berlin, Germany, C1

journal

A decentralized cloud firewall framework with resources provisioning cost optimization

M Liu, W Dou, S Yu, Z Zhang

(2015), Vol. 26, pp. 621-631, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

A distributed gateway selection algorithm for UAV networks

F Luo, C Jiang, J Du, J Yuan, Y Ren, S Yu, M Guizani

(2015), Vol. 3, pp. 22-33, IEEE transactions on emerging topics in computing, Piscataway, N.J., C1

journal

Consensus building in a local context for the AHP-GDM with the individual numerical scale and prioritization method

Y Dong, Z Fan, S Yu

(2015), Vol. 23, pp. 354-368, IEEE transactions on fuzzy systems, Piscataway, N.J., C1

journal

An improved stochastic modeling of opportunistic routing in vehicular CPS

D Zeng, S Guo, A Barnawi, S Yu, I Stojmenovic

(2015), Vol. 64, pp. 1819-1829, IEEE transactions on computers, Piscataway, N.J., C1

journal

K-Center: an approach on the multi-source identification of information diffusion

J Jiang, S Wen, S Yu, Y Xiang, W Zhou

(2015), Vol. 10, pp. 2616-2626, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Optimal VM placement in data centres with architectural and resource constraints

D Zeng, S Guo, H Huang, S Yu, V Leung

(2015), Vol. 8, pp. 392-406, International journal of autonomous and adaptive communications systems, Olney, Eng., C1

journal

Modeling malicious activities in cyber space

S Yu, G Wang, W Zhou

(2015), Vol. 29, pp. 83-87, IEEE network, Piscataway, N.J., C1

journal

Big data sensing and service: a tutorial

J Gao, L Lei, S Yu

(2015), pp. 79-88, BigDataService 2015: Proceedings of the 1st IEEE International Conference on Big Data Computing Service and Applications, San Francisco, California, E1

conference

Dynamic access point association using software defined networking

K Sood, S Liu, S Yu, Y Xiang

(2015), pp. 226-231, ITNAC 2015: Proceedings of the 25th International Telecommunication Networks and Applications Conference, Sydney, New South Wales, E1

conference

SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors

Y Zhang, C Xu, S Yu, H Li, X Zhang

(2015), Vol. 2, pp. 159-170, IEEE transactions on computational social systems, Piscataway, N.J., C1

journal

Stability analysis and resource allocation for space-based multi-access systems

J Du, C Jiang, J Wang, S Yu, Y Ren

(2015), pp. 1-6, GLOBECOM 2015: Proceedings of the IEEE Global Communications Conference, San Diego, California, E1

conference

Enabling efficient and secure outsourcing of large matrix multiplications

K Jia, H Li, D Liu, S Yu

(2015), pp. 1-6, GLOBECOM 2015: Proceedings of the IEEE Global Communications Conference, San Diego, California, E1

conference

VGraph: graph virtualization towards big data

M Khan, M Liu, W Dou, S Yu

(2015), pp. 153-158, CBD 2015: Proceedings of the 2015 3rd International Conference on Advanced Cloud and Big Data, Yangzhou, Jiangsu, China, E1

conference

Identifying diffusion sources in large networks: a community structure based approach

J Jiang, J Jiang, A Zhou, A Zhou, K Majbouri Yazdi, K Majbouri Yazdi, S Wen, S Wen, S Yu, S Yu, Y Xiang, Y Xiang

(2015), Vol. 1, pp. 302-309, TrustCom 2015: Proceedings of the IEEE Trust, Security and Privacy in Computing and Communications 2015 International Conference, Helsinki, Finland, E1

conference

An energy-aware QoS enhanced method for service computing across clouds and data centers

W Dou, X Xu, S Meng, S Yu

(2015), pp. 80-87, CBD 2015: Proceedings of the Advanced Cloud and Big Data 2015 International Conference, Yangzhou, China, E1

conference

Delay tolerant networks

L Gao, S Yu, H Luan, W Zhou

(2015), Berlin, Germany, A1

book

Graph theory based QoE-driven cooperation stimulation for content dissemination in device-To-device communication

A Zhang, J Chen, L Zhou, S Yu

(2015), Vol. 4, pp. 556-567, IEEE transactions on emerging topics in computing, Piscataway, N.J., C1

journal

Personalized search over encrypted data with efficient and secure updates in mobile clouds

H Li, D Liu, Y Dai, T Luan, S Yu

(2015), Vol. PP, pp. 1-12, IEEE transactions on emerging topics in computing, Piscataway, N.J., C1

journal

Converged network-cloud service composition with end-To-end performance guarantee

J Huang, Q Duan, S Guo, Y Yan, S Yu

(2015), Vol. PP, pp. 1-15, IEEE transactions on cloud computing, Piscataway, N.J., C1

journal
2014

Distributed denial of service (DDoS) detection by traffic pattern analysis

T Thapngam, S Yu, W Zhou, S Makki

(2014), Vol. 7, pp. 346-358, Peer-to-peer networking and applications, New York, N.Y., C1

journal

On the multicast lifetime of WANETs with multibeam antennas: Formulation, algorithms, and analysis

S Guo, M Guo, V Leung, S Yu, Y Xiang

(2014), Vol. 63, pp. 1988-2001, IEEE Transactions on Computers, NJ, United States, C1

journal

Are the popular users always important for information dissemination in online social networks?

S Wen, J Jiang, Y Xiang, S Yu, W Zhou

(2014), Vol. 28, pp. 64-67, IEEE Network, Piscataway, N. J, C1

journal

Network dynamics of mobile social networks

G Zhao, D Li, C Xu, H Tang, S Yu

(2014), pp. 2478-2483, ICC 2014 : Proceedings of the 2014 IEEE International Conference on Communications, Sydney, NSW, E1

conference

Can we beat DDoS attacks in clouds?

S Yu, Y Tian, S Guo, D Wu

(2014), Vol. 25, pp. 2245-2254, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

Smartphone malware and its propagation modeling : A survey

S Peng, S Yu, A Yang

(2014), Vol. 16, pp. 925-941, IEEE Communications Surveys and Tutorials, Piscataway, N. J, C1

journal

Propagation model of smartphone worms based on semi-Markov process and social relationship graph

S Peng, M Wu, G Wang, S Yu

(2014), Vol. 44, pp. 92-103, Computers and Security, Oxon, United Kingdom, C1

journal

A clusterized firewall framework for cloud computing

M Liu, W Dou, S Yu, Z Zhang

(2014), pp. 3788-3793, IEEE ICC 2014 - Proceedings of the Communication and Information Systems Security Symposium, Sydney, NSW, E1

conference

Byzantine-resilient secure software-defined networks with multiple controllers

H Li, P Li, S Guo, S Yu

(2014), pp. 695-700, ICC 2014 : Proceedings of the 2014 IEEE International Conference on Communications, Sydney, NSW, E1

conference

Detection on application layer DDoS using random walk model

C Xu, G Zhao, G Xie, S Yu

(2014), pp. 707-712, ICC 2014 : Proceedings of the 2014 IEEE International Conference on Communications, Sydney, NSW, E1

conference

Type-aware task placement in geo-distributed data centers with low OPEX using data center resizing

L Gu, D Zeng, S Guo, S Yu

(2014), pp. 211-215, ICNC 2014 : Proceedings of the 2014 International Conference on Computing, Networking and Communications, Honolulu, Hawaii, E1

conference

To shut them up or to clarify: restraining the spread of rumors in online social networks

S Wen, J Jiang, Y Xiang, S Yu, W Zhou, W Jia

(2014), Vol. 25, pp. 3306-3316, IEEE transactions on parallel and distributed systems, Piscataway, NJ, C1

journal

An effective and feasible traceback scheme in mobile internet environment

S Yu, K Sood, Y Xiang

(2014), Vol. 18, pp. 1911-1914, IEEE Communications Letters, NJ, United States, C1

journal

Reliable multicast with pipelined network coding using opportunistic feeding and routing

P Li, S Guo, S Yu, A Vasilakos

(2014), Vol. 25, pp. 3264-3273, IEEE Transactions on Parallel and Distributed Systems, Piscataway, United States, C1

journal

Containing smartphone worm propagation with an influence maximization algorithm

S Peng, M Wu, G Wang, S Yu

(2014), Vol. 74, pp. 103-113, Computer Networks, Amsterdam, Netherlands, C1

journal
2013

Introduction

D Kingsbury

(2013), pp. 1-12, Critical reflections on development, London, England, B1

chapter

A survey and tutorial of wireless relay network protocols based on network coding

A Mohammed, B Dai, B Huang, M Azhar, G Xu, P Qin, S Yu

(2013), Vol. 36, pp. 593-610, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

A novel model for user clicks identification based on hidden semi-Markov

C Xu, C Du, G Zhao, S Yu

(2013), Vol. 36, pp. 791-798, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones

S Peng, G Wang, S Yu

(2013), Vol. 79, pp. 586-595, Journal of computer and system sciences, Amsterdam, The Netherlands, C1

journal

Numerical scales generated individually for analytic hierarchy process

Y Dong, W Hong, Y Xu, S Yu

(2013), Vol. 229, pp. 654-662, European journal of operational research, Amsterdam, The Netherlands, C1

journal

Secure RFID tag ownership transfer based on quadratic residues

R Doss, W Zhou, S Yu

(2013), Vol. 8, pp. 390-401, IEEE Transactions on information forensics and security, Piscataway, N.J., C1

journal

Stochastic modeling and analysis of opportunistic computing in intermittent mobile cloud

D Zeng, S Guo, I Stojmenovic, S Yu

(2013), pp. 1902-1907, ICIEA 2013 : Proceedings of the 8th IEEE Conference on Industrial Electronics and Applications, Melbourne, Victoria, E1

conference

Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration

Y Xie, J Hu, Y Xiang, S Yu, S Tang, Y Wang

(2013), Vol. 24, pp. 1807-1817, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

A hierarchical PCA-based anomaly detection model

B Tian, K Merrick, S Yu, J Hu

(2013), pp. 621-625, ICNC 2013 : International Conference on Computing, Networking and Communications, San Diego, California, E1

conference

A general cloud firewall framework with dynamic resource allocation

S Yu, R Doss, W Zhou, S Guo

(2013), pp. 1941-1945, Proceedings of the IEEE International Conference on Communications; ICC 2013, Budapest, Hungary, E1

conference

Multi-dimensional routing protocol in human associated delay-tolerant networks

L Gao, M Li, A Bonti, W Zhou, S Yu

(2013), Vol. 12, pp. 2132-2144, IEEE transactions on mobile computing, Piscataway, N.J., C1

journal

Modeling malware propagation in smartphone social networks

S Peng, G Wang, S Yu

(2013), pp. 196-201, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Victoria, E1

conference

DDoS attack detection at local area networks using information theoretical metrics

Y Tao, S Yu

(2013), pp. 233-240, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Victoria, E1

conference

Linguistic computational model based on 2-tuples and intervals

Y Dong, G Zhang, W Hong, S Yu

(2013), Vol. 21, pp. 1006-1018, IEEE Transactions on fuzzy systems, Piscataway, NJ, C1

journal

A bio-inspired jamming detection and restoration for WMNs : in view of adaptive immunology

Q Liu, J Yin, S Yu

(2013), pp. 243-257, Cyberspace safety and security, Cham, Switzerland, B1

chapter

A dynamical deterministic packet marking scheme for DDoS traceback

S Yu, W Zhou, S Guo, M Guo

(2013), pp. 729-734, IEEE GLOBECOM 2013 : The power of global communications : Proceedings of the IEEE Global Communications 2013 conference, exhibition and industry forum, Atlanta, Georgia, E1-1

conference

Mining mechanism of top-k influential nodes based on voting algorithm in mobile social networks

S Peng, G Wang, S Yu

(2013), pp. 2194-2199, Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013, Zhangjiajie, China, E1-1

conference
2012

Attacking anonymous web browsing at local area networks through browsing dynamics

S Yu, W Zhou, W Jia, J Hu

(2012), Vol. 55, pp. 410-421, Computer journal, Oxford, England, C1

journal

On the stress function-based OWA determination method with optimization criteria

X Liu, S Yu

(2012), Vol. 42, pp. 246-257, IEEE transactions on systems, man, and cybernetics part b : cybernetics, Piscataway, N. J., C1

journal

An efficient deadlock prevention approach for service oriented transaction processing

F Tang, I You, S Yu, C Wang, M Guo, W Liu

(2012), Vol. 63, pp. 458-468, Computers and mathematics with applications, Oxford, Eng., C1

journal

Least square completion and inconsistency repair methods for additively consistent fuzzy preference relations

X Liu, Y Pan, Y Xu, S Yu

(2012), Vol. 198, pp. 1-19, Fuzzy sets and systems, Amsterdam, Netherlands, C1

journal

A dual-channel time-spread echo method for audio watermarking

Y Xiang, I Natgunanathan, D Peng, W Zhou, S Yu

(2012), Vol. 7, pp. 383-392, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Reliable aggregation on network traffic for web based knowledge discovery

S Yu, S James, T Yonghong, W Dou

(2012), pp. 149-159, Reliable knowledge discovery, New York, NY, B1

chapter

Discriminating DDoS attacks from flash crowds using flow correlation coefficient

S Yu, W Zhou, W Jia, S Guo, Y Xiang, F Tang

(2012), Vol. 23, pp. 1073-1080, IEEE transactions on parallel and distributed systems, Piscataway, N. J., C1

journal

Predicted packet padding for anonymous web browsing against traffic analysis attacks

S Yu, G Zhao, W Dou, S James

(2012), Vol. 7, pp. 1381-1393, IEEE transactions on information forensics and security, Piscataway, N. J., C1

journal

M-Dimension : multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models

L Gao, M Li, A Bonti, W Zhou, S Yu

(2012), Vol. 35, pp. 1285-1296, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

An interior point trust region method for nonnegative matrix factorization

J Jiang, H Zhanga, S Yu

(2012), Vol. 97, pp. 309-316, Neurocomputing, Amsterdam, The Netherlands, C1

journal

A minimum disclosure approach to authentication and privacy in RFID systems

R Doss, W Zhou, S Sundaresan, S Yu, L Gao

(2012), Vol. 56, pp. 3401-3416, Computer networks, Amsterdam, The Netherlands, C1

journal

Can we beat legitimate cyber behavior mimicking attacks from botnets?

S Yu, S Guo, I Stojmenovic

(2012), pp. 2851-2855, INFOCOM 2012 : Proceedings of the IEEE Computer Communications 2012 Conference, Orlando, Florida, E1

conference

CodePipe : an opportunistic feeding and routing protocol for reliable multicast with pipelined network coding

P Li, S Guo, S Yu, A Vasilakos

(2012), pp. 100-108, INFOCOM 2012 : Proceedings of the 31st IEEE INFOCOM conference, Orlando, Fla., E1

conference

DDoS discrimination by linear discriminant analysis (LDA)

T Thapngam, S Yu, W Zhou

(2012), pp. 532-536, ICNC 2012 : Proceedings of the 2012 International Conference on Computing, Networking and Communications, Maui, Hawaii, E1

conference

Why it is hard to fight against cyber criminals?

S Yu, W Zhou, W Dou, S Makki

(2012), pp. 537-541, Proceedings of the 32nd IEEE International Conference on Distributed Computing Systems Workshops : ICDCSW 2012, Macau, China, E1

conference

Service-oriented wireless sensor networks and an energy-aware mesh routing algorithm

F Tang, C Tang, M Guo, S Guo, S Yu

(2012), Vol. 15, pp. 21-46, Ad hoc & sensor wireless networks, Philadelphia, PA, C1

journal

AMDD : Exploring entropy based anonymous multi-dimensional data detection for network optimization in human associated DTNs

L Gao, M Li, T Zhu, A Bonti, W Zhou, S Yu

(2012), pp. 1245-1250, TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, England, E1

conference

Securing recommendations in grouped P2P e-commerce trust model

F Musau, G Wang, S Yu, M Abdullahi

(2012), Vol. 9, pp. 407-420, IEEE transactions on network and service management, Piscataway, N.J., C1

journal

Grid transaction management and an efficient development kit

F Tang, I You, S Yu, H Li, C Wang

(2012), Vol. 27, pp. 345-353, International journal of computer systems science and engineering, Kibworth Beauchamp, England, C1

journal
2011

Traceback of DDoS attacks using entropy variations

S Yu, W Zhou, R Doss, W Jia

(2011), Vol. 22, pp. 412-425, IEEE transactions on parallel and distributed systems, United States, C1

journal

Selecting the individual numerical scale and prioritization method in the analytic hierarchy process : a 2-tuple fuzzy linguistic approach

Y Dong, W Hong, Y Xu, S Yu

(2011), Vol. 19, pp. 13-25, IEEE transactions on fuzzy systems, Piscataway, N. J., C1

journal

CM-based blind equalization of time-varying SIMO-FIR channel with single pulsation estimation

D Peng, Y Xiang, Z Yi, S Yu

(2011), Vol. 60, pp. 2410-2415, IEEE transactions on vehicular technology, Piscataway, N. J, C1

journal

Orthogonal feedback scheme for network coding

J Yang, B Dai, B Huang, S Yu

(2011), Vol. 34, pp. 1623-1633, Journal of Network and Computer Applications, United Kingdom, C1

journal

Survey of network coding-aware routing protocols in wireless networks

M Iqbal, B Dai, B Huang, A Hassan, S Yu

(2011), Vol. 34, pp. 1956-1970, Journal of network and computer applications, London, C1

journal

Discriminating DDoS attack traffic from flash crowd through packet arrival patterns

T Thapngam, S Yu, W Zhou, G Beliakov

(2011), pp. 952-957, INFOCOM WKSHPS 2011 : IEEE Conference on Computer Communications Workshops, Shanghai, China, E1

conference

Non-monotone averaging aggregation

G Beliakov, S Yu, D Paternain

(2011), pp. 2905-2908, FUZZ 2011 : IEEE International Conference on Fuzzy Systems, Taipei, Taiwan, E1

conference

On the maximum throughput of two-hop wireless network coding

D Zeng, S Guo, H Jin, S Yu

(2011), pp. 416-421, WCNC 2011 : IEEE Wireless Communications and Networking Conference, Cancun, Mexico, E1

conference

A novel mutual authentication scheme with minimum disclosure for rfid systems

R Doss, W Zhou, S Yu, L Gao

(2011), pp. 544-549, ISSNIP 2011 : Proceedings of the 7th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Adelaide, S. Aust., E1

conference

A survey on latest botnet attack and defense

L Zhang, S Yu, D Wu, P Watters

(2011), pp. 53-60, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference

Browsing behavior mimicking attacks on popular web sites for large botnets

S Yu, G Zhao, S Guo, Y Xiang, A Vasilakos

(2011), pp. 947-951, INFOCOM WKSHPS 2011 : IEEE Conference on Computer Communications Workshops, Shanghai, China, E1

conference

A novel monotonic fixed-point algorithm for l1-regularized least square vector and matrix problem

J Jiang, H Zhang, S Yu

(2011), pp. 476-483, High performance networking, computing, and communication systems : second international conference, ICHCC 2011, Singapore, May 5-6, 2011, selected papers, Berlin, Germany, B1

chapter

Utilizing intelligent middleware for reconfiguration of applications on android

S Makki, N Srirangam, V Aiswarya, S Yu

(2011), pp. 81-89, ICHIT 2011 : Convergence and hybrid information technology : 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011, proceedings, Daejeon, Korea, E1

conference

Multicast lifetime maximization using network coding in lossy wireless ad-hoc networks

C Hsu, P Li, S Guo, S Yu, Z Qian

(2011), pp. 95-99, IEEE/IFIP 2011 : Proceedings of the IEEE/IFIP 9th International Conference Embedded and Ubiquitous Computing 2011, Melbourne, Vic., E1

conference

CBF : A packet filtering method for DDoS attack defense in cloud environment

Q Chen, W Lin, W Dou, S Yu

(2011), pp. 427-434, DASC 2011 : Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, Sydney, N.S.W., E1

conference

A shadow-like task migration model based on context semantics for mobile and pervasive environments

F Tang, C Tang, M Guo, S Yu, S Guo

(2011), Vol. 30, pp. 1131-1146, Computing and informatics, Bratislava, Slovakia, C1-1

journal
2010

Anonymous web browsing through predicted pages

S Yu, T Thapngam, H Tse, J Wang

(2010), pp. 1581-1585, IEEE Globecom 2010 : Proceedings of the 53rd Global Communications Conference, Exhibition and Industry Forum, Miami, Fla., E1

conference

Efficient web browsing with perfect anonymity using page prefetching

S Yu, T Thapngam, S Wei, W Zhou

(2010), pp. 1-12, ICA3PP 2010 : Algorithms and architectures for parallel processing : Proceedings of the 10th International Conference Algorithms and Architectures for Parallel Processing, Busan, Korea, E1

conference
2009

Improving the qos for information discovery in autonomic wireless sensor networks

R Doss, G Li, V Mak, S Yu, M Chowdhury

(2009), Vol. 5, pp. 334-349, Pervasive and mobile computing, Amsterdam, Netherlands, C1

journal

Effective metric for detecting distributed denial-of-service attacks based on information divergence

K Li, W Zhou, S Yu

(2009), Vol. 3, pp. 1851-1860, IET Communications, Herts, England, C1

journal

Discriminating DDoS flows from flash crowds using information distance

S Yu, T Thapngam, J Liu, S Wei, W Zhou

(2009), pp. 351-356, NSS 2009 : Proceedings of the third International Conference on Network and System Security, Gold Coast, Queensland, E1

conference

Computing the numerical scale of the linguistic term set for the 2-tuple fuzzy linguistic representation model

Y Dong, Y Xu, S Yu

(2009), Vol. 17, pp. 1366-1378, I E E E transactions on fuzzy systems, Piscataway, NJ, C1

journal

Linguistic multiperson decision making based on the use of multiple preference relations

Y Dong, Y Xu, S Yu

(2009), Vol. 160, pp. 603-623, Fuzzy sets and systems, Amsterdam, Netherlands, C1

journal
2008

Information theory based detection against network behavior mimicking DDoS attacks

S Yu, W Zhou, R Doss

(2008), Vol. 12, pp. 319-321, IEEE communications letters, USA, C1

journal

Source-based filtering scheme against DDOS attacks

F Yi, S Yu, W Zhou, J Hai, A Bonti

(2008), Vol. 1, pp. 9-20, International journal of database theory and application, Korea, C1

journal

The crossroads approach to information discovery in wireless sensor networks

R Doss, G Li, S Yu, V Mak, M Chowdhury

(2008), Vol. 4904, pp. 310-321, Lecture notes in computer science, Berlin, Germany, C1

journal

A transformation model for heterogeneous servers

S Yu, R Doss, T Thapngam, D Qian

(2008), pp. 665-671, HPCC 2008 : Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, Dalian, China, E1

conference

Entropy-based collaborative detection of DDOS attacks on community networks

S Yu, W Zhou

(2008), pp. 566-571, Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications, Hong Kong, E1

conference
2007

Novel data management algorithms in peer-to-peer content distribution networks

K Li, W Zhou, S Yu, P Li

(2007), Vol. 4798, pp. 538-543, Lecture notes in computer science, Berlin, Germany, C1

journal

Massive data delivery in unstructured peer-to-peer networks with network coding

S Yu, Z Li

(2007), pp. 592-597, IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), Melbourne, Vic., E1

conference

A parallel downloading algorithm for redundant networks

K Li, W Zhou, S Yu, B Dai

(2007), pp. 177-182, CIT 2007 : proceedings : 7th IEEE International Conference on Computer and Information Technology : 16-19 October, 2007, Aizu-Wakamatsu City, Fukushima, Japan, Fukushima, Japan, E1

conference

A resource-search and routing algorithm within PCDN autonomy area

K Li, W Zhou, S Yu, Y Zhang

(2007), pp. 509-514, PDCAT 2007 : Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies : 3-6 December, 2007, Adelaide, Australia, Adelaide, Australia, E1

conference

Novel dynamic routing algorithms in autonomous system

K Li, W Zhou, S Yu, R Tian

(2007), pp. 223-228, CIRAS 2007 : proceedings of the Fourth International Conference on Computational Intelligence, Robotics and Autonomous Systems, Massey University, Palmerston North, New Zealand, 28th-30th November, 2007, Palmerston North, New Zealand, E1

conference

An enhanced parallel downloading algorithm for BT

K Li, W Zhou, S Yu

(2007), pp. 1023-1027, PDPTA 2007 : Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2007, Las Vegas, Nevada, USA, June 25-28, 2007, Las Vegas, Nevada, USA, E1

conference
2006

Online algorithm for application layer anycast

S Yu, Z Li, B Liu

(2006), Vol. 138, pp. 340-345, Frontiers in artificial intelligence and applications: advances in intelligent IT: active media technology, Amsterdam, Netherlands, C1

journal

Performance optimization for energy-aware adaptive checkpointing in embedded real-time systems

Z Li, H Chen, S Yu

(2006), Design, automation, and test in Europe : proceedings, Munich, Germany, March 6-10, 2006, Munich, Germany, E1

conference
2005

An efficient reliable architecture for application layer anycast service

S Yu, W Zhou

(2005), Vol. 3719, pp. 376-385, Lecture notes in computer science, Berlin, Germany, C1

journal

A mesh based anycast routing protocol for ad hoc networks

S Yu, W Zhou

(2005), Vol. 3758, pp. 927-932, Lecture notes in computer science, Berlin, Germany, C1

journal

An integration technology of checkpointing for DMR with energy-aware

Z Li, Y Jiang, S Yu

(2005), pp. 323-329, Advances in computational methods in sciences and engineering 2005 : selected papers from the International Conference of Computational Methods in Sciences and Engineering 2005 (ICCMSE 2005), Corinth, Greece, E1

conference
2004

Minicast: a multicast-anycast protocol for message delivery

S Yu, W Zhou, J Rough

(2004), Vol. 3358, pp. 798-803, Lecture notes in computer science, Berlin, Germany, C1

journal

A load balancing algorithm for web based server grids

S Yu, J Casey, W Zhou

(2004), Vol. 3033, pp. 121-128, Lecture notes in computer science, Berlin, Germany, C1

journal

A novel middleware based web database model

S Yu, W Zhou

(2004), pp. 533-536, IEEE/WIC International Conference on Web Intelligence (WI 2004) : Beijing, China, September 20-24, 2004 : proceedings, Beijing, China, E1

conference

Load balance algorithms for anycast

S Yu, W Zhou, J Casey

(2004), pp. 471-480, iiWAS2004 : Sixth International Conference on Information Integration and Web-based Applications Services, 27-29 September 2004, Jakarta, Indonesia, Jakarta, Indonesia, E1

conference
2003

Quality-of-service routing for web-based multimedia servers

S Yu, W Zhou, M Chowdhury

(2003), pp. 1349-1353, Proceedings of the 7th Joint Conference on Information Sciences : September 26 - 30, 2003, Research Triangle Park, North Carolina, USA, Cary, N. C., E1

conference

Improving the performance of the LMS and RLS algorithms for adaptive equalizer

H Ye, W Zhou, S Yu, M Lan

(2003), pp. 457-462, Active media technology : proceedings of the Second International Conference on Active Media Technology, Chongqing, PR China, 29-31 May, 2003, Chongqing, China, E1

conference

An architecture of internet based data processing based on multicast and anycast protocols

S Yu, W Zhou, M Lan, Y Wu

(2003), pp. 104-110, Parallel and distributed computing, applications and technologies : PDCAT'2003 : proceedings : (August 27-29, 2003, Chengdu, China), Chengdu, China, E1

conference

Fault-tolerant servers for anycast communication

S Yu, W Zhou, W Jia

(2003), pp. 1244-1250, PDPTA 2003 : Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, Nevada, USA, E1

conference

Self-adaptive clock synchronisation based on clock precision difference

Y Zhao, W Zhou, E Lanham, S Yu, M Lan

(2003), pp. 181-187, Computer science 2003 : proceedings of the twenty-sixth Australasian Computer Science Conference, Adelaide, South Australia, Australia, E1

conference
2002

A web-DB model on multicast and anycast

S Yu, W Zhou, Y Zhao, M Lan, Y Xiang

(2002), pp. 412-415, Proceedings of the 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, Beijing, China, E1

conference

A co-recommendation algorithm for web searching

M Lan, S Yu, R Bacher, W Zhou

(2002), pp. 479-482, Proceedings of the Fifth International Conference on Algorithms and Architectures for Parallel Processing, Beijing, China, E1

conference

Research on network anycast

S Yu, W Zhou, Y Wu

(2002), pp. 154-161, 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, Beijing, China, E1

conference

An efficient algorithm for application-layering anycasting

S Yu, W Zhou, F Huang, M Lan

(2002), pp. 74-83, DCW 2002 : Distributed communities on the Web : 4th international workshop, DCW 2002, Sydney, Australia, April 3-5, 2002 : revised papers, Sydney, New South Wales, E1

conference

Self-adaptive clock synchronization for computational grid

Y Zhao, W Zhou, J Huang, S Yu, E Lanham

(2002), pp. 932-942, GCC 2002 : Proceedings of the grid and cooperative computing international workshop, Hainan, China, E1

conference
2001

An automatic generation model for web-based database applications

S Yu, C Chen, W Zhou

(2001), pp. 62-66, Parallel and distributed computing and systems : proceedings of the IASTED international conference, August, 21 - 24, 2001, Anaheim, California, USA, Anaheim, California, USA, E1

conference

A reactive architecture for web-based information systems

C Chen, W Zhou, S Yu

(2001), pp. 1028-1034, Proceedings of the International Conference on Internet Computing : IC'2001 : Las Vegas, Nevada, USA, June 25-28, 2001, Las Vegas, Nevada, USA, E1

conference

Funded Projects at Deakin

Industry and Other Funding

NICTA/Data61 Scholarships - School of IT

Prof John Grundy, Prof John Yearwood, A/Prof Mohamed Abdelrazek, Prof Yong Xiang, Dr Shui Yu

  • 2018: $76,789
  • 2017: $143,404

Supervisions

Principal Supervisor
2017

Keshav Sood

Thesis entitled: Performance Analysis and Optimization in Software Defined Networks

Doctor of Philosophy (Information Technology), School of Information Technology

Jiaojiao Jiang

Thesis entitled: Rumor Source Identification in Complex Networks

Doctor of Philosophy (Information Technology), School of Information Technology

Associate Supervisor
2012

Yini Wang

Thesis entitled: Modelling and Defence against Propagation of Worms in Networks

Doctor of Philosophy (Information Technology), School of Information Technology

Theerasak Thapngam

Thesis entitled: Improvement of DDoS Attacks Detection and Web Access Anonymity

Doctor of Philosophy (Information Technology), School of Information Technology

2009

Ke Li

Thesis entitled: Reliable Algorithms and Attack Detection Schemes for Network Systems

Doctor of Philosophy (Information Technology), School of Information Technology