Skip to main content

previous disabled Page of 2
and
  1. No Access

    Book and Conference Proceedings

  2. No Access

    Chapter and Conference Paper

    A Heterogeneous Propagation Graph Model for Rumor Detection Under the Relationship Among Multiple Propagation Subtrees

    Pervasive rumors in social networks have significantly harmed society due to their seditious and misleading effects. Existing rumor detection studies only consider practical features from a propagation tree, b...

    Guoyi Li, **gyuan Hu, Yulei Wu in Machine Learning and Knowledge Discovery i… (2023)

  3. Article

    Editorial: Big data technologies and applications

    Yulei Wu, Yi Pan, Payam Barnaghi, Zhiyuan Tan, **gguo Ge, Hao Wang in Wireless Networks (2022)

  4. No Access

    Book

  5. Article

    Editorial: Deep Learning for Big Data Analytics

    Yulei Wu, Fei Hao, Sambit Bakshi, Haojun Huang in Mobile Networks and Applications (2021)

  6. Chapter

    Correction to: 6G Mobile Wireless Networks

    Author Osama Zwaid Alsulami name is updated to Osama Zwaid Aletri throughout the book.

    Yulei Wu, Sukhdeep Singh, Tarik Taleb, Abhishek Roy in 6G Mobile Wireless Networks (2021)

  7. No Access

    Chapter

    Introduction

    The fifth generation mobile wireless communications steered services across a wide range of sectors such as transport, healthcare, retail, finance, factories, etc. Deployment of ultra-low latency and high band...

    Sukhdeep Singh, Yulei Wu, Tarik Taleb in 6G Mobile Wireless Networks (2021)

  8. No Access

    Chapter

    A Comprehensive Survey

    This chapter provides details of the existing work related to our study. It introduces the schemes related to privacy protection and behavior accountability in Sect. 2.1. In this book, we not only provide the sol...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  9. No Access

    Chapter

    Summary

    Privacy protection and behavior accountability are two important factors of network security, and they are a pair of conflicting requirements. If we want to strengthen the supervision and accountability of use...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  10. No Access

    Chapter

    Introduction

    This chapter introduces the research background of this book and provides definitions of privacy and accountability that apply to this book. It discusses the privacy protection and behavior accountability from...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  11. No Access

    Chapter

    Encrypted Traffic Classification

    With the increasing emphasis on information security by users, many encrypted traffic is being transmitted over the network. However, even if the data is encrypted, it is not enough to protect the privacy of u...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  12. No Access

    Chapter

    An Information-Centric Networking Based Architecture

    Information-Centric Networking (ICN) has become a promising candidate for future Internet architectures. Named Data Networking (NDN) is one of the most typical ICN architectures, where communication is driven ...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  13. No Access

    Chapter and Conference Paper

    A New Bitcoin Address Association Method Using a Two-Level Learner Model

    Users in the Bitcoin system adopt a pseudonym-Bitcoin address as the transaction account, making Bitcoin address correlation analysis a challenging task. Under this circumstance, this paper provides a new Bitc...

    Tengyu Liu, **gguo Ge, Yulei Wu, Bowei Dai in Algorithms and Architectures for Parallel … (2020)

  14. No Access

    Chapter

    A Content-Based Architecture

    This chapter introduces an architecture based on content that can be used to balance privacy protection and behavior accountability in the network. The terms requester and receiver are used interchangeably in thi...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  15. No Access

    Chapter

    A Service-Based Architecture

    This chapter introduces a service-based architecture that can be used to achieve a balance between privacy protection and behavior accountability. In practice, the architecture proposed in this chapter can be ...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  16. No Access

    Chapter

    A Flow-Based Architecture

    This chapter introduces a flow-based architecture that can be used to achieve a balance between privacy protection and behavior accountability. A self-certifying identifier is proposed to efficiently identify ...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  17. No Access

    Article

    Efficient Identification of TOP-K Heavy Hitters over Sliding Windows

    Due to the increasing volume of network traffic and growing complexity of network environment, rapid identification of heavy hitters is quite challenging. To deal with the massive data streams in real-time, ac...

    Haina Tang, Yulei Wu, Tong Li, Chun**g Han, **gguo Ge in Mobile Networks and Applications (2019)

  18. No Access

    Article

    The study of colloidal lead bromide perovskite nanocrystals and its application in hybrid solar cells

    In this study, we investigated inorganic cesium lead halide perovskite semiconductor and tested its application in photovoltaics. Highly crystalline material was synthesized by two different approaches, includ...

    Khurram Usman, Shuaiqiang Ming, **aohui Liu, **aodong Li in Applied Nanoscience (2018)

  19. No Access

    Book and Conference Proceedings

  20. Chapter and Conference Paper

    Erratum to: Progress in Intelligent Computing Techniques: Theory, Practice, and Applications

    Pankaj Kumar Sa, Manmath Narayan Sahoo in Progress in Intelligent Computing Techniqu… (2018)

previous disabled Page of 2