Skip to main content

and
  1. No Access

    Book and Conference Proceedings

  2. No Access

    Chapter and Conference Paper

    A Heterogeneous Propagation Graph Model for Rumor Detection Under the Relationship Among Multiple Propagation Subtrees

    Pervasive rumors in social networks have significantly harmed society due to their seditious and misleading effects. Existing rumor detection studies only consider practical features from a propagation tree, b...

    Guoyi Li, **gyuan Hu, Yulei Wu in Machine Learning and Knowledge Discovery i… (2023)

  3. Chapter

    Correction to: 6G Mobile Wireless Networks

    Author Osama Zwaid Alsulami name is updated to Osama Zwaid Aletri throughout the book.

    Yulei Wu, Sukhdeep Singh, Tarik Taleb, Abhishek Roy in 6G Mobile Wireless Networks (2021)

  4. No Access

    Chapter

    Introduction

    The fifth generation mobile wireless communications steered services across a wide range of sectors such as transport, healthcare, retail, finance, factories, etc. Deployment of ultra-low latency and high band...

    Sukhdeep Singh, Yulei Wu, Tarik Taleb in 6G Mobile Wireless Networks (2021)

  5. No Access

    Chapter

    A Comprehensive Survey

    This chapter provides details of the existing work related to our study. It introduces the schemes related to privacy protection and behavior accountability in Sect. 2.1. In this book, we not only provide the sol...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  6. No Access

    Chapter

    Summary

    Privacy protection and behavior accountability are two important factors of network security, and they are a pair of conflicting requirements. If we want to strengthen the supervision and accountability of use...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  7. No Access

    Chapter

    Introduction

    This chapter introduces the research background of this book and provides definitions of privacy and accountability that apply to this book. It discusses the privacy protection and behavior accountability from...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  8. No Access

    Chapter

    Encrypted Traffic Classification

    With the increasing emphasis on information security by users, many encrypted traffic is being transmitted over the network. However, even if the data is encrypted, it is not enough to protect the privacy of u...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  9. No Access

    Chapter

    An Information-Centric Networking Based Architecture

    Information-Centric Networking (ICN) has become a promising candidate for future Internet architectures. Named Data Networking (NDN) is one of the most typical ICN architectures, where communication is driven ...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  10. No Access

    Chapter

    A Content-Based Architecture

    This chapter introduces an architecture based on content that can be used to balance privacy protection and behavior accountability in the network. The terms requester and receiver are used interchangeably in thi...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  11. No Access

    Chapter

    A Service-Based Architecture

    This chapter introduces a service-based architecture that can be used to achieve a balance between privacy protection and behavior accountability. In practice, the architecture proposed in this chapter can be ...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  12. No Access

    Chapter

    A Flow-Based Architecture

    This chapter introduces a flow-based architecture that can be used to achieve a balance between privacy protection and behavior accountability. A self-certifying identifier is proposed to efficiently identify ...

    Yuxiang Ma, Yulei Wu, **gguo Ge in Accountability and Privacy in Network Security (2020)

  13. No Access

    Chapter and Conference Paper

    D2Sketch: Supporting Efficient Identification of Heavy Hitters Over Sliding Windows

    Heavy hitters can provide an important indicator for detecting abnormal network events. Most of existing algorithms for heavy hitter identification are implemented to deal with static datasets generated withi...

    Haina Tang, Yulei Wu, Tong Li, Hongbin Shi in Smart Grid Inspired Future Technologies (2017)

  14. Article

    Editorial: recent advances in communication networks and multimedia technologies

    Yulei Wu, Peter Mueller, **gguo Ge, Bahman Javadi in Multimedia Tools and Applications (2015)

  15. No Access

    Book and Conference Proceedings

    Algorithms and Architectures for Parallel Processing

    14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II

    **an-he Sun, Wenyu Qu in Lecture Notes in Computer Science (2014)

  16. No Access

    Book and Conference Proceedings

    Algorithms and Architectures for Parallel Processing

    14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part I

    **an-he Sun, Wenyu Qu in Lecture Notes in Computer Science (2014)

  17. No Access

    Article

    Analytical modelling of networks in multicomputer systems under bursty and batch arrival traffic

    The hypercube and torus are two important message-passing network architectures of high-performance multicomputers. Analytical models of multicomputer networks under the non-bursty Poisson traffic have been wi...

    Yulei Wu, Geyong Min, Mohamed Ould-Khaoua, Hao Yin in The Journal of Supercomputing (2010)

  18. No Access

    Article

    An analytical model for torus networks in the presence of batch message arrivals with hot-spot destinations

    Interconnection networks are hardware fabrics supporting communications between individual processors in multicomputers. The low-dimensional k-ary n-cubes (or torus) with adaptive wormhole switching have attracte...

    Yulei Wu, Geyong Min, Mohamed Ould-Khaoua in International Journal of Automation and Co… (2009)

  19. No Access

    Chapter and Conference Paper

    Performance Analysis of Interconnection Networks Under Bursty and Batch Arrival Traffic

    Analytical models for adaptive routing in multicomputer inter-connection networks with the traditional non-bursty Poisson traffic have been widely reported in the literature. However, traffic loads generated b...

    Yulei Wu, Geyong Min, Lan Wang in Algorithms and Architectures for Parallel Processing (2007)