H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 36 Citations 8,198 256 World Ranking 5637 National Ranking 2782

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Operating system

His scientific interests lie mostly in Computer security, Computer network, The Internet, Distributed computing and Data mining. His studies deal with areas such as Cloud computing, Communications system and Big data as well as Computer security. His study in the fields of Edge computing under the domain of Cloud computing overlaps with other disciplines such as Process.

His Computer network study frequently links to related topics such as Adversary. His Computer worm study, which is part of a larger body of work in The Internet, is frequently linked to Electronic mail, bridging the gap between disciplines. The study incorporates disciplines such as Distributed generation, Overhead, Attack model and Data integrity in addition to Distributed computing.

His most cited work include:

  • A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications (1037 citations)
  • A Survey on the Edge Computing for the Internet of Things (396 citations)
  • On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures (243 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer network, Computer security, Distributed computing, The Internet and Real-time computing. His Computer network research integrates issues from Wireless network and Throughput. His studies in Computer security integrate themes in fields like Telecommunications network, Android and Cloud computing.

As a part of the same scientific family, he mostly works in the field of Android, focusing on Mobile device and, on occasion, Mobile computing. The various areas that he examines in his Distributed computing study include Service, Wireless sensor network and Link-state routing protocol, Static routing, Routing protocol. His research in Link-state routing protocol focuses on subjects like Dynamic Source Routing, which are connected to Wireless Routing Protocol.

He most often published in these fields:

  • Computer network (36.07%)
  • Computer security (32.46%)
  • Distributed computing (22.95%)

What were the highlights of his more recent work (between 2018-2021)?

  • Distributed computing (22.95%)
  • Artificial intelligence (7.54%)
  • Computer security (32.46%)

In recent papers he was focusing on the following fields of study:

The scientist’s investigation covers issues in Distributed computing, Artificial intelligence, Computer security, Deep learning and Differential privacy. His Distributed computing research is multidisciplinary, relying on both Delay-tolerant networking, Enhanced Data Rates for GSM Evolution, Service and Asynchronous communication. His Artificial intelligence study combines topics in areas such as Virtual machine, Machine learning and Overhead.

He integrates Computer security with Double auction in his study. The Deep learning study combines topics in areas such as Network congestion, Android malware, World Wide Web, Feature data and Cloud computing. In his research on the topic of Cloud computing, Scheduling and Computer network is strongly related with Real-time data.

Between 2018 and 2021, his most popular works were:

  • Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities (22 citations)
  • Toward Edge-Based Deep Learning in Industrial Internet of Things (21 citations)
  • Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly (20 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Operating system

Wei Yu spends much of his time researching Artificial intelligence, Computer security, Machine learning, Deep learning and Server. His study in the field of Artificial neural network and Multimodal learning is also linked to topics like Permission. Wei Yu combines subjects such as Bidding and Demand response with his study of Computer security.

His biological study spans a wide range of topics, including Adversarial system, Federated learning and Zero-knowledge proof. The concepts of his Deep learning study are interwoven with issues in Network congestion, Distributed computing, Malware, Feature data and Cloud computing. He combines subjects such as Search engine, Volume, Dimensionality reduction, Information sharing and Data science with his study of Server.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications

Jie Lin;Wei Yu;Nan Zhang;Xinyu Yang.
IEEE Internet of Things Journal (2017)

1519 Citations

A Survey on the Edge Computing for the Internet of Things

Wei Yu;Fan Liang;Xiaofei He;William Grant Hatcher.
IEEE Access (2018)

539 Citations

On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures

Qingyu Yang;Jie Yang;Wei Yu;Dou An.
IEEE Transactions on Parallel and Distributed Systems (2014)

284 Citations

DSSS-Based Flow Marking Technique for Invisible Traceback

Wei Yu;Xinwen Fu;S. Graham;Dong Xuan.
ieee symposium on security and privacy (2007)

231 Citations

A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective

Hansong Xu;Wei Yu;David Griffith;Nada Golmie.
IEEE Access (2018)

178 Citations

A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends

William Grant Hatcher;Wei Yu.
IEEE Access (2018)

169 Citations

On False Data Injection Attacks against Distributed Energy Routing in Smart Grid

Jie Lin;Wei Yu;Xinyu Yang;Guobin Xu.
international conference on cyber-physical systems (2012)

147 Citations

A Survey on Big Data Market: Pricing, Trading and Protection

Fan Liang;Wei Yu;Dou An;Qingyu Yang.
IEEE Access (2018)

133 Citations

CAP: A Context-Aware Privacy Protection System for Location-Based Services

Aniket Pingley;Wei Yu;Nan Zhang;Xinwen Fu.
international conference on distributed computing systems (2009)

124 Citations

A new cell counter based attack against tor

Zhen Ling;Junzhou Luo;Wei Yu;Xinwen Fu.
computer and communications security (2009)

121 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Wei Yu

Erik Blasch

Erik Blasch

United States Air Force Research Laboratory

Publications: 25

Xinwen Fu

Xinwen Fu

University of Massachusetts Lowell

Publications: 18

Shui Yu

Shui Yu

University of Technology Sydney

Publications: 16

Yuval Elovici

Yuval Elovici

Ben-Gurion University of the Negev

Publications: 16

Xiaojiang Du

Xiaojiang Du

Temple University

Publications: 16

Joel J. P. C. Rodrigues

Joel J. P. C. Rodrigues

Federal University of Piauí

Publications: 15

Quanyan Zhu

Quanyan Zhu

New York University

Publications: 12

Mohsen Guizani

Mohsen Guizani

Qatar University

Publications: 12

Victor C. M. Leung

Victor C. M. Leung

Shenzhen University

Publications: 11

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 11

Sherali Zeadally

Sherali Zeadally

University of Kentucky

Publications: 11

Nikita Borisov

Nikita Borisov

University of Illinois at Urbana-Champaign

Publications: 11

Gautam Srivastava

Gautam Srivastava

Brandon University

Publications: 10

Muhammad Imran

Muhammad Imran

University of Cagliari

Publications: 10

Abdullah Gani

Abdullah Gani

University of Malaya

Publications: 9

Xiapu Luo

Xiapu Luo

Hong Kong Polytechnic University

Publications: 8

Something went wrong. Please try again later.