Browsing byAuthorYu, S

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 248 to 267 of 487< previous   next >
Issue DateTitleAuthor(s)
2022-01-01ICE: Intelligent Caching at the EdgeWang, T; Mao, J; Chen, M; Liu, G; Di, J; Yu, S
2022-01-01Identification of Encrypted Traffic Through Attention Mechanism Based Long Short Term MemoryYao, H; Liu, C; Zhang, P; Wu, S; Jiang, C; Yu, S
2019-01-01Identifying multiple propagation sourcesJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Identifying propagation source in large-scale networksJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Identifying propagation source in time-varying networksJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2017-01-01Identifying Propagation Sources in Networks: State-of-the-Art and Comparative StudiesJiang, J; Wen, S; Yu, S; Xiang, Y; Zhou, W
2021-01-01IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication EnvironmentsCheng, X; Liu, Z; Du, X; Yu, S; Mostarda, L
2019-11-01An Immunization Framework for Social Networks Through Big Data Based Influence ModelingPeng, S; Wang, G; Zhou, Y; Wan, C; Wang, C; Yu, S; Niu, J
2019-08-01Impact of social network structures on uncertain opinion formationZhan, M; Liang, H; Kou, G; Dong, Y; Yu, S
2017-04-01Impairment- and Splitting-Aware Cloud-Ready Multicast Provisioning in Elastic Optical NetworksZhu, Z; Liu, X; Wang, Y; Lu, W; Gong, L; Yu, S; Ansari, N
2019-03-01Improving Data Utility Through Game Theory in Personalized Differential PrivacyCui, L; Qu, Y; Nosouhi, MR; Yu, S; Niu, JW; Xie, G
2018-07-27Improving Data Utility through Game Theory in Personalized Differential PrivacyQu, Y; Cui, L; Yu, S; Zhou, W; Wu, J
2018-03-01Improving SDN Scalability with Protocol-Oblivious Source Routing: A System-Level StudyLi, S; Han, K; Ansari, N; Bao, Q; Hu, D; Liu, J; Yu, S; Zhu, Z
2020IMS: An Identity-Based Many-to-Many Subscription Scheme with Efficient Key Management for Wireless Broadcast SystemsShen, J; Miao, T; Lai, J-F; Chen, X; Li, J; Yu, S
2019-02-01Inference attack in Android Activity based on program fingerprintYang, L; Zhi, Y; Wei, T; Yu, S; Ma, J
2018-08-10Inference attack in android activity based on program fingerprintYang, L; Wei, T; Ma, J; Yu, S; Yang, C
2023-10-06Inferring Private Data from AI Models in Metaverse through Black-box Model Inversion AttacksTian, Z; Zhang, C; Sood, K; Yu, S
2018-03-15Influence analysis in social networks: A surveyPeng, S; Zhou, Y; Cao, L; Yu, S; Niu, J; Jia, W
2023-01-01Insights, Challenges and OpportunitiesWang, T; Li, B; Chen, M; Yu, S
2023Intelligent Industrial Internet Systems, Architecture, Deployment and ApplicationsDou, W; Xu, X; Yu, S