Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system D Zeng, L Gu, S Guo, Z Cheng, S Yu IEEE Transactions on Computers 65 (12), 3702-3712, 2016 | 282 | 2016 |
Discriminating DDoS attacks from flash crowds using flow correlation coefficient S Yu, W Zhou, W Jia, S Guo, Y Xiang, F Tang IEEE transactions on parallel and distributed systems 23 (6), 1073-1080, 2011 | 252 | 2011 |
Predicted packet padding for anonymous web browsing against traffic analysis attacks S Yu, G Zhao, W Dou, S James IEEE Transactions on Information Forensics and Security 7 (4), 1381-1393, 2012 | 244 | 2012 |
A parallel random forest algorithm for big data in a spark cloud computing environment J Chen, K Li, Z Tang, K Bilal, S Yu, C Weng, K Li IEEE Transactions on Parallel and Distributed Systems 28 (4), 919-933, 2016 | 225 | 2016 |
Computing the numerical scale of the linguistic term set for the 2-tuple fuzzy linguistic representation model Y Dong, Y Xu, S Yu IEEE Transactions on Fuzzy Systems 17 (6), 1366-1378, 2009 | 223 | 2009 |
Big privacy: Challenges and opportunities of privacy study in the age of big data S Yu IEEE access 4, 2751-2763, 2016 | 219 | 2016 |
Traceback of DDoS attacks using entropy variations S Yu, W Zhou, R Doss, W Jia IEEE transactions on parallel and distributed systems 22 (3), 412-425, 2010 | 217 | 2010 |
Can we beat DDoS attacks in clouds? S Yu, Y Tian, S Guo, DO Wu IEEE Transactions on Parallel and Distributed Systems 25 (9), 2245-2254, 2013 | 215 | 2013 |
A survey on security threats and defensive techniques of machine learning: A data driven view Q Liu, P Li, W Zhao, W Cai, S Yu, VCM Leung IEEE access 6, 12103-12117, 2018 | 186 | 2018 |
CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding P Li, S Guo, S Yu, AV Vasilakos 2012 Proceedings IEEE INFOCOM, 100-108, 2012 | 185 | 2012 |
Reliable multicast with pipelined network coding using opportunistic feeding and routing P Li, S Guo, S Yu, AV Vasilakos IEEE Transactions on Parallel and Distributed Systems 25 (12), 3264-3273, 2014 | 178 | 2014 |
Smartphone malware and its propagation modeling: A survey S Peng, S Yu, A Yang IEEE Communications Surveys & Tutorials 16 (2), 925-941, 2013 | 172 | 2013 |
Software-defined wireless networking opportunities and challenges for Internet-of-Things: A review K Sood, S Yu, Y Xiang IEEE Internet of Things Journal 3 (4), 453-463, 2015 | 167 | 2015 |
Scoring users’ privacy disclosure across multiple online social networks E Aghasian, S Garg, L Gao, S Yu, J Montgomery IEEE access 5, 13118-13130, 2017 | 161 | 2017 |
Networking for big data: A survey S Yu, M Liu, W Dou, X Liu, S Zhou IEEE Communications Surveys & Tutorials 19 (1), 531-549, 2016 | 160 | 2016 |
Linguistic computational model based on 2-tuples and intervals Y Dong, G Zhang, WC Hong, S Yu IEEE Transactions on fuzzy systems 21 (6), 1006-1018, 2013 | 151 | 2013 |
Linguistic multiperson decision making based on the use of multiple preference relations Y Dong, Y Xu, S Yu Fuzzy Sets and Systems 160 (5), 603-623, 2009 | 138 | 2009 |
Identifying propagation sources in networks: State-of-the-art and comparative studies J Jiang, S Wen, S Yu, Y Xiang, W Zhou IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016 | 134 | 2016 |
Consensus efficiency in group decision making: A comprehensive comparative study and its optimal design H Zhang, Y Dong, F Chiclana, S Yu European Journal of Operational Research 275 (2), 580-598, 2019 | 118 | 2019 |
Information theory based detection against network behavior mimicking DDoS attacks S Yu, W Zhou, R Doss IEEE Communications Letters 12 (4), 318-321, 2008 | 109 | 2008 |