Browsing by Author Yu, S

Showing results 1 to 20 of 66  next >
Issue DateTitleAuthor(s)
3-May-2019Waiting times in aged care: What matters?Yu, S; Byles, J
1-May-2019A heuristic line piloting method to disclose malicious taxicab driver's privacy over GPS big dataDou, W; Tang, W; Li, S; Yu, S; Raymond Choo, KK
1-May-2019Physician pricing behavior: Evidence from an Australian experimentYu, S; van Gool, K; Hall, J; Fiebig, DG
15-Mar-2019Efficient DDoS attacks mitigation for stateful forwarding in Internet of ThingsLiu, G; Quan, W; Cheng, N; Zhang, H; Yu, S
1-Mar-2019Non-Standard Time Wage Premiums and Employment Effects: Evidence from an Australian Natural ExperimentYu, S; Peetz, D
20-Feb-2019Solving Selfish Routing in Route-by-Name Information-Centric Network ArchitecturesLi, J; Luo, H; Jin, M; Yu, S; Wang, Z
20-Feb-2019Customized Data Sharing Scheme Based on Blockchain and Weighted AttributeHuang, L; Zhang, G; Yu, S; Fu, A; Yearwood, J
1-Jan-2019Driver drowsiness detection using multi-channel second order blind identificationsZhang, C; Wu, X; Zheng, X; Yu, S
1-Jan-2019Efficient solution to the millionaires' problem based on asymmetric commutative encryption schemeLiu, M; Luo, Y; Nanda, P; Yu, S; Zhang, J
2019Private provider incentives in health care: the case of birth interventions. CHERE Working Paper 2019/01Yu, S; Fiebig, D; Viney, R; Scarf, V; Homer, C
4-Dec-2018An offloading approach in fog computing environmentTang, W; Li, S; Rafique, W; Dou, W; Yu, S
4-Dec-2018MTF: Mitigating link flooding attacks in delay tolerant networksWang, Z; Zhou, H; Feng, B; Quan, W; Yu, S
1-Dec-2018An adaptive multipath algorithm to overcome the unpredictability of heterogeneous wireless networks for high-speed railwayZhang, Y; Dong, P; Yu, S; Luo, H; Zheng, T; Zhang, H
1-Dec-2018Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of ThingsQu, Y; Yu, S; Zhou, W; Peng, S; Wang, G; Xiao, K
15-Nov-2018MC-VAP: A multi-connection virtual access point for high performance software-defined wireless networksXu, C; Jin, W; Wang, X; Zhao, G; Yu, S
15-Nov-2018Data integrity verification of the outsourced big data in the cloud environment: A surveyZhou, L; Fu, A; Yu, S; Su, M; Kuang, B
1-Nov-2018Traffic Engineering in Information-Centric Networking: Opportunities, Solutions and ChallengesLi, J; Luo, H; Zhang, S; Yu, S; Wolf, T
5-Sep-2018Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' ProblemLiu, M; Nanda, P; Zhang, X; Yang, C; Yu, S; Li, J
1-Sep-2018A hybrid privacy protection scheme in cyber-physical social networksQu, Y; Yu, S; Gao, L; Zhou, W; Peng, S
10-Aug-2018Inference attack in android activity based on program fingerprintYang, L; Wei, T; Ma, J; Yu, S; Yang, C