Browsing by Author Yu, S

Showing results 1 to 20 of 45  next >
Issue DateTitleAuthor(s)
1-May-2019A heuristic line piloting method to disclose malicious taxicab driver's privacy over GPS big dataDou, W; Tang, W; Li, S; Yu, S; Raymond Choo, KK
15-Mar-2019Efficient DDoS attacks mitigation for stateful forwarding in Internet of ThingsLiu, G; Quan, W; Cheng, N; Zhang, H; Yu, S
1-Mar-2019Non-Standard Time Wage Premiums and Employment Effects: Evidence from an Australian Natural ExperimentYu, S; Peetz, D
20-Feb-2019Solving Selfish Routing in Route-by-Name Information-Centric Network ArchitecturesLi, J; Luo, H; Jin, M; Yu, S; Wang, Z
20-Feb-2019Customized Data Sharing Scheme Based on Blockchain and Weighted AttributeHuang, L; Zhang, G; Yu, S; Fu, A; Yearwood, J
1-Jan-2019Driver drowsiness detection using multi-channel second order blind identificationsZhang, C; Wu, X; Zheng, X; Yu, S
2019Private provider incentives in health care: the case of birth interventions. CHERE Working Paper 2019/01Yu, S; Fiebig, D; Viney, R; Scarf, V; Homer, C
2019Physician pricing behavior: Evidence from an Australian experimentYu, S; Van Gool, K; Hall, J; Fiebig, D
2019Waiting times in aged care: what matters?Yu, S; Byles, J
4-Dec-2018An offloading approach in fog computing environmentTang, W; Li, S; Rafique, W; Dou, W; Yu, S
1-Dec-2018An adaptive multipath algorithm to overcome the unpredictability of heterogeneous wireless networks for high-speed railwayZhang, Y; Dong, P; Yu, S; Luo, H; Zheng, T; Zhang, H
1-Dec-2018Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of ThingsQu, Y; Yu, S; Zhou, W; Peng, S; Wang, G; Xiao, K
15-Nov-2018MC-VAP: A multi-connection virtual access point for high performance software-defined wireless networksXu, C; Jin, W; Wang, X; Zhao, G; Yu, S
15-Nov-2018Data integrity verification of the outsourced big data in the cloud environment: A surveyZhou, L; Fu, A; Yu, S; Su, M; Kuang, B
Nov-2018Traffic Engineering in Information-Centric Networking: Opportunities, Solutions and ChallengesLi, J; Luo, H; Zhang, S; Yu, S; Wolf, T
5-Sep-2018Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' ProblemLiu, M; Nanda, P; Zhang, X; Yang, C; Yu, S; Li, J
1-Sep-2018A hybrid privacy protection scheme in cyber-physical social networksQu, Y; Yu, S; Gao, L; Zhou, W; Peng, S
1-Aug-2018Collaborative data collection scheme based on optimal clustering for wireless sensor networksLi, G; Chen, H; Peng, S; Li, X; Wang, C; Yu, S; Yin, P
18-Jul-2018DP-LTOD: Differential Privacy Latent Trajectory Community Discovering Services over Location-Based Social NetworksXu, C; Zhu, L; Liu, Y; Guan, J; Yu, S
1-Jun-2018A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined NetworksYuan, B; Jin, H; Zou, D; Yang, LT; Yu, S