His primary areas of study are Computer network, Computer security, Distributed computing, Denial-of-service attack and The Internet. His Computer network study combines topics from a wide range of disciplines, such as Wireless and Wireless network. His work deals with themes such as Leverage, Betweenness centrality, Order, Blocking and Focus, which intersect with Computer security.
Shui Yu has included themes like Energy consumption, Quality of service, Workload, Scheduling and Cyber-physical system in his Distributed computing study. In his research, Anomaly detection and Phishing is intimately related to Botnet, which falls under the overarching field of Denial-of-service attack. His research in The Internet intersects with topics in Web page, Crowds and Network security.
Computer network, Distributed computing, Computer security, Cloud computing and Big data are his primary areas of study. His work carried out in the field of Computer network brings together such families of science as The Internet and Denial-of-service attack. The concepts of his Distributed computing study are interwoven with issues in Anycast, Scheduling and Service.
His work in Information privacy and Network security is related to Computer security. His work on Cloud computing security as part of general Cloud computing research is frequently linked to Resource management, bridging the gap between disciplines. His Big data study introduces a deeper knowledge of Data mining.
Shui Yu spends much of his time researching Computer security, Distributed computing, Cloud computing, Artificial intelligence and Differential privacy. His Computer security study frequently links to related topics such as The Internet. His Distributed computing research is multidisciplinary, incorporating perspectives in Q-learning, Reinforcement learning, Telecommunications network, Server and Integer programming.
The subject of his Server research is within the realm of Computer network. His Cloud computing research includes elements of Information privacy, Data management, Distributed database and Big data. His work in the fields of Deep learning, Intrusion detection system and Sentiment analysis overlaps with other areas such as Spatial analysis.
His primary scientific interests are in Computer security, Cloud computing, Distributed computing, Key and Big data. Shui Yu has researched Computer security in several fields, including Data modeling and Differential privacy. His Cloud computing study incorporates themes from Distributed database, Software engineering, Service and Linear network coding.
The various areas that Shui Yu examines in his Distributed computing study include Markov decision process, Edge computing, Server, Integer programming and Reinforcement learning. His Client-side encryption study is concerned with the larger field of Computer network. His work in Computer network addresses issues such as Data set, which are connected to fields such as Leverage.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Joint Optimization of Task Scheduling and Image Placement in Fog Computing Supported Software-Defined Embedded System
Deze Zeng;Lin Gu;Song Guo;Zixue Cheng.
IEEE Transactions on Computers (2016)
Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient
Shui Yu;Wanlei Zhou;Weijia Jia;Song Guo.
IEEE Transactions on Parallel and Distributed Systems (2012)
A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment
Jianguo Chen;Kenli Li;Zhuo Tang;Kashif Bilal.
IEEE Transactions on Parallel and Distributed Systems (2017)
Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks
Shui Yu;Guofeng Zhao;Wanchun Dou;S. James.
IEEE Transactions on Information Forensics and Security (2012)
Computing the Numerical Scale of the Linguistic Term Set for the 2-Tuple Fuzzy Linguistic Representation Model
Yucheng Dong;Yinfeng Xu;Shui Yu.
IEEE Transactions on Fuzzy Systems (2009)
Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data
IEEE Access (2016)
Traceback of DDoS Attacks Using Entropy Variations
Shui Yu;Wanlei Zhou;R Doss;Weijia Jia.
IEEE Transactions on Parallel and Distributed Systems (2011)
Can We Beat DDoS Attacks in Clouds
Shui Yu;Yonghong Tian;Song Guo;Dapeng Oliver Wu.
IEEE Transactions on Parallel and Distributed Systems (2014)
A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View
Qiang Liu;Pan Li;Wentao Zhao;Wei Cai.
IEEE Access (2018)
CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding
Peng Li;Song Guo;Shui Yu;Athanasios V. Vasilakos.
international conference on computer communications (2012)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: