Search Results - "Shui Yu"

Refine Results
  1. 1

    Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data by Yu, Shui

    Published in IEEE access (2016)
    “…One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. We believe the forthcoming solutions…”
    Get full text
    Journal Article
  2. 2

    Non-Markovianity in the collision model with environmental block by Jin, Jiasen, Yu, Chang-shui

    Published in New journal of physics (09-05-2018)
    “…We present an extended collision model to simulate the dynamics of an open quantum system. In our model, the unit to represent the environment is, instead of a…”
    Get full text
    Journal Article
  3. 3

    Liquid biopsy in lung cancer: significance in diagnostics, prediction, and treatment monitoring by Li, Wen, Liu, Ji-Bin, Hou, Li-Kun, Yu, Fei, Zhang, Jie, Wu, Wei, Tang, Xiao-Mei, Sun, Feng, Lu, Hai-Min, Deng, Jing, Bai, Jie, Li, Juan, Wu, Chun-Yan, Lin, Qin-Lu, Lv, Zhong-Wei, Wang, Gao-Ren, Jiang, Geng-Xi, Ma, Yu-Shui, Fu, Da

    Published in Molecular cancer (20-01-2022)
    “…Primary lung cancer is one of the most common malignant tumors in China. Approximately 60% of lung cancer patients have distant metastasis at the initial…”
    Get full text
    Journal Article
  4. 4

    Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review by Sood, Keshav, Shui Yu, Yong Xiang

    Published in IEEE internet of things journal (01-08-2016)
    “…With the emergence of Internet-of-Things (IoT), there is now growing interest to simplify wireless network controls. This is a very challenging task,…”
    Get full text
    Journal Article
  5. 5

    Joint Optimization of Task Scheduling and Image Placement in Fog Computing Supported Software-Defined Embedded System by Zeng, Deze, Gu, Lin, Guo, Song, Cheng, Zixue, Yu, Shui

    Published in IEEE transactions on computers (01-12-2016)
    “…Traditional standalone embedded system is limited in their functionality, flexibility, and scalability. Fog computing platform, characterized by pushing the…”
    Get full text
    Journal Article
  6. 6

    Cancer‐associated fibroblast‐derived exosomal microRNA‐24‐3p enhances colon cancer cell resistance to MTX by down‐regulating CDX2/HEPH axis by Zhang, Hong‐Wei, Shi, Yi, Liu, Ji‐Bin, Wang, Hui‐Min, Wang, Pei‐Yao, Wu, Zhi‐Jun, Li, Liu, Gu, Li‐Peng, Cao, Ping‐Sheng, Wang, Gao‐Ren, Ma, YuShui, Fu, Da

    Published in Journal of cellular and molecular medicine (01-04-2021)
    “…MicroRNA‐24‐3p (miR‐24‐3p) has been implicated as a key promoter of chemotherapy resistance in numerous cancers. Meanwhile, cancer‐associated fibroblasts…”
    Get full text
    Journal Article
  7. 7

    Networking for Big Data: A Survey by Shui Yu, Meng Liu, Wanchun Dou, Xiting Liu, Sanming Zhou

    “…Complementary to the fancy big data applications, networking for big data is an indispensable supporting platform for these applications in practice. This…”
    Get full text
    Journal Article
  8. 8

    Coherence measure in terms of the Tsallis relative α entropy by Zhao, Haiqing, Yu, Chang-shui

    Published in Scientific reports (10-01-2018)
    “…Coherence is the most fundamental quantum feature of the nonclassical systems. The understanding of coherence within the resource theory has been attracting…”
    Get full text
    Journal Article
  9. 9

    A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment by Jianguo Chen, Kenli Li, Zhuo Tang, Bilal, Kashif, Shui Yu, Chuliang Weng, Keqin Li

    “…With the emergence of the big data age, the issue of how to obtain valuable knowledge from a dataset efficiently and accurately has attracted increasingly…”
    Get full text
    Journal Article
  10. 10

    Can We Beat DDoS Attacks in Clouds? by Shui Yu, Yonghong Tian, Song Guo, Wu, Dapeng Oliver

    “…Cloud is becoming a dominant computing platform. Naturally, a question that arises is whether we can beat notorious DDoS attacks in a cloud environment…”
    Get full text
    Journal Article
  11. 11

    Resource speed limits: maximal rate of resource variation by Campaioli, Francesco, Yu, Chang-shui, Pollock, Felix A, Modi, Kavan

    Published in New journal of physics (01-06-2022)
    “…Abstract Recent advances in quantum resource theories have been driven by the fact that many quantum information protocols make use of different facets of the…”
    Get full text
    Journal Article
  12. 12

    Social influence modeling using information theory in mobile social networks by Peng, Sancheng, Yang, Aimin, Cao, Lihong, Yu, Shui, Xie, Dongqing

    Published in Information sciences (10-02-2017)
    “…Social influence analysis has become one of the most important technologies in modern information and service industries. Thus, how to measure social influence…”
    Get full text
    Journal Article
  13. 13

    Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures by Cui, Lei, Qu, Youyang, Xie, Gang, Zeng, Deze, Li, Ruidong, Shen, Shigen, Yu, Shui

    “…Internet of Things (IoT) anomaly detection is significant due to its fundamental roles of securing modern critical infrastructures, such as falsified data…”
    Get full text
    Journal Article
  14. 14

    Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data by Li, Hongwei, Yang, Yi, Dai, Yuanshun, Yu, Shui, Xiang, Yong

    Published in IEEE transactions on cloud computing (01-04-2020)
    “…In medical cloud computing, a patient can remotely outsource her medical data to the cloud server. In this case, only authorized doctors are allowed to access…”
    Get full text
    Journal Article
  15. 15

    Security and privacy in 6G networks: New areas and new challenges by Wang, Minghao, Zhu, Tianqing, Zhang, Tao, Zhang, Jun, Yu, Shui, Zhou, Wanlei

    Published in Digital communications and networks (01-08-2020)
    “…With the deployment of more and more 5g networks, the limitations of 5g networks have been found, which undoubtedly promotes the exploratory research of 6G…”
    Get full text
    Journal Article
  16. 16

    Smartphone Malware and Its Propagation Modeling: A Survey by Sancheng Peng, Shui Yu, Aimin Yang

    Published in IEEE Communications surveys and tutorials (01-01-2014)
    “…Smartphones are pervasively used in society, and have been both the target and victim of malware writers. Motivated by the significant threat that presents to…”
    Get full text
    Journal Article
  17. 17

    Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies by Jiaojiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou

    “…It has long been a significant but difficult problem to identify propagation sources based on limited knowledge of network structures and the varying states of…”
    Get full text
    Journal Article
  18. 18

    Performance Analysis of Software-Defined Network Switch Using M/Geo/1 Model by Sood, Keshav, Shui Yu, Yong Xiang

    Published in IEEE communications letters (01-12-2016)
    “…The aim of this letter is to propose an analytical model to study the performance of software-defined network (SDN) switches. Here, SDN switch performance is…”
    Get full text
    Journal Article
  19. 19

    Tailoring doping locations and types for high‐performance CuFeO2‐based photocatalysts by Shui‐Miao Yu, Zong‐Yan Zhao

    Published in Journal of the American Ceramic Society (01-12-2023)
    “…Doping engineering has been recognized as an effective strategy for improving the solar‐to‐hydrogen conversion efficiency of delafossite CuFeO2‐based…”
    Get full text
    Journal Article
  20. 20

    Computing the Numerical Scale of the Linguistic Term Set for the 2-Tuple Fuzzy Linguistic Representation Model by Dong, Yucheng, Xu, Yinfeng, Yu, Shui

    Published in IEEE transactions on fuzzy systems (01-12-2009)
    “…When using linguistic approaches to solve decision problems, we need the techniques for computing with words (CW). Together with the 2-tuple fuzzy linguistic…”
    Get full text
    Journal Article