Yu, Shui.
Overview
Works: | 1 works in 5 publications in 1 languages |
---|
Titles
Tools for design, implementation and verification of emerging information technologies = 17th EAI International Conference, TridentCom 2022, Melbourne, Australia, November 23-25, 2022 : proceedings /
by:
Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service); Yu, Shui.
(Language materials, printed)
Delay Tolerant Networks
by:
Gao, Longxiang.; Luan, Tom H.; Yu, Shui.; SpringerLink (Online service); Zhou, Wanlei.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/aut]
Security and Privacy in Digital Economy = First International Conference, SPDE 2020, Quzhou, China, October 30 – November 1, 2020, Proceedings /
by:
SpringerLink (Online service); Qian, Jiangbo.; Yu, Shui.; Mueller, Peter.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Big data concepts, theories, and applications
by:
SpringerLink (Online service); Yu, Shui.; Guo, Song.
(Language materials, printed)
Privacy Preservation in IoT: Machine Learning Approaches = A Comprehensive Survey and Use Cases /
by:
Gao, Longxiang.; Xiang, Yong.; SpringerLink (Online service); Yu, Shui.; Qu, Youyang.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/aut]
Intelligent industrial internet systems = architecture, deployment and applications /
by:
Xu, Xiaolong.; SpringerLink (Online service); Dou, Wanchun.; Yu, Shui.
(Language materials, printed)
Personalized Privacy Protection in Big Data
by:
Nosouhi, Mohammad Reza.; Qu, Youyang.; Cui, Lei.; Yu, Shui.; SpringerLink (Online service)
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/aut]
Distributed denial of service attack and defense
by:
Yu, Shui.; SpringerLink (Online service)
(Language materials, printed)
Big Data Concepts, Theories, and Applications
by:
SpringerLink (Online service); Yu, Shui.; Guo, Song.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Malicious Attack Propagation and Source Identification
by:
Yu, Shui.; SpringerLink (Online service); Wen, Sheng.; Jiang, Jiaojiao.; Zhou, Wanlei.; Xiang, Yang.; Liu, Bo.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/aut]
Show more
Fewer
Subjects
Data protection.
Artificial intelligence.
Computer Communication Networks.
Electrical engineering.
Machine learning.
Information Systems Applications (incl. Internet)
Business Process Management.
Statistics, general.
Coding theory.
Internet of things.
Data protection—Law and legislation.
Computers.
Data Structures and Information Theory.
Coding and Information Theory.
Storage area networks (Computer networks)
Data structures (Computer science).
Internet of Things.
Computer Science.
Computer communication systems.
Statistics .
Big Data.
Security.
Special Purpose and Application-Based Systems.
Computing Milieux.
Intelligence Infrastructure.
Intelligent control systems.
Computer security.
Computer software
Computer organization.
Systems and Data Security.
Computer system failures
Computer Systems Organization and Communication Networks.
Mobile Computing.
Artificial intelligence—Data processing.
Artificial Intelligence.
Data encryption (Computer science).
Computational Intelligence.
Cyberinfrastructure.
Denial of service attacks.
Information theory.
Distributed databases.
Privacy.
Communications Engineering, Networks.
Computer networks
Data Science.
Information Systems and Communication Service.
Data mining.
Cryptology.
Machine Learning.
Big data.
Data Mining and Knowledge Discovery.
Manufacturing processes