Computer network, Computer security, Wireless sensor network, Key distribution in wireless sensor networks and Cluster analysis are his primary areas of study. His Message authentication code study, which is part of a larger body of work in Computer network, is frequently linked to Electronic mail, bridging the gap between disciplines. The concepts of his Computer security study are interwoven with issues in Server and Big data.
Jiguo Yu has included themes like Distributed algorithm, Distributed computing and Residual in his Key distribution in wireless sensor networks study. His work in Distributed computing tackles topics such as Mobile wireless sensor network which are related to areas like Zone Routing Protocol, Link-state routing protocol, Geographic routing, Dynamic Source Routing and Routing protocol. His work focuses on many connections between Cluster analysis and other disciplines, such as Scalability, that overlap with his field of interest in Web service and Collaborative filtering.
His primary scientific interests are in Computer network, Wireless sensor network, Distributed computing, Wireless network and Computer security. He interconnects Wireless and Wireless ad hoc network in the investigation of issues within Computer network. His Wireless sensor network research integrates issues from Key distribution in wireless sensor networks, Approximation algorithm and Cluster analysis.
His Distributed computing study integrates concerns from other disciplines, such as Network topology and Service. His Wireless network research includes themes of Distributed algorithm, Algorithm, Connected dominating set and Cognitive radio. His research in Computer security intersects with topics in Home automation and Server.
His main research concerns Computer network, Computer security, Wireless network, Wireless sensor network and Encryption. His Computer network study incorporates themes from Underlay cognitive radio and Blockchain. In the field of Computer security, his study on Ciphertext, Security token, Anonymity and Access control overlaps with subjects such as Data sharing.
The study incorporates disciplines such as Domain, Scheduling and Rayleigh fading in addition to Wireless network. His work on Data aggregator as part of general Wireless sensor network research is frequently linked to Electronic mail, bridging the gap between disciplines. He interconnects Authentication, Cryptography and Homomorphism in the investigation of issues within Encryption.
Jiguo Yu mainly investigates Overhead, Computer network, Wireless sensor network, Computer security and Encryption. His Overhead research is multidisciplinary, relying on both Data aggregator and Broadcast communication network. His work in the fields of Computer network, such as Service, overlaps with other areas such as Intelligent transportation system.
His biological study spans a wide range of topics, including Data redundancy, Software deployment, Markov chain and Big data. His research in the fields of Access control, Ciphertext and Short signature overlaps with other disciplines such as Enterprise information management and Leakage. Jiguo Yu combines subjects such as Data mining, Identification, Reliability, Cryptography and Probabilistic logic with his study of Encryption.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A cluster-based routing protocol for wireless sensor networks with nonuniform node distribution
Jiguo Yu;Yingying Qi;Guanghui Wang;Xin Gu.
Aeu-international Journal of Electronics and Communications (2012)
A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes
Tianyi Song;Ruinian Li;Bo Mei;Jiguo Yu.
IEEE Internet of Things Journal (2017)
Cost-Efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks
Zaobo He;Zhipeng Cai;Jiguo Yu;Xiaoming Wang.
IEEE Transactions on Vehicular Technology (2017)
Edge Computing Security: State of the Art and Challenges
Yinhao Xiao;Yizhen Jia;Chunchi Liu;Xiuzhen Cheng.
Proceedings of the IEEE (2019)
Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices
Yi Liang;Zhipeng Cai;Jiguo Yu;Qilong Han.
IEEE Network (2018)
Review: Connected dominating sets in wireless ad hoc and sensor networks - A comprehensive survey
Jiguo Yu;Nannan Wang;Guanghui Wang;Dongxiao Yu.
Computer Communications (2013)
Robot manipulator control using neural networks: A survey
Long Jin;Shuai Li;Jiguo Yu;Jinbo He.
Neurocomputing (2018)
Latent-Data Privacy Preserving With Customized Data Utility for Social Network Data
Zaobo He;Zhipeng Cai;Jiguo Yu.
IEEE Transactions on Vehicular Technology (2018)
A Differential-Private Framework for Urban Traffic Flows Estimation via Taxi Companies
Zhipeng Cai;Xu Zheng;Jiguo Yu.
IEEE Transactions on Industrial Informatics (2019)
Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems
Xu Zheng;Zhipeng Cai;Jiguo Yu;Chaokun Wang.
IEEE Internet of Things Journal (2017)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Shandong University
Georgia State University
Hong Kong Polytechnic University
Qufu Normal University
Georgia State University
George Mason University
University of Oulu
Nanjing University
Technical University of Berlin
Simon Fraser University
University of Bristol
International Institute of Information Technology, Hyderabad
Harbin Institute of Technology
Tohoku University
Linköping University
University of California, San Diego
King Abdullah University of Science and Technology
Southern Illinois University Carbondale
Spanish National Research Council
The University of Texas at Austin
University of Maryland, College Park
National Center for Toxicological Research
Yonsei University
Duke University
University of Alberta
Paris 8 University