H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 57 Citations 10,822 408 World Ranking 1968 National Ranking 51

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Artificial intelligence

His primary areas of study are Computer network, Computer security, Distributed computing, Denial-of-service attack and The Internet. His Computer network study combines topics from a wide range of disciplines, such as Wireless and Wireless network. His work deals with themes such as Leverage, Betweenness centrality, Order, Blocking and Focus, which intersect with Computer security.

Shui Yu has included themes like Energy consumption, Quality of service, Workload, Scheduling and Cyber-physical system in his Distributed computing study. In his research, Anomaly detection and Phishing is intimately related to Botnet, which falls under the overarching field of Denial-of-service attack. His research in The Internet intersects with topics in Web page, Crowds and Network security.

His most cited work include:

  • Joint Optimization of Task Scheduling and Image Placement in Fog Computing Supported Software-Defined Embedded System (240 citations)
  • Computing the Numerical Scale of the Linguistic Term Set for the 2-Tuple Fuzzy Linguistic Representation Model (199 citations)
  • A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment (180 citations)

What are the main themes of his work throughout his whole career to date?

Computer network, Distributed computing, Computer security, Cloud computing and Big data are his primary areas of study. His work carried out in the field of Computer network brings together such families of science as The Internet and Denial-of-service attack. The concepts of his Distributed computing study are interwoven with issues in Anycast, Scheduling and Service.

His work in Information privacy and Network security is related to Computer security. His work on Cloud computing security as part of general Cloud computing research is frequently linked to Resource management, bridging the gap between disciplines. His Big data study introduces a deeper knowledge of Data mining.

He most often published in these fields:

  • Computer network (29.45%)
  • Distributed computing (23.72%)
  • Computer security (20.16%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (20.16%)
  • Distributed computing (23.72%)
  • Cloud computing (14.62%)

In recent papers he was focusing on the following fields of study:

Shui Yu spends much of his time researching Computer security, Distributed computing, Cloud computing, Artificial intelligence and Differential privacy. His Computer security study frequently links to related topics such as The Internet. His Distributed computing research is multidisciplinary, incorporating perspectives in Q-learning, Reinforcement learning, Telecommunications network, Server and Integer programming.

The subject of his Server research is within the realm of Computer network. His Cloud computing research includes elements of Information privacy, Data management, Distributed database and Big data. His work in the fields of Deep learning, Intrusion detection system and Sentiment analysis overlaps with other areas such as Spatial analysis.

Between 2019 and 2021, his most popular works were:

  • Decentralized Privacy Using Blockchain-Enabled Federated Learning in Fog Computing (40 citations)
  • Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data (40 citations)
  • Security and privacy in 6G networks: New areas and new challenges (18 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Artificial intelligence
  • The Internet

His primary scientific interests are in Computer security, Cloud computing, Distributed computing, Key and Big data. Shui Yu has researched Computer security in several fields, including Data modeling and Differential privacy. His Cloud computing study incorporates themes from Distributed database, Software engineering, Service and Linear network coding.

The various areas that Shui Yu examines in his Distributed computing study include Markov decision process, Edge computing, Server, Integer programming and Reinforcement learning. His Client-side encryption study is concerned with the larger field of Computer network. His work in Computer network addresses issues such as Data set, which are connected to fields such as Leverage.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Joint Optimization of Task Scheduling and Image Placement in Fog Computing Supported Software-Defined Embedded System

Deze Zeng;Lin Gu;Song Guo;Zixue Cheng.
IEEE Transactions on Computers (2016)

305 Citations

Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient

Shui Yu;Wanlei Zhou;Weijia Jia;Song Guo.
IEEE Transactions on Parallel and Distributed Systems (2012)

267 Citations

A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment

Jianguo Chen;Kenli Li;Zhuo Tang;Kashif Bilal.
IEEE Transactions on Parallel and Distributed Systems (2017)

262 Citations

Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks

Shui Yu;Guofeng Zhao;Wanchun Dou;S. James.
IEEE Transactions on Information Forensics and Security (2012)

253 Citations

Computing the Numerical Scale of the Linguistic Term Set for the 2-Tuple Fuzzy Linguistic Representation Model

Yucheng Dong;Yinfeng Xu;Shui Yu.
IEEE Transactions on Fuzzy Systems (2009)

234 Citations

Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data

Shui Yu.
IEEE Access (2016)

232 Citations

Traceback of DDoS Attacks Using Entropy Variations

Shui Yu;Wanlei Zhou;R Doss;Weijia Jia.
IEEE Transactions on Parallel and Distributed Systems (2011)

223 Citations

Can We Beat DDoS Attacks in Clouds

Shui Yu;Yonghong Tian;Song Guo;Dapeng Oliver Wu.
IEEE Transactions on Parallel and Distributed Systems (2014)

214 Citations

A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View

Qiang Liu;Pan Li;Wentao Zhao;Wei Cai.
IEEE Access (2018)

202 Citations

CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding

Peng Li;Song Guo;Shui Yu;Athanasios V. Vasilakos.
international conference on computer communications (2012)

190 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Shui Yu

Irwin Gerszberg

Irwin Gerszberg

AT&T (United States)

Publications: 116

Paul Shala Henry

Paul Shala Henry

AT&T (United States)

Publications: 115

Robert Bennett

Robert Bennett

AT&T (United States)

Publications: 113

Yucheng Dong

Yucheng Dong

Sichuan University

Publications: 80

Farhad Barzegar

Farhad Barzegar

AT&T (United States)

Publications: 69

Francisco Herrera

Francisco Herrera

University of Granada

Publications: 52

Enrique Herrera-Viedma

Enrique Herrera-Viedma

University of Granada

Publications: 50

Zeshui Xu

Zeshui Xu

Sichuan University

Publications: 41

Witold Pedrycz

Witold Pedrycz

University of Alberta

Publications: 35

Yong Xiang

Yong Xiang

Swinburne University of Technology

Publications: 34

Mohsen Guizani

Mohsen Guizani

Qatar University

Publications: 32

Xiaolong Xu

Xiaolong Xu

Nanjing University of Information Science and Technology

Publications: 30

Yejun Xu

Yejun Xu

Hohai University

Publications: 28

Luis Martínez

Luis Martínez

University of Jaén

Publications: 27

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 27

Xiaojiang Du

Xiaojiang Du

Temple University

Publications: 27

Something went wrong. Please try again later.