His scientific interests lie mostly in Computer security, Computer network, The Internet, Distributed computing and Data mining. His studies deal with areas such as Cloud computing, Communications system and Big data as well as Computer security. His study in the fields of Edge computing under the domain of Cloud computing overlaps with other disciplines such as Process.
His Computer network study frequently links to related topics such as Adversary. His Computer worm study, which is part of a larger body of work in The Internet, is frequently linked to Electronic mail, bridging the gap between disciplines. The study incorporates disciplines such as Distributed generation, Overhead, Attack model and Data integrity in addition to Distributed computing.
His primary areas of study are Computer network, Computer security, Distributed computing, The Internet and Real-time computing. His Computer network research integrates issues from Wireless network and Throughput. His studies in Computer security integrate themes in fields like Telecommunications network, Android and Cloud computing.
As a part of the same scientific family, he mostly works in the field of Android, focusing on Mobile device and, on occasion, Mobile computing. The various areas that he examines in his Distributed computing study include Service, Wireless sensor network and Link-state routing protocol, Static routing, Routing protocol. His research in Link-state routing protocol focuses on subjects like Dynamic Source Routing, which are connected to Wireless Routing Protocol.
The scientist’s investigation covers issues in Distributed computing, Artificial intelligence, Computer security, Deep learning and Differential privacy. His Distributed computing research is multidisciplinary, relying on both Delay-tolerant networking, Enhanced Data Rates for GSM Evolution, Service and Asynchronous communication. His Artificial intelligence study combines topics in areas such as Virtual machine, Machine learning and Overhead.
He integrates Computer security with Double auction in his study. The Deep learning study combines topics in areas such as Network congestion, Android malware, World Wide Web, Feature data and Cloud computing. In his research on the topic of Cloud computing, Scheduling and Computer network is strongly related with Real-time data.
Wei Yu spends much of his time researching Artificial intelligence, Computer security, Machine learning, Deep learning and Server. His study in the field of Artificial neural network and Multimodal learning is also linked to topics like Permission. Wei Yu combines subjects such as Bidding and Demand response with his study of Computer security.
His biological study spans a wide range of topics, including Adversarial system, Federated learning and Zero-knowledge proof. The concepts of his Deep learning study are interwoven with issues in Network congestion, Distributed computing, Malware, Feature data and Cloud computing. He combines subjects such as Search engine, Volume, Dimensionality reduction, Information sharing and Data science with his study of Server.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
Jie Lin;Wei Yu;Nan Zhang;Xinyu Yang.
IEEE Internet of Things Journal (2017)
A Survey on the Edge Computing for the Internet of Things
Wei Yu;Fan Liang;Xiaofei He;William Grant Hatcher.
IEEE Access (2018)
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures
Qingyu Yang;Jie Yang;Wei Yu;Dou An.
IEEE Transactions on Parallel and Distributed Systems (2014)
A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective
Hansong Xu;Wei Yu;David Griffith;Nada Golmie.
IEEE Access (2018)
A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends
William Grant Hatcher;Wei Yu.
IEEE Access (2018)
DSSS-Based Flow Marking Technique for Invisible Traceback
Wei Yu;Xinwen Fu;S. Graham;Dong Xuan.
ieee symposium on security and privacy (2007)
A Survey on Big Data Market: Pricing, Trading and Protection
Fan Liang;Wei Yu;Dou An;Qingyu Yang.
IEEE Access (2018)
On False Data Injection Attacks against Distributed Energy Routing in Smart Grid
Jie Lin;Wei Yu;Xinyu Yang;Guobin Xu.
international conference on cyber-physical systems (2012)
Toward Integrating Distributed Energy Resources and Storage Devices in Smart Grid
Guobin Xu;Wei Yu;David Griffith;Nada Golmie.
IEEE Internet of Things Journal (2017)
CAP: A Context-Aware Privacy Protection System for Location-Based Services
Aniket Pingley;Wei Yu;Nan Zhang;Xinwen Fu.
international conference on distributed computing systems (2009)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Massachusetts Lowell
Shenzhen Institutes of Advanced Technology
National Institute of Standards and Technology
The Ohio State University
United States Air Force Research Laboratory
Beijing Normal University
University of Maryland, Baltimore County
Temple University
Missouri University of Science and Technology
Zhejiang University
Utrecht University
Universidade de São Paulo
Polytechnique Montréal
Dalian University of Technology
IBM (United States)
Freie Universität Berlin
University of Ljubljana
Kobe University
Institut National de la Recherche Scientifique
Imperial College London
Centre national de la recherche scientifique, CNRS
Tufts University
University of British Columbia
Nagoya University
University of Sydney
Aarhus University