Search Results - "Shui Yu"
-
1
Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data
Published in IEEE access (2016)“…One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. We believe the forthcoming solutions…”
Get full text
Journal Article -
2
Non-Markovianity in the collision model with environmental block
Published in New journal of physics (09-05-2018)“…We present an extended collision model to simulate the dynamics of an open quantum system. In our model, the unit to represent the environment is, instead of a…”
Get full text
Journal Article -
3
Liquid biopsy in lung cancer: significance in diagnostics, prediction, and treatment monitoring
Published in Molecular cancer (20-01-2022)“…Primary lung cancer is one of the most common malignant tumors in China. Approximately 60% of lung cancer patients have distant metastasis at the initial…”
Get full text
Journal Article -
4
Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review
Published in IEEE internet of things journal (01-08-2016)“…With the emergence of Internet-of-Things (IoT), there is now growing interest to simplify wireless network controls. This is a very challenging task,…”
Get full text
Journal Article -
5
Joint Optimization of Task Scheduling and Image Placement in Fog Computing Supported Software-Defined Embedded System
Published in IEEE transactions on computers (01-12-2016)“…Traditional standalone embedded system is limited in their functionality, flexibility, and scalability. Fog computing platform, characterized by pushing the…”
Get full text
Journal Article -
6
Cancer‐associated fibroblast‐derived exosomal microRNA‐24‐3p enhances colon cancer cell resistance to MTX by down‐regulating CDX2/HEPH axis
Published in Journal of cellular and molecular medicine (01-04-2021)“…MicroRNA‐24‐3p (miR‐24‐3p) has been implicated as a key promoter of chemotherapy resistance in numerous cancers. Meanwhile, cancer‐associated fibroblasts…”
Get full text
Journal Article -
7
Networking for Big Data: A Survey
Published in IEEE Communications surveys and tutorials (2017)“…Complementary to the fancy big data applications, networking for big data is an indispensable supporting platform for these applications in practice. This…”
Get full text
Journal Article -
8
Coherence measure in terms of the Tsallis relative α entropy
Published in Scientific reports (10-01-2018)“…Coherence is the most fundamental quantum feature of the nonclassical systems. The understanding of coherence within the resource theory has been attracting…”
Get full text
Journal Article -
9
A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment
Published in IEEE transactions on parallel and distributed systems (01-04-2017)“…With the emergence of the big data age, the issue of how to obtain valuable knowledge from a dataset efficiently and accurately has attracted increasingly…”
Get full text
Journal Article -
10
Can We Beat DDoS Attacks in Clouds?
Published in IEEE transactions on parallel and distributed systems (01-09-2014)“…Cloud is becoming a dominant computing platform. Naturally, a question that arises is whether we can beat notorious DDoS attacks in a cloud environment…”
Get full text
Journal Article -
11
Resource speed limits: maximal rate of resource variation
Published in New journal of physics (01-06-2022)“…Abstract Recent advances in quantum resource theories have been driven by the fact that many quantum information protocols make use of different facets of the…”
Get full text
Journal Article -
12
Social influence modeling using information theory in mobile social networks
Published in Information sciences (10-02-2017)“…Social influence analysis has become one of the most important technologies in modern information and service industries. Thus, how to measure social influence…”
Get full text
Journal Article -
13
Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures
Published in IEEE transactions on industrial informatics (01-05-2022)“…Internet of Things (IoT) anomaly detection is significant due to its fundamental roles of securing modern critical infrastructures, such as falsified data…”
Get full text
Journal Article -
14
Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data
Published in IEEE transactions on cloud computing (01-04-2020)“…In medical cloud computing, a patient can remotely outsource her medical data to the cloud server. In this case, only authorized doctors are allowed to access…”
Get full text
Journal Article -
15
Security and privacy in 6G networks: New areas and new challenges
Published in Digital communications and networks (01-08-2020)“…With the deployment of more and more 5g networks, the limitations of 5g networks have been found, which undoubtedly promotes the exploratory research of 6G…”
Get full text
Journal Article -
16
Smartphone Malware and Its Propagation Modeling: A Survey
Published in IEEE Communications surveys and tutorials (01-01-2014)“…Smartphones are pervasively used in society, and have been both the target and victim of malware writers. Motivated by the significant threat that presents to…”
Get full text
Journal Article -
17
Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies
Published in IEEE Communications surveys and tutorials (2017)“…It has long been a significant but difficult problem to identify propagation sources based on limited knowledge of network structures and the varying states of…”
Get full text
Journal Article -
18
Performance Analysis of Software-Defined Network Switch Using M/Geo/1 Model
Published in IEEE communications letters (01-12-2016)“…The aim of this letter is to propose an analytical model to study the performance of software-defined network (SDN) switches. Here, SDN switch performance is…”
Get full text
Journal Article -
19
Tailoring doping locations and types for high‐performance CuFeO2‐based photocatalysts
Published in Journal of the American Ceramic Society (01-12-2023)“…Doping engineering has been recognized as an effective strategy for improving the solar‐to‐hydrogen conversion efficiency of delafossite CuFeO2‐based…”
Get full text
Journal Article -
20
Computing the Numerical Scale of the Linguistic Term Set for the 2-Tuple Fuzzy Linguistic Representation Model
Published in IEEE transactions on fuzzy systems (01-12-2009)“…When using linguistic approaches to solve decision problems, we need the techniques for computing with words (CW). Together with the 2-tuple fuzzy linguistic…”
Get full text
Journal Article