Showing results 1 to 20 of 532
next >
Issue Date | Title | Author(s) |
2021-04-01 | 6g-enabled short-term forecasting for large-scale traffic flow in massive iot based on time-aware locality-sensitive hashing | Wang, F; Zhu, M; Wang, M; Khosravi, MR; Ni, Q; Yu, S; Qi, L |
2020-04-01 | A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems | Xu, X; Zhang, X; Khan, M; Dou, W; Xue, S; Yu, S |
2020-01-01 | A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud | Liu, J; Wang, X; Shen, S; Yue, G; Yu, S; Li, M |
2021-06-01 | A Blockchain based Privacy-Preserving Reputation Scheme for Cloud Service | Geng, Z; He, Y; Wang, C; Xu, G; Xiao, K; Yu, S |
2022-01-01 | A Communication-Efficient Federated Learning Scheme for IoT-Based Traffic Forecasting | Zhang, C; Cui, L; Yu, S; Yu, JJQ |
2024-01-01 | A Comprehensive Overview of Backdoor Attacks in Large Language Models within Communication Networks | Yang, H; Xiang, K; Ge, M; Li, H; Lu, R; Yu, S |
2022-12-23 | A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning | Tian, Z; Cui, L; Liang, J; Yu, S |
2022-01-01 | A Covert Electricity-Theft Cyber-Attack against Machine Learning-Based Detection Models | Cui, L; Guo, L; Gao, L; Cai, B; Qu, Y; Zhou, Y; Yu, S |
2022-01-01 | A Deep Reinforcement Learning Approach to Edge-based IDS Packets Sampling | Wu, G; Li, Z; Shen, Y; Zhang, H; Shen, S; Yu, S |
2022-08-15 | A family system based evolutionary algorithm for obstacle-evasion minimal exposure path problem in Internet of Things | Binh, NTM; Ngoc, NH; Binh, HTT; Van, NK; Yu, S |
2016-05-01 | A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking | Yu, S; Zhou, W; Guo, S; Guo, M |
2020-02-01 | A Fog-Based Recommender System | Wang, X; Gu, B; Ren, Y; Ye, W; Yu, S; Xiang, Y; Gao, L |
2016-01-01 | A Game-Theoretic Resource Allocation Approach for Intercell Device-to-Device Communications in Cellular Networks | Huang, J; Yin, Y; Zhao, Y; Duan, Q; Wang, W; Yu, S |
2016-01-01 | A General QoS Aware Flow-Balancing and Resource Management Scheme in Distributed Software-Defined Networks | Sood, K; Yu, S; Xiang, Y; Cheng, H |
2023-01-01 | A GNN-Enabled Multipath Routing Algorithm for Spatial-Temporal Varying LEO Satellite Networks | Huang, Y; Yang, D; Feng, B; Tian, A; Dong, P; Yu, S; Zhang, H |
2023-01-01 | A High Accuracy and Adaptive Anomaly Detection Model With Dual-Domain Graph Convolutional Network for Insider Threat Detection | Li, X; Li, X; Jia, J; Li, L; Yuan, J; Gao, Y; Yu, S |
2021-08-31 | A lightweight and privacy-preserving answer collection scheme for mobile crowdsourcing | Dai, Y; Weng, J; Yang, A; Yu, S; Deng, RH |
2023-10-23 | A Location Privacy and Query Privacy Joint Protection Scheme for POI Query in Vehicular Networks | Wu, H; Zhao, G; Wang, S; Xu, C; Yu, S |
2024-01-01 | A Membership Inference and Adversarial Attack Defense Framework for Network Traffic Classifiers | Liu, G; Zhang, W; Wang, X; King, S; Yu, S |
2022-05-16 | A Multi-objective based Inter-Layer Link Allocation Scheme for MEO/LEO Satellite Networks | Huang, Y; Feng, B; Dong, P; Tian, A; Yu, S |