Dr Shui Yu

STAFF PROFILE

Position

Associate Professor

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Qualifications

Graduate Certificate of Higher Education, Deakin University, 2006
Doctor of Philosophy, Deakin University, 2004
Master of Computer Science, Univ. of Electr.S&T of China, 1999
Bachelor of Electrical Engineering, Univ. of Electr.S&T of China, 1993

Biography

Shui Yu is currently an Associate Professor of School of Information Technology, Deakin University, Melbourne, Australia. He was a member of Deakin University Academic Board (2015-2016). Before joining Deakin University , Dr Yu was a Lecturer of Computer College in University of Electronic Science and Technology of China. He has a good experience of industry, especially in network design and software development organization and implementation. 

He is a Senior Member of IEEE, and a member of AAAS and ACM, the Vice Chair of Technical Committee on Big Data Processing, Analytics, and Networking of IEEE Communication Society. He is a Distinguished Lecturer of IEEE ComSoc.

Dr Yu’s research interest includes Security and Privacy in Networking, Big Data, and Cyberspace, and mathematical modelling. He has published two monographs and edited two books, more than 150 technical papers, including top journals and top conferences, such as IEEE TPDS, IEEE TC, IEEE TIFS, IEEE TMC, IEEE TKDE, IEEE TETC, and IEEE INFOCOM. Dr Yu initiated the research field of networking for big data in 2013. His h-index is 29.


Dr Yu actively serves his research communities in various roles. He is currently serving the editorial boards of IEEE Communications Surveys and Tutorials, IEEE Transactions on Computational Social Systems, IEEE Access, IEEE Journal of Internet of Things, IEEE Communications Magazine, and a number of other international journals. He has served more than 70 international conferences as a member of organizing committee, such as publication chair for IEEE Globecom 2015 and 2017, IEEE INFOCOM 2016 and 2017, TPC co-chair for IEEE BigDataService 2015, IEEE ATNAC 2014, IEEE ITNAC 2015; Executive general chair for ACSW2017.

More information can be found at http://www.nsp.org.au/syu/

Read more on Shui's profile

Research interests

My research interest is to challenge the practical issues in Information Technology and then make my research to serve for the communities.

Networking theory and network science.
Cyber security, privacy and forensics.
Big Data Networking.
Mathematical modelling


I am also interested in mathematics, most of the time, I read the following topics: Information Theory, Differential Geometry, Game Theory, Measure Theory, Functional Analysis, Operations Research and Applied Mathematics.

Teaching interests

Scholarship of teaching, high quality PhD training.

As the primary supervisor, my students have won the following awards.

Alfred Deakin Medal for Doctoral Thesis, 2017 (only two for the whole university)

China CSC Award for Overseas Students, 2016 (501 winners globally for all discinplines)

IT Professoriate Award (best research student), 2016 (School level)

IT Professoriate Award (best research student), 2015 (School level)

Units taught

SIT790 Major Thesis

SIT792 Minor Theis

SIT791 Security and Privacy Issues in Data Analytics

SIT783 Linux and Open Source Software

SIT 751 Java Network Programming

SIT 222 Operating Systems

SIT151 Game Fundamentals

Knowledge areas

Cybersecurity and Privacy

Networking Theory

Big Data

Atificial Intelligence

Mathematical Modelling

Professional activities

Editorial boards

IEEE Transactions on Computational Social Systems, 2017-

IEEE Communications Magazine (impact factor 10.2, ranked number 1 in the field), 2016-.

IEEE Communications Letters (impact factor 1.9), 2016-.

IEEE Internet of Things Journal (impact factor 7.2), 2016-.

IEEE Access (impact factor 3.7), since 2014-.

IEEE Communications Surveys and Tutorials (impact factor 17.2, ranked number 1 in the field), 2014-.

IEEE Transactions on Parallel and Distributed Systems, 2013 - 2015.

Guest editors

IEEE Transactions on Big Data, Security and Privacy in Big Data, 2017.

IEEE Access, Theoretical Foundation for Big Data Applications, 2016.

IEEE Cloud Computing, Cloud Security, 2016.

IEEE Network, Special Issue on Big Data for Networking, 2015.

IJPEDS, Special Issue on Networking Aspects in Big Data, 2015.

IEEE Network, Special Issue on Networking for Big Data, 2014.

 

Panel Members

China NSF Outstanding Young Researcher (equivalent to ARC DECRA) 2017

China NSF Large Project (equivalent to ARC DP), 2017.

Awards

Overseas Expert, Beijing Jiaotong University, China (National 111 Project, China Ministry of Education)

Guest Professor of Southwest University, China

Guest Professor of Chongqing University of Telecommunication and Post, China

Exemplary editor of IEEE Communications Surveys and Tutorial 2014

Exemplary editor of IEEE Communications Letters 2016

Projects

1.  ARC DP (second and key CI), Enhancing information credibility using mathematical prediction, $373,000, 2018-2020.

2. Networking for Big Data, China NSF for Overseas Researchers, 2018-2019, RMB 180,000 (equivalent to ARC DP).

3. Big Data Driven Complex System, China NSF, 2017-2020, RMB 620,000 (equivalent to ARC DP) .

4. Dynamics of Smartphone Malware, China NSF, 2014-2017, RMB 760,000 (equivalent to ARC DP).

Publications

Filter by

2018

Quality-of-sensing aware budget constrained contaminant detection sensor deployment in water distribution system

D Zeng, S Zhang, L Gu, S Yu, Z Fu

(2018), Vol. 103, pp. 274-279, Journal of Network and Computer Applications, C1

journal

DDSE: a novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks

L Cui, H Hu, S Yu, Q Yan, Z Ming, Z Wen, N Lu

(2018), Vol. 103, pp. 119-130, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

DIPOR: an IDA-based dynamic proof of retrievability scheme for cloud storage systems

A Fu, Y Li, S Yu, Y Yu, G Zhang

(2018), Vol. 104, pp. 97-106, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Rumor source identification in social networks with time-varying topology

J Jiang, S Wen, S Yu, Y Xiang, W Zhou

(2018), Vol. 15, pp. 166-179, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal

Network traffic prediction based on deep belief network and spatiotemporal compressive sensing in wireless mesh backbone networks

L Nie, X Wang, L Wan, S Yu, H Song, D Jiang

(2018), Vol. 2018, pp. 1-10, Wireless communications and mobile computing, Cairo, Egypt, C1

journal

A survey on security threats and defensive techniques of machine learning: a data driven view

Q Liu, P Li, W Zhao, W Cai, S Yu, V Leung

(2018), Vol. 6, pp. 12103-12117, IEEE access, Piscataway, N.J., C1

journal

Influence analysis in social networks: a survey

S Peng, Y Zhou, L Cao, S Yu, J Niu, W Jia

(2018), Vol. 106, pp. 17-32, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Collaborative ensemble learning under differential privacy

T Xiang, Y Li, X Li, S Zhong, S Yu

(2018), Vol. 16, pp. 73-87, Web Intelligence, C1

journal

Privacy issues in social networks and analysis: a comprehensive survey

V Pham, S Yu, K Sood, L Cui

(2018), Vol. 7, pp. 74-84, IET networks, Piscataway, N.J., C1

journal
2017

A parallel random forest algorithm for big data in a spark cloud computing environment

J Chen, K Li, Z Tang, K Bilal, S Yu, C Weng, K Li

(2017), Vol. 28, pp. 919-933, IEEE transactions on parallel and distributed systems, Piscataway, NJ, C1

journal

The structure of communities in scale-free networks

J Jiang, S Wen, S Yu, Y Xiang, W Zhou, H Hassan

(2017), Vol. 29, pp. 1-16, Concurrency and computation: practice and experience, Chichester, Eng., C1

journal

Social influence modeling using information theory in mobile social networks

S Peng, A Yang, L Cao, S Yu, D Xie

(2017), Vol. 379, pp. 146-159, Information sciences, Amsterdam, The Netherlands, C1

journal

Identifying propagation sources in networks: state-of-the-art and comparative studies

J Jiang, S Wen, S Yu, Y Xiang, W Zhou

(2017), Vol. 19, pp. 465-481, IEEE communications surveys & tutorials, Piscataway, N.J., C1

journal

An evolutionary approach for short-term traffic flow forecasting service in intelligent transportation system

F Fei, S Li, W Dou, S Yu

(2017), Vol. 10135, pp. 477-486, SmartCom 2016 : Proceedings of the 1st International Conference on Smart Computing and Communication, Shenzhen, China, E1

conference

Online multi-objective optimization for live video forwarding across video data centers

W Liu, Y Gao, H Ma, S Yu, J Nie

(2017), Vol. 48, pp. 502-513, Journal of visual communication and image representation, Maryland Heights, Mo., C1

journal

Bike-sharing system: a big-data perspective

Z Jia, G Xie, J Gao, S Yu

(2017), Vol. 10135, pp. 548-557, SmartCom 2016 : Proceedings of the 1st International Conference on Smart Computing and Communication 2016, Shenzhen, China, E1

conference

Modeling and performance analysis for multimedia data flows scheduling in software defined networks

J Huang, L Xu, Q Duan, C Xing, J Luo, S Yu

(2017), Vol. 83, pp. 89-100, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

A dynamic pricing method for carpooling service based on coalitional game analysis

S Li, F Fei, D Ruihan, S Yu, W Dou

(2017), pp. 78-85, HPCC/SmartCity/DSS 2016 : Proceedings of the joint 18th IEEE International Conference on High Performance Computing and Communications, 14th IEEE International Conference on Smart City and 2nd IEEE International Conference on Data Science and Systems, Sydney, New South Wales, E1

conference

Networking for big data: a survey

S Yu, M Liu, W Dou, X Liu, S Zhou

(2017), Vol. 19, pp. 531-549, IEEE communications surveys and tutorials, Piscataway, N.J., C1

journal

Fog computing and its applications in 5G

L Gao, T Luan, B Liu, W Zhou, S Yu

(2017), pp. 571-593, 5G mobile communications, [Cham], Switzerland, B1

chapter

FogRoute: DTN-based data dissemination model in fog computing

L Gao, T Luan, S Yu, W Zhou, B Liu

(2017), Vol. 4, pp. 225-235, IEEE internet of things journal, Piscataway, N.J., C1

journal

Are current resources in SDN allocated to maximum performance and minimize costs and maintaining QoS problems?

K Sood, S Yu, Y Xiang

(2017), pp. 1-6, ACSW 2017 : Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Victoria, E1

conference

A scalable and smart hierarchical wireless communication architecture based on network/user separation

H Zhang, P Dong, S Yu, J Song

(2017), Vol. 24, pp. 18-24, IEEE wireless communications, Piscataway, N.J., C1

journal

How to shutdown a cloud: a DDoS attack in a private infrastructure-as-a-service cloud

M Liu, W Dou, S Yu

(2017), Vol. 10, pp. 1-14, International journal of autonomous and adaptive communications systems, Olney, Eng., C1

journal

A novel multipath-transmission supported software defined wireless network architecture

C Xu, W Jin, G Zhao, H Tianfield, S Yu, Y Qu

(2017), Vol. 5, pp. 2111-2125, IEEE access, Piscataway, United States, C1

journal

Big data set privacy preserving through sensitive attribute-based grouping

Y Qu, S Yu, L Gao, J Niu

(2017), pp. 4887-4892, ICC 2017 : Proceedings of the 2017 IEEE International Conference on Communications, Paris, France, E1-1

conference

Studying the global spreading influence and local connections of users in online social networks

J Jiang, Y Qu, S Yu, W Zhou, W Wu

(2017), pp. 431-435, CIT 2016 : Proceedings of the 16th IEEE International Conference on Computer and Information Technology, Nadi, Fiji, E1

conference

Local fast reroute with flow aggregation in software defined networks

X Zhang, Z Cheng, R Lin, L He, S Yu, H Luo

(2017), Vol. 21, pp. 785-788, IEEE communications letters, Piscataway, United States, C1

journal

A sleeping and offloading optimization scheme for energy-efficient WLANs

C Xu, Z Han, G Zhao, S Yu

(2017), Vol. 21, pp. 877-880, IEEE communications letters, Piscataway, United States, C1

journal

A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion

S Shen, H Ma, E Fan, K Hu, S Yu, J Liu, Q Cao

(2017), Vol. 91, pp. 26-35, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Impairment- and splitting-aware cloud-ready multicast provisioning in elastic optical networks

Z Zhu, X Liu, Y Wang, W Lu, L Gong, S Yu, N Ansari

(2017), Vol. 25, pp. 1220-1234, IEEE/ACM transactions on networking, Piscataway, N.J., C1

journal

Network traffic prediction based on deep belief network in wireless mesh backbone networks

L Nie, D Jiang, S Yu, H Song

(2017), pp. 1-5, WCNC 2017 : Proceedings of the IEEE Wireless Communications and Networking Conference, San Francisco, California, E1

conference

HostWatcher: protecting hosts in cloud data centers through software-defined networking

B Yuan, D Zou, H Jin, S Yu, L Yang

(2017), pp. 1-9, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Resource allocation in space multiaccess systems

J Du, C Jiang, J Wang, Y Ren, S Yu, Z Han

(2017), Vol. 53, pp. 598-618, IEEE transactions on aerospace and electronic systems, Piscataway, N.J., C1

journal

Scoring users' privacy disclosure across multiple online social networks

E Aghasian, S Garg, L Gao, S Yu, J Montgomery

(2017), Vol. 5, pp. 13118-13130, IEEE access, Piscataway, N.J., C1

journal

Enhancing crowd collaborations for software defined vehicular networks

W Quan, Y Liu, H Zhang, S Yu

(2017), Vol. 55, pp. 80-86, IEEE communications magazine, Piscataway, N.J., C1

journal

A virtual machine scheduling method for trade-offs between energy and performance in cloud environment

X Xu, W Wang, T Wu, W Dou, S Yu

(2017), pp. 246-251, CBD 2016 : Proceedings of the 2016 International Conference on Advanced Cloud and Big Data, Chengdu, China, E1

conference

An immunization framework for social networks through big data based influence modeling

S Peng, G Wang, Y Zhou, C Wan, C Wang, S Yu

(2017), pp. 1-13, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal

Locator/identifier split networking: a promising future internet architecture

B Feng, H Zhang, H Zhou, S Yu

(2017), pp. 1-22, IEEE communications surveys and tutorials, Piscataway, N.J., C1

journal

SERvICE: a software defined framework for integrated space-terrestrial satellite communication

T Li, H Zhou, H Luo, S Yu

(2017), pp. 1-14, IEEE transactions on mobile computing, Piscataway, N.J., C1

journal

A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems

X Xu, X Zhang, M Khan, W Dou, S Xue, S Yu

(2017), pp. 1-11, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Mobile live video streaming optimization via crowdsourcing brokerage

T Wu, W Dou, Q Ni, S Yu, G Chen

(2017), Vol. 19, pp. 2267-2281, IEEE transactions on multimedia, Piscataway, N.J., C1

journal

Improving SDN scalability with protocol-oblivious source routing: a system-level study

S Li, K Han, N Ansari, Q Bao, D Hu, J Liu, S Yu, Z Zhu

(2017), pp. 1-13, IEEE transactions on network and service management, Piscataway, N.J., C1

journal

Tuna: an efficient and practical scheme for wireless access point in 5G networks virtualization

X Wang, C Xu, G Zhao, S Yu

(2017), pp. 1-4, IEEE communications letters, Piscataway, N.J., C1

journal

Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data

H Li, Y Yang, Y Dai, J Bai, S Yu, Y Xiang

(2017), IEEE transactions on cloud computing, Piscataway, N.J., C1

journal

Congestion-aware local reroute for fast failure recovery in software-defined networks

Z Cheng, X Zhang, Y Li, S Yu, R Lin, L He

(2017), Vol. 9, pp. 934-944, Journal of optical communications and networking, Washington, D.C., C1

journal

Amplified locality-sensitive hashing for privacy-preserving distributed service recommendation

L Qi, W Dou, X Zhang, S Yu

(2017), Vol. 10656 LNCS, pp. 280-297, SpaCCS 2017 : Proceedings of the 10th Security, Privacy, and Anonymity in Computation, Communication, and Storage International Conference, Guangzhou, China, E1

conference

HetNet: a flexible architecture for heterogeneous satellite-terrestrial networks

B Feng, H Zhou, H Zhang, G Li, H Li, S Yu, H Chao

(2017), Vol. 31, pp. 86-92, IEEE network, Piscataway, N.J., C1

journal

Enhancing vehicular communication using 5G-enabled smart collaborative networking

P Dong, T Zheng, S Yu, H Zhang, X Yan

(2017), Vol. 24, pp. 72-79, IEEE wireless communications, Piscataway, N.J., C1

journal

Distance-based location privacy protection in social networks

M Nosouhi, Y Qu, S Yu, Y Xiang, D Manuel

(2017), pp. 396-401, ITNAC 2017: Proceedings of the 27th International Telecommunication Networks and Applications Conference, Melbourne, Australia, E1

conference
2016

A scalable and automatic mechanism for resource allocation in self-organizing cloud

X Wu, M Liu, W Dou, L Gao, S Yu

(2016), Vol. 9, pp. 28-41, Peer-to-peer networking and applications, Berlin, Germany, C1

journal

A feasible IP traceback framework through dynamic deterministic packet marking

S Yu, W Zhou, S Guo, M Guo

(2016), Vol. 65, pp. 1418-1427, IEEE transactions on computers, Piscataway, N.J., C1

journal

Reliability evaluation for clustered WSNs under malware propagation

S Shen, L Huang, J Liu, A Champion, S Yu, Q Cao

(2016), Vol. 16, pp. 1-16, Sensors, Basel, Switzerland, C1

journal

FUIR: Fusing user and item information to deal with data sparsity by using side information in recommendation systems

J Niu, L Wang, X Liu, S Yu

(2016), Vol. 70, pp. 41-50, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Big data storage security

M Wen, S Yu, J Li, H Li, K Lu

(2016), pp. 237-255, Big data concepts, theories, and applications, Berlin, Germany, B1

chapter

An energy-aware virtual machine scheduling method for service QoS enhancement in clouds over big data

W Dou, X Xu, S Meng, X Zhang, C Hu, S Yu, J Yang

(2016), Concurrency and computation: practice and experience, Chichester, Eng., C1

journal

Cost optimal resource provisioning for live video forwarding across video data centers

Y Gao, Ma, Liu, S Yu

(2016), Vol. 9784, pp. 27-38, Big data computing and communications: second international conference, BigCom 2016, Shenyang, China, July 29-31, 2016. Proceedings, Cham, Switzerland, B1

chapter

Big privacy: challenges and opportunities of privacy study in the age of big data

S Yu

(2016), Vol. 4, pp. 2751-2763, IEEE access, Piscataway, N.J., C1

journal

Software-defined wireless networking opportunities and challenges for internet-of-things: a review

K Sood, S Yu, Y Xiang

(2016), Vol. 3, pp. 453-463, IEEE internet of things journal, Piscataway, N.J., C1

journal

SAT-GRD: An ID/Loc split network architecture interconnecting satellite and ground networks

B Feng, H Zhou, G Li, H Li, S Yu

(2016), pp. 1-6, ICC 2016 : Proceedings of the 2016 IEEE International Conference on Communications, Kuala Lumpur, Malaysia, E1

conference

Time cumulative complexity modeling and analysis for space-based networks

J Du, C Jiang, S Yu, Y Ren

(2016), pp. 1-6, ICC 2016 : Proceedings of the 2016 IEEE International Conference on Communications, Kuala Lumpur, Malaysia, E1

conference

Information-agnostic coflow scheduling with optimal demotion thresholds

Y Gao, H Yu, S Luo, S Yu

(2016), pp. 1-6, ICC 2016 : Proceedings of the 2016 IEEE International Conference on Communications, Kuala Lumpur, Malaysia, E1

conference

Complex network theoretical analysis on information dissemination over vehicular networks

J Wang, C Jiang, L Gao, S Yu, Z Han, Y Ren

(2016), pp. 1-6, ICC 2016. Preceedings of the IEEE International Conference on Communications, Kuala Lumpur, Malaysia, E1

conference

Interference-Aware Coordinated Power Allocation in Autonomous Wi-Fi Environment

Y Zhang, C Jiang, Z Han, S Yu, J Yuan

(2016), Vol. 4, pp. 3489-3500, IEEE Access: Green Communications and Networking for 5G Wireless, Piscataway, N. J., C1

journal

A game-theoretic resource allocation approach for intercell device-to-device communications in cellular networks

J Huang, Y Yin, Y Zhao, Q Duan, W Wang, S Yu

(2016), Vol. 4, pp. 475-486, IEEE transactions on emerging topics in computing, Piscataway, N.J., C1

journal

Performance analysis of software-defined network switch using M/Geo/1 model

K Sood, S Yu, Y Xiang

(2016), Vol. 20, pp. 2522-2525, IEEE communications letters, Piscataway, N.J., C1

journal

Towards practical and near-optimal coflow scheduling for data center networks

S Luo, H Yu, Y Zhao, S Wang, S Yu, L Li

(2016), Vol. 27, pp. 3366-3380, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

Traffic matrix prediction and estimation based on deep learning in large-scale IP backbone networks

L Nie, D Jiang, L Guo, S Yu

(2016), Vol. 76, pp. 16-22, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Control layer resource management in SDN-IoT networks using multi-objective constraint

K Sood, S Yu, Y Xiang, S Peng

(2016), pp. 71-76, ICIEA 2016: Proceedings of the IEEE 11th Conference on Industrial Electronics and Applications, Hefei, China, E1

conference

Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system

D Zeng, L Gu, S Guo, Z Cheng, S Yu

(2016), Vol. 65, pp. 3702-3712, IEEE transactions on computers, Piscataway, N.J., C1

journal

DDoS attacks on data plane of software-defined network: are they possible?

X Wu, M Liu, W Dou, S Yu

(2016), Vol. 9, pp. 5444-5459, Security and communication networks, Chichester, Eng., C1

journal

Link state prediction-based reliable transmission for high-speed railway networks

H Zhang, W Quan, J Song, Z Jiang, S Yu

(2016), Vol. 65, pp. 9617-9629, IEEE Transactions on Vehicular Technology, Piscataway, N.J., C1

journal

A general QoS aware flow-balancing and resource management scheme in distributed software-defined networks

K Sood, S Yu, Y Xiang, H Cheng

(2016), Vol. 4, pp. 7176-7185, IEEE access, Piscataway, N.J., C1

journal

When will you have a new mobile phone? An empirical answer from big data

Q Ma, S Zhang, W Zhou, S Yu, C Wang

(2016), Vol. 4, pp. 10147-10157, IEEE access, Piscataway, N.J., C1

journal

Achieving fast and lightweight SDN updates with segment routing

L Luo, H Yu, S Luo, M Zhang, S Yu

(2016), pp. 1-6, GLOBECOM 2016: Proceedings of the 59th IEEE Global Communications Conference, Washington, D.C., E1-1

conference

Analysis of the spreading influence variations for online social users under attacks

J Jiang, S Wen, S Yu, W Zhou, Y Qian

(2016), pp. 1238-1244, GLOBECOM 2016: Proceedings of the 59th IEEE Global Communications Conference, Washington, D.C., E1-1

conference

A popularity-based cache consistency mechanism for information-centric networking

B Feng, H Zhou, H Zhang, J Jiang, S Yu

(2016), pp. 1-6, GLOBECOM 2016: Proceedings of the 59th IEEE Global Communications Conference, Washington, D.C., E1-1

conference

An adaptive cloudlet placement method for mobile applications over GPS big data

H Xiang, X Xu, H Zheng, S Li, T Wu, W Dou, S Yu

(2016), pp. 1057-1062, GLOBECOM 2016: Proceedings of the 59th IEEE Global Communications Conference, Washington, D.C., E1-1

conference

QoS correlation-aware service composition for unified network-cloud service provisioning

J Huang, S Li, Q Duan, R Yu, S Yu

(2016), pp. 4787-4792, GLOBECOM 2016: Proceedings of the 59th IEEE Global Communications Conference, Washington, D.C., E1-1

conference

Efficient and low-delay task scheduling for big data clusters in a theoretical perspective

Y Gao, H Yu, S Luo, S Yu

(2016), pp. 2242-2247, GLOBECOM 2016: Proceedings of the 59th IEEE Global Communications Conference, Washington, D.C., E1-1

conference

Breaking the split incentive hurdle via time-varying monetary rewards

Y Zhan, D Xu, H Yu, S Yu

(2016), pp. 1459-1464, GLOBECOM 2016: Proceedings of the 59th IEEE Global Communications Conference, Washington, D.C., E1-1

conference

OSaaS: online shopping as a service to escalate e-commerce in developing countries

M Khan, X Xu, W Dou, S Yu

(2016), pp. 1402-1409, HPCC/SmartCity/DSS 2016 : Proceedings of the 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems Combined Conference, Sydney, New South Wales, E1-1

conference
2015

A profiling based task scheduling approach for multicore network processors

F Tang, I You, C Tang, S Yu

(2015), Vol. 27, pp. 855-869, Concurrency computation : practice and experience, London, England, C1

journal

Malware propagation in large-scale networks

S Yu, G Gu, A Barnawi, S Guo, I Stojmenovic

(2015), Vol. 27, pp. 170-179, IEEE transactions on knowledge and data engineering, Piscataway, N.J., C1

journal

Fool me if you can: mimicking attacks and anti-attacks in cyberspace

S Yu, S Guo, I Stojmenovic

(2015), Vol. 64, pp. 139-151, IEEE Transactions on Computers, Piscataway, N.J., C1

journal

Learning complementary saliency priors for foreground object segmentation in complex scenes

Y Tian, J Li, S Yu, T Huang

(2015), Vol. 111, pp. 153-170, International journal of computer vision, Berlin, Germany, C1

journal

A decentralized cloud firewall framework with resources provisioning cost optimization

M Liu, W Dou, S Yu, Z Zhang

(2015), Vol. 26, pp. 621-631, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

A distributed gateway selection algorithm for UAV networks

F Luo, C Jiang, J Du, J Yuan, Y Ren, S Yu, M Guizani

(2015), Vol. 3, pp. 22-33, IEEE transactions on emerging topics in computing, Piscataway, N.J., C1

journal

Consensus building in a local context for the AHP-GDM with the individual numerical scale and prioritization method

Y Dong, Z Fan, S Yu

(2015), Vol. 23, pp. 354-368, IEEE transactions on fuzzy systems, Piscataway, N.J., C1

journal

An improved stochastic modeling of opportunistic routing in vehicular CPS

D Zeng, S Guo, A Barnawi, S Yu, I Stojmenovic

(2015), Vol. 64, pp. 1819-1829, IEEE transactions on computers, Piscataway, N.J., C1

journal

K-Center: an approach on the multi-source identification of information diffusion

J Jiang, S Wen, S Yu, Y Xiang, W Zhou

(2015), Vol. 10, pp. 2616-2626, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Optimal VM placement in data centres with architectural and resource constraints

D Zeng, S Guo, H Huang, S Yu, V Leung

(2015), Vol. 8, pp. 392-406, International journal of autonomous and adaptive communications systems, Olney, Eng., C1

journal

Modeling malicious activities in cyber space

S Yu, G Wang, W Zhou

(2015), Vol. 29, pp. 83-87, IEEE network, Piscataway, N.J., C1

journal

Big data sensing and service: a tutorial

J Gao, L Lei, S Yu

(2015), pp. 79-88, BigDataService 2015: Proceedings of the 1st IEEE International Conference on Big Data Computing Service and Applications, San Francisco, California, E1

conference

Dynamic access point association using software defined networking

K Sood, S Liu, S Yu, Y Xiang

(2015), pp. 226-231, ITNAC 2015: Proceedings of the 25th International Telecommunication Networks and Applications Conference, Sydney, New South Wales, E1

conference

SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors

Y Zhang, C Xu, S Yu, H Li, X Zhang

(2015), Vol. 2, pp. 159-170, IEEE transactions on computational social systems, Piscataway, N.J., C1

journal

Stability analysis and resource allocation for space-based multi-access systems

J Du, C Jiang, J Wang, S Yu, Y Ren

(2015), pp. 1-6, GLOBECOM 2015: Proceedings of the IEEE Global Communications Conference, San Diego, California, E1

conference

Enabling efficient and secure outsourcing of large matrix multiplications

K Jia, H Li, D Liu, S Yu

(2015), pp. 1-6, GLOBECOM 2015: Proceedings of the IEEE Global Communications Conference, San Diego, California, E1

conference

VGraph: graph virtualization towards big data

M Khan, M Liu, W Dou, S Yu

(2015), pp. 153-158, CBD 2015: Proceedings of the 2015 3rd International Conference on Advanced Cloud and Big Data, Yangzhou, Jiangsu, China, E1

conference

Identifying diffusion sources in large networks: a community structure based approach

J Jiang, A Zhou, K Majbouri Yazdi, S Wen, S Yu, Y Xiang

(2015), Vol. 1, pp. 302-309, TrustCom 2015: Proceedings of the IEEE Trust, Security and Privacy in Computing and Communications 2015 International Conference, Helsinki, Finland, E1

conference

An energy-aware QoS enhanced method for service computing across clouds and data centers

W Dou, X Xu, S Meng, S Yu

(2015), pp. 80-87, CBD 2015: Proceedings of the Advanced Cloud and Big Data 2015 International Conference, Yangzhou, China, E1

conference

Delay tolerant networks

L Gao, S Yu, H Luan, W Zhou

(2015), Berlin, Germany, A1

book

Graph theory based QoE-driven cooperation stimulation for content dissemination in device-To-device communication

A Zhang, J Chen, L Zhou, S Yu

(2015), Vol. 4, pp. 556-567, IEEE transactions on emerging topics in computing, Piscataway, N.J., C1

journal

Personalized search over encrypted data with efficient and secure updates in mobile clouds

H Li, D Liu, Y Dai, T Luan, S Yu

(2015), Vol. PP, pp. 1-12, IEEE transactions on emerging topics in computing, Piscataway, N.J., C1

journal

Converged network-cloud service composition with end-To-end performance guarantee

J Huang, Q Duan, S Guo, Y Yan, S Yu

(2015), Vol. PP, pp. 1-15, IEEE transactions on cloud computing, Piscataway, N.J., C1

journal
2014

Distributed denial of service (DDoS) detection by traffic pattern analysis

T Thapngam, S Yu, W Zhou, S Makki

(2014), Vol. 7, pp. 346-358, Peer-to-peer networking and applications, New York, N.Y., C1

journal

On the multicast lifetime of WANETs with multibeam antennas: Formulation, algorithms, and analysis

S Guo, M Guo, V Leung, S Yu, Y Xiang

(2014), Vol. 63, pp. 1988-2001, IEEE Transactions on Computers, NJ, United States, C1

journal

Are the popular users always important for information dissemination in online social networks?

S Wen, J Jiang, Y Xiang, S Yu, W Zhou

(2014), Vol. 28, pp. 64-67, IEEE Network, Piscataway, N. J, C1

journal

Network dynamics of mobile social networks

G Zhao, D Li, C Xu, H Tang, S Yu

(2014), pp. 2478-2483, ICC 2014 : Proceedings of the 2014 IEEE International Conference on Communications, Sydney, NSW, E1

conference

Can we beat DDoS attacks in clouds?

S Yu, Y Tian, S Guo, D Wu

(2014), Vol. 25, pp. 2245-2254, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

Smartphone malware and its propagation modeling : A survey

S Peng, S Yu, A Yang

(2014), Vol. 16, pp. 925-941, IEEE Communications Surveys and Tutorials, Piscataway, N. J, C1

journal

Propagation model of smartphone worms based on semi-Markov process and social relationship graph

S Peng, M Wu, G Wang, S Yu

(2014), Vol. 44, pp. 92-103, Computers and Security, Oxon, United Kingdom, C1

journal

A clusterized firewall framework for cloud computing

M Liu, W Dou, S Yu, Z Zhang

(2014), pp. 3788-3793, IEEE ICC 2014 - Proceedings of the Communication and Information Systems Security Symposium, Sydney, NSW, E1

conference

Byzantine-resilient secure software-defined networks with multiple controllers

H Li, P Li, S Guo, S Yu

(2014), pp. 695-700, ICC 2014 : Proceedings of the 2014 IEEE International Conference on Communications, Sydney, NSW, E1

conference

Detection on application layer DDoS using random walk model

C Xu, G Zhao, G Xie, S Yu

(2014), pp. 707-712, ICC 2014 : Proceedings of the 2014 IEEE International Conference on Communications, Sydney, NSW, E1

conference

Type-aware task placement in geo-distributed data centers with low OPEX using data center resizing

L Gu, D Zeng, S Guo, S Yu

(2014), pp. 211-215, ICNC 2014 : Proceedings of the 2014 International Conference on Computing, Networking and Communications, Honolulu, Hawaii, E1

conference

To shut them up or to clarify: restraining the spread of rumors in online social networks

S Wen, J Jiang, Y Xiang, S Yu, W Zhou, W Jia

(2014), Vol. 25, pp. 3306-3316, IEEE transactions on parallel and distributed systems, Piscataway, NJ, C1

journal

An effective and feasible traceback scheme in mobile internet environment

S Yu, K Sood, Y Xiang

(2014), Vol. 18, pp. 1911-1914, IEEE Communications Letters, NJ, United States, C1

journal

Reliable multicast with pipelined network coding using opportunistic feeding and routing

P Li, S Guo, S Yu, A Vasilakos

(2014), Vol. 25, pp. 3264-3273, IEEE Transactions on Parallel and Distributed Systems, Piscataway, United States, C1

journal

Containing smartphone worm propagation with an influence maximization algorithm

S Peng, M Wu, G Wang, S Yu

(2014), Vol. 74, pp. 103-113, Computer Networks, Amsterdam, Netherlands, C1

journal
2013

Introduction

D Kingsbury

(2013), pp. 1-12, Critical reflections on development, London, England, B1

chapter

A survey and tutorial of wireless relay network protocols based on network coding

A Mohammed, B Dai, B Huang, M Azhar, G Xu, P Qin, S Yu

(2013), Vol. 36, pp. 593-610, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

A novel model for user clicks identification based on hidden semi-Markov

C Xu, C Du, G Zhao, S Yu

(2013), Vol. 36, pp. 791-798, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones

S Peng, G Wang, S Yu

(2013), Vol. 79, pp. 586-595, Journal of computer and system sciences, Amsterdam, The Netherlands, C1

journal

Numerical scales generated individually for analytic hierarchy process

Y Dong, W Hong, Y Xu, S Yu

(2013), Vol. 229, pp. 654-662, European journal of operational research, Amsterdam, The Netherlands, C1

journal

Secure RFID tag ownership transfer based on quadratic residues

R Doss, W Zhou, S Yu

(2013), Vol. 8, pp. 390-401, IEEE Transactions on information forensics and security, Piscataway, N.J., C1

journal

Stochastic modeling and analysis of opportunistic computing in intermittent mobile cloud

D Zeng, S Guo, I Stojmenovic, S Yu

(2013), pp. 1902-1907, ICIEA 2013 : Proceedings of the 8th IEEE Conference on Industrial Electronics and Applications, Melbourne, Victoria, E1

conference

Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration

Y Xie, J Hu, Y Xiang, S Yu, S Tang, Y Wang

(2013), Vol. 24, pp. 1807-1817, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

A hierarchical PCA-based anomaly detection model

B Tian, K Merrick, S Yu, J Hu

(2013), pp. 621-625, ICNC 2013 : International Conference on Computing, Networking and Communications, San Diego, California, E1

conference

A general cloud firewall framework with dynamic resource allocation

S Yu, R Doss, W Zhou, S Guo

(2013), pp. 1941-1945, Proceedings of the IEEE International Conference on Communications; ICC 2013, Budapest, Hungary, E1

conference

Multi-dimensional routing protocol in human associated delay-tolerant networks

L Gao, M Li, A Bonti, W Zhou, S Yu

(2013), Vol. 12, pp. 2132-2144, IEEE transactions on mobile computing, Piscataway, N.J., C1

journal

Modeling malware propagation in smartphone social networks

S Peng, G Wang, S Yu

(2013), pp. 196-201, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Victoria, E1

conference

DDoS attack detection at local area networks using information theoretical metrics

Y Tao, S Yu

(2013), pp. 233-240, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Victoria, E1

conference

Linguistic computational model based on 2-tuples and intervals

Y Dong, G Zhang, W Hong, S Yu

(2013), Vol. 21, pp. 1006-1018, IEEE Transactions on fuzzy systems, Piscataway, NJ, C1

journal

A bio-inspired jamming detection and restoration for WMNs : in view of adaptive immunology

Q Liu, J Yin, S Yu

(2013), pp. 243-257, Cyberspace safety and security, Cham, Switzerland, B1

chapter

A dynamical deterministic packet marking scheme for DDoS traceback

S Yu, W Zhou, S Guo, M Guo

(2013), pp. 729-734, IEEE GLOBECOM 2013 : The power of global communications : Proceedings of the IEEE Global Communications 2013 conference, exhibition and industry forum, Atlanta, Georgia, E1-1

conference

Mining mechanism of top-k influential nodes based on voting algorithm in mobile social networks

S Peng, G Wang, S Yu

(2013), pp. 2194-2199, Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013, Zhangjiajie, China, E1-1

conference
2012

Attacking anonymous web browsing at local area networks through browsing dynamics

S Yu, W Zhou, W Jia, J Hu

(2012), Vol. 55, pp. 410-421, Computer journal, Oxford, England, C1

journal

On the stress function-based OWA determination method with optimization criteria

X Liu, S Yu

(2012), Vol. 42, pp. 246-257, IEEE transactions on systems, man, and cybernetics part b : cybernetics, Piscataway, N. J., C1

journal

An efficient deadlock prevention approach for service oriented transaction processing

F Tang, I You, S Yu, C Wang, M Guo, W Liu

(2012), Vol. 63, pp. 458-468, Computers and mathematics with applications, Oxford, Eng., C1

journal

Least square completion and inconsistency repair methods for additively consistent fuzzy preference relations

X Liu, Y Pan, Y Xu, S Yu

(2012), Vol. 198, pp. 1-19, Fuzzy sets and systems, Amsterdam, Netherlands, C1

journal

A dual-channel time-spread echo method for audio watermarking

Y Xiang, I Natgunanathan, D Peng, W Zhou, S Yu

(2012), Vol. 7, pp. 383-392, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Reliable aggregation on network traffic for web based knowledge discovery

S Yu, S James, T Yonghong, W Dou

(2012), pp. 149-159, Reliable knowledge discovery, New York, NY, B1

chapter

Discriminating DDoS attacks from flash crowds using flow correlation coefficient

S Yu, W Zhou, W Jia, S Guo, Y Xiang, F Tang

(2012), Vol. 23, pp. 1073-1080, IEEE transactions on parallel and distributed systems, Piscataway, N. J., C1

journal

Predicted packet padding for anonymous web browsing against traffic analysis attacks

S Yu, G Zhao, W Dou, S James

(2012), Vol. 7, pp. 1381-1393, IEEE transactions on information forensics and security, Piscataway, N. J., C1

journal

M-Dimension : multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models

L Gao, M Li, A Bonti, W Zhou, S Yu

(2012), Vol. 35, pp. 1285-1296, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

An interior point trust region method for nonnegative matrix factorization

J Jiang, H Zhanga, S Yu

(2012), Vol. 97, pp. 309-316, Neurocomputing, Amsterdam, The Netherlands, C1

journal

A minimum disclosure approach to authentication and privacy in RFID systems

R Doss, W Zhou, S Sundaresan, S Yu, L Gao

(2012), Vol. 56, pp. 3401-3416, Computer networks, Amsterdam, The Netherlands, C1

journal

Can we beat legitimate cyber behavior mimicking attacks from botnets?

S Yu, S Guo, I Stojmenovic

(2012), pp. 2851-2855, INFOCOM 2012 : Proceedings of the IEEE Computer Communications 2012 Conference, Orlando, Florida, E1

conference

CodePipe : an opportunistic feeding and routing protocol for reliable multicast with pipelined network coding

P Li, S Guo, S Yu, A Vasilakos

(2012), pp. 100-108, INFOCOM 2012 : Proceedings of the 31st IEEE INFOCOM conference, Orlando, Fla., E1

conference

DDoS discrimination by linear discriminant analysis (LDA)

T Thapngam, S Yu, W Zhou

(2012), pp. 532-536, ICNC 2012 : Proceedings of the 2012 International Conference on Computing, Networking and Communications, Maui, Hawaii, E1

conference

Why it is hard to fight against cyber criminals?

S Yu, W Zhou, W Dou, S Makki

(2012), pp. 537-541, Proceedings of the 32nd IEEE International Conference on Distributed Computing Systems Workshops : ICDCSW 2012, Macau, China, E1

conference

Service-oriented wireless sensor networks and an energy-aware mesh routing algorithm

F Tang, C Tang, M Guo, S Guo, S Yu

(2012), Vol. 15, pp. 21-46, Ad hoc & sensor wireless networks, Philadelphia, PA, C1

journal

AMDD : Exploring entropy based anonymous multi-dimensional data detection for network optimization in human associated DTNs

L Gao, M Li, T Zhu, A Bonti, W Zhou, S Yu

(2012), pp. 1245-1250, TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, England, E1

conference

Securing recommendations in grouped P2P e-commerce trust model

F Musau, G Wang, S Yu, M Abdullahi

(2012), Vol. 9, pp. 407-420, IEEE transactions on network and service management, Piscataway, N.J., C1

journal

Grid transaction management and an efficient development kit

F Tang, I You, S Yu, H Li, C Wang

(2012), Vol. 27, pp. 345-353, International journal of computer systems science and engineering, Kibworth Beauchamp, England, C1

journal
2011

Traceback of DDoS attacks using entropy variations

S Yu, W Zhou, R Doss, W Jia

(2011), Vol. 22, pp. 412-425, IEEE transactions on parallel and distributed systems, United States, C1

journal

Selecting the individual numerical scale and prioritization method in the analytic hierarchy process : a 2-tuple fuzzy linguistic approach

Y Dong, W Hong, Y Xu, S Yu

(2011), Vol. 19, pp. 13-25, IEEE transactions on fuzzy systems, Piscataway, N. J., C1

journal

CM-based blind equalization of time-varying SIMO-FIR channel with single pulsation estimation

D Peng, Y Xiang, Z Yi, S Yu

(2011), Vol. 60, pp. 2410-2415, IEEE transactions on vehicular technology, Piscataway, N. J, C1

journal

Orthogonal feedback scheme for network coding

J Yang, B Dai, B Huang, S Yu

(2011), Vol. 34, pp. 1623-1633, Journal of Network and Computer Applications, United Kingdom, C1

journal

Survey of network coding-aware routing protocols in wireless networks

M Iqbal, B Dai, B Huang, A Hassan, S Yu

(2011), Vol. 34, pp. 1956-1970, Journal of network and computer applications, London, C1

journal

Discriminating DDoS attack traffic from flash crowd through packet arrival patterns

T Thapngam, S Yu, W Zhou, G Beliakov

(2011), pp. 952-957, INFOCOM WKSHPS 2011 : IEEE Conference on Computer Communications Workshops, Shanghai, China, E1

conference

Non-monotone averaging aggregation

G Beliakov, S Yu, D Paternain

(2011), pp. 2905-2908, FUZZ 2011 : IEEE International Conference on Fuzzy Systems, Taipei, Taiwan, E1

conference

On the maximum throughput of two-hop wireless network coding

D Zeng, S Guo, H Jin, S Yu

(2011), pp. 416-421, WCNC 2011 : IEEE Wireless Communications and Networking Conference, Cancun, Mexico, E1

conference

A novel mutual authentication scheme with minimum disclosure for rfid systems

R Doss, W Zhou, S Yu, L Gao

(2011), pp. 544-549, ISSNIP 2011 : Proceedings of the 7th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Adelaide, S. Aust., E1

conference

A survey on latest botnet attack and defense

L Zhang, S Yu, D Wu, P Watters

(2011), pp. 53-60, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference

Browsing behavior mimicking attacks on popular web sites for large botnets

S Yu, G Zhao, S Guo, Y Xiang, A Vasilakos

(2011), pp. 947-951, INFOCOM WKSHPS 2011 : IEEE Conference on Computer Communications Workshops, Shanghai, China, E1

conference

A novel monotonic fixed-point algorithm for l1-regularized least square vector and matrix problem

J Jiang, H Zhang, S Yu

(2011), pp. 476-483, High performance networking, computing, and communication systems : second international conference, ICHCC 2011, Singapore, May 5-6, 2011, selected papers, Berlin, Germany, B1

chapter

Utilizing intelligent middleware for reconfiguration of applications on android

S Makki, N Srirangam, V Aiswarya, S Yu

(2011), pp. 81-89, ICHIT 2011 : Convergence and hybrid information technology : 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011, proceedings, Daejeon, Korea, E1

conference

Multicast lifetime maximization using network coding in lossy wireless ad-hoc networks

C Hsu, P Li, S Guo, S Yu, Z Qian

(2011), pp. 95-99, IEEE/IFIP 2011 : Proceedings of the IEEE/IFIP 9th International Conference Embedded and Ubiquitous Computing 2011, Melbourne, Vic., E1

conference

CBF : A packet filtering method for DDoS attack defense in cloud environment

Q Chen, W Lin, W Dou, S Yu

(2011), pp. 427-434, DASC 2011 : Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, Sydney, N.S.W., E1

conference

A shadow-like task migration model based on context semantics for mobile and pervasive environments

F Tang, C Tang, M Guo, S Yu, S Guo

(2011), Vol. 30, pp. 1131-1146, Computing and informatics, Bratislava, Slovakia, C1-1

journal
2010

Anonymous web browsing through predicted pages

S Yu, T Thapngam, H Tse, J Wang

(2010), pp. 1581-1585, IEEE Globecom 2010 : Proceedings of the 53rd Global Communications Conference, Exhibition and Industry Forum, Miami, Fla., E1

conference

Efficient web browsing with perfect anonymity using page prefetching

S Yu, T Thapngam, S Wei, W Zhou

(2010), pp. 1-12, ICA3PP 2010 : Algorithms and architectures for parallel processing : Proceedings of the 10th International Conference Algorithms and Architectures for Parallel Processing, Busan, Korea, E1

conference
2009

Improving the qos for information discovery in autonomic wireless sensor networks

R Doss, G Li, V Mak, S Yu, M Chowdhury

(2009), Vol. 5, pp. 334-349, Pervasive and mobile computing, Amsterdam, Netherlands, C1

journal

Effective metric for detecting distributed denial-of-service attacks based on information divergence

K Li, W Zhou, S Yu

(2009), Vol. 3, pp. 1851-1860, IET Communications, Herts, England, C1

journal

Discriminating DDoS flows from flash crowds using information distance

S Yu, T Thapngam, J Liu, S Wei, W Zhou

(2009), pp. 351-356, NSS 2009 : Proceedings of the third International Conference on Network and System Security, Gold Coast, Queensland, E1

conference

Computing the numerical scale of the linguistic term set for the 2-tuple fuzzy linguistic representation model

Y Dong, Y Xu, S Yu

(2009), Vol. 17, pp. 1366-1378, I E E E transactions on fuzzy systems, Piscataway, NJ, C1

journal

Linguistic multiperson decision making based on the use of multiple preference relations

Y Dong, Y Xu, S Yu

(2009), Vol. 160, pp. 603-623, Fuzzy sets and systems, Amsterdam, Netherlands, C1

journal
2008

Information theory based detection against network behavior mimicking DDoS attacks

S Yu, W Zhou, R Doss

(2008), Vol. 12, pp. 319-321, IEEE communications letters, USA, C1

journal

Source-based filtering scheme against DDOS attacks

F Yi, S Yu, W Zhou, J Hai, A Bonti

(2008), Vol. 1, pp. 9-20, International journal of database theory and application, Korea, C1

journal

The crossroads approach to information discovery in wireless sensor networks

R Doss, G Li, S Yu, V Mak, M Chowdhury

(2008), Vol. 4904, pp. 310-321, Lecture notes in computer science, Berlin, Germany, C1

journal

A transformation model for heterogeneous servers

S Yu, R Doss, T Thapngam, D Qian

(2008), pp. 665-671, HPCC 2008 : Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, Dalian, China, E1

conference

Entropy-based collaborative detection of DDOS attacks on community networks

S Yu, W Zhou

(2008), pp. 566-571, Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications, Hong Kong, E1

conference
2007

Novel data management algorithms in peer-to-peer content distribution networks

K Li, W Zhou, S Yu, P Li

(2007), Vol. 4798, pp. 538-543, Lecture notes in computer science, Berlin, Germany, C1

journal

Massive data delivery in unstructured peer-to-peer networks with network coding

S Yu, Z Li

(2007), pp. 592-597, IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), Melbourne, Vic., E1

conference

A parallel downloading algorithm for redundant networks

K Li, W Zhou, S Yu, B Dai

(2007), pp. 177-182, CIT 2007 : proceedings : 7th IEEE International Conference on Computer and Information Technology : 16-19 October, 2007, Aizu-Wakamatsu City, Fukushima, Japan, Fukushima, Japan, E1

conference

A resource-search and routing algorithm within PCDN autonomy area

K Li, W Zhou, S Yu, Y Zhang

(2007), pp. 509-514, PDCAT 2007 : Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies : 3-6 December, 2007, Adelaide, Australia, Adelaide, Australia, E1

conference

Novel dynamic routing algorithms in autonomous system

K Li, W Zhou, S Yu, R Tian

(2007), pp. 223-228, CIRAS 2007 : proceedings of the Fourth International Conference on Computational Intelligence, Robotics and Autonomous Systems, Massey University, Palmerston North, New Zealand, 28th-30th November, 2007, Palmerston North, New Zealand, E1

conference

An enhanced parallel downloading algorithm for BT

K Li, W Zhou, S Yu

(2007), pp. 1023-1027, PDPTA 2007 : Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2007, Las Vegas, Nevada, USA, June 25-28, 2007, Las Vegas, Nevada, USA, E1

conference
2006

Online algorithm for application layer anycast

S Yu, Z Li, B Liu

(2006), Vol. 138, pp. 340-345, Frontiers in artificial intelligence and applications: advances in intelligent IT: active media technology, Amsterdam, Netherlands, C1

journal

Performance optimization for energy-aware adaptive checkpointing in embedded real-time systems

Z Li, H Chen, S Yu

(2006), Design, automation, and test in Europe : proceedings, Munich, Germany, March 6-10, 2006, Munich, Germany, E1

conference
2005

An efficient reliable architecture for application layer anycast service

S Yu, W Zhou

(2005), Vol. 3719, pp. 376-385, Lecture notes in computer science, Berlin, Germany, C1

journal

A mesh based anycast routing protocol for ad hoc networks

S Yu, W Zhou

(2005), Vol. 3758, pp. 927-932, Lecture notes in computer science, Berlin, Germany, C1

journal

An integration technology of checkpointing for DMR with energy-aware

Z Li, Y Jiang, S Yu

(2005), pp. 323-329, Advances in computational methods in sciences and engineering 2005 : selected papers from the International Conference of Computational Methods in Sciences and Engineering 2005 (ICCMSE 2005), Corinth, Greece, E1

conference
2004

Minicast: a multicast-anycast protocol for message delivery

S Yu, W Zhou, J Rough

(2004), Vol. 3358, pp. 798-803, Lecture notes in computer science, Berlin, Germany, C1

journal

A load balancing algorithm for web based server grids

S Yu, J Casey, W Zhou

(2004), Vol. 3033, pp. 121-128, Lecture notes in computer science, Berlin, Germany, C1

journal

A novel middleware based web database model

S Yu, W Zhou

(2004), pp. 533-536, IEEE/WIC International Conference on Web Intelligence (WI 2004) : Beijing, China, September 20-24, 2004 : proceedings, Beijing, China, E1

conference

Load balance algorithms for anycast

S Yu, W Zhou, J Casey

(2004), pp. 471-480, iiWAS2004 : Sixth International Conference on Information Integration and Web-based Applications Services, 27-29 September 2004, Jakarta, Indonesia, Jakarta, Indonesia, E1

conference
2003

Quality-of-service routing for web-based multimedia servers

S Yu, W Zhou, M Chowdhury

(2003), pp. 1349-1353, Proceedings of the 7th Joint Conference on Information Sciences : September 26 - 30, 2003, Research Triangle Park, North Carolina, USA, Cary, N. C., E1

conference

Improving the performance of the LMS and RLS algorithms for adaptive equalizer

H Ye, W Zhou, S Yu, M Lan

(2003), pp. 457-462, Active media technology : proceedings of the Second International Conference on Active Media Technology, Chongqing, PR China, 29-31 May, 2003, Chongqing, China, E1

conference

An architecture of internet based data processing based on multicast and anycast protocols

S Yu, W Zhou, M Lan, Y Wu

(2003), pp. 104-110, Parallel and distributed computing, applications and technologies : PDCAT'2003 : proceedings : (August 27-29, 2003, Chengdu, China), Chengdu, China, E1

conference

Fault-tolerant servers for anycast communication

S Yu, W Zhou, W Jia

(2003), pp. 1244-1250, PDPTA 2003 : Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, Nevada, USA, E1

conference

Self-adaptive clock synchronisation based on clock precision difference

Y Zhao, W Zhou, E Lanham, S Yu, M Lan

(2003), pp. 181-187, Computer science 2003 : proceedings of the twenty-sixth Australasian Computer Science Conference, Adelaide, South Australia, Australia, E1

conference
2002

A web-DB model on multicast and anycast

S Yu, W Zhou, Y Zhao, M Lan, Y Xiang

(2002), pp. 412-415, Proceedings of the 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, Beijing, China, E1

conference

A co-recommendation algorithm for web searching

M Lan, S Yu, R Bacher, W Zhou

(2002), pp. 479-482, Proceedings of the Fifth International Conference on Algorithms and Architectures for Parallel Processing, Beijing, China, E1

conference

Research on network anycast

S Yu, W Zhou, Y Wu

(2002), pp. 154-161, 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, Beijing, China, E1

conference

An efficient algorithm for application-layering anycasting

S Yu, W Zhou, F Huang, M Lan

(2002), pp. 74-83, DCW 2002 : Distributed communities on the Web : 4th international workshop, DCW 2002, Sydney, Australia, April 3-5, 2002 : revised papers, Sydney, New South Wales, E1

conference

Self-adaptive clock synchronization for computational grid

Y Zhao, W Zhou, J Huang, S Yu, E Lanham

(2002), pp. 932-942, GCC 2002 : Proceedings of the grid and cooperative computing international workshop, Hainan, China, E1

conference
2001

An automatic generation model for web-based database applications

S Yu, C Chen, W Zhou

(2001), pp. 62-66, Parallel and distributed computing and systems : proceedings of the IASTED international conference, August, 21 - 24, 2001, Anaheim, California, USA, Anaheim, California, USA, E1

conference

A reactive architecture for web-based information systems

C Chen, W Zhou, S Yu

(2001), pp. 1028-1034, Proceedings of the International Conference on Internet Computing : IC'2001 : Las Vegas, Nevada, USA, June 25-28, 2001, Las Vegas, Nevada, USA, E1

conference

Funded Projects at Deakin

Australian Competitive Grants

Early Detection and Forecasting of Rumors in Social Media

Prof Wanlei Zhou, Dr Shui Yu

ARC - Discovery Projects

  • 2018: $46,823

Industry and Other Funding

NICTA/Data61 Scholarships - School of IT

Prof John Grundy, Prof John Yearwood, A/Prof Mohamed Abdelrazek, Prof Yong Xiang, Dr Shui Yu

  • 2017: $143,404

Supervisions

Principal Supervisor
2017

Keshav Sood

Thesis entitled: Performance Analysis and Optimization in Software Defined Networks

Doctor of Philosophy (Information Technology), School of Information Technology

Jiaojiao Jiang

Thesis entitled: Rumor Source Identification in Complex Networks

Doctor of Philosophy (Information Technology), School of Information Technology

Associate Supervisor
2012

Yini Wang

Thesis entitled: Modelling and Defence against Propagation of Worms in Networks

Doctor of Philosophy (Information Technology), School of Information Technology

Theerasak Thapngam

Thesis entitled: Improvement of DDoS Attacks Detection and Web Access Anonymity

Doctor of Philosophy (Information Technology), School of Information Technology

2009

Ke Li

Thesis entitled: Reliable Algorithms and Attack Detection Schemes for Network Systems

Doctor of Philosophy (Information Technology), School of Information Technology