Остановите войну!
for scientists:
default search action
Shui Yu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Shui Yu 0001 — University of Technology Sydney, School of Computer Science, Faculty of Engineering and Information Technology, Ultimo, NSW, Australia (and 1 more)
- Shui Yu 0002 — Dongguan University of Technology, Dongguan, China (and 1 more)
- Shui Yu 0003 — Shanghai Jiaotong University, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Yuxian Huang, Geng Yang, Hao Zhou, Hua Dai, Dong Yuan, Shui Yu:
VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks. Comput. Secur. 136: 103562 (2024) - [j12]Ming Zhou, Zhen Yang, Haiyang Yu, Shui Yu:
VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain. J. Netw. Comput. Appl. 223: 103814 (2024) - [i4]Yakun Chen, Kaize Shi, Zhangkai Wu, Juan Chen, Xianzhi Wang, Julian J. McAuley, Guandong Xu, Shui Yu:
Temporal Disentangled Contrastive Diffusion Model for Spatiotemporal Imputation. CoRR abs/2402.11558 (2024) - 2023
- [j11]Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu, Jinqiao Shi, Zhaofeng Ma:
An efficient confidentiality protection solution for pub/sub system. Cybersecur. 6(1): 34 (2023) - [j10]Tongke Cui, Ruopeng Yang, Chao Fang, Shui Yu:
Deep Reinforcement Learning-Based Resource Allocation for Content Distribution in IoT-Edge-Cloud Computing Environments. Symmetry 15(1): 217 (2023) - [j9]Decai Li, Mian Zhang, Tianbo Kang, Yue Ma, Hongbiao Xiang, Shui Yu, Kesheng Wang:
Frequency Energy Ratio Cell Based Operational Security Domain Analysis of Planetary Gearbox. IEEE Trans. Reliab. 72(1): 49-60 (2023) - [c10]Jing Wang, Chenhao Qi, Shui Yu:
Hybrid Beamforming Design for Beam-Hopping LEO Satellite Communications. GLOBECOM 2023: 3959-3964 - [c9]Sicheng Zhang, Jie Liu, Zliida Bao, Shui Yu, Yun Lin:
Adversarial Domain Generalization Defense for Automatic Modulation Classification. ICCC 2023: 1-6 - [c8]Haoran Zha, Wenyan Wang, Shui Yu, Yun Lin:
SEI-DM: Crafting Revolutionary RF Signals in Low-Resource Settings via Diffusion Model. ICCT 2023: 890-895 - [c7]Yan Ke, Shui Yu, Zhonglai Wang, Yun Li:
ECSFF: Exploring Efficient Cross-Scale Feature Fusion for Medical Image Segmentation. ICAC 2023: 1-6 - [c6]Yuqing Zhao, Shui Yu, Yun Li:
Software Platform of Reliability Analysis Using an Adaptive Kriging Model. ICAC 2023: 1-6 - [c5]Yubin Zheng, Cheng Cheng, Shui Yu, Xian Ye, Xinghua Li, Zixuan Wang:
Predicting the Vehicle Turn-in Rates of Highway Service Area: A Random Forest Approach. ITSC 2023: 1349-1354 - [i3]Jiwei Guan, Lei Pan, Chen Wang, Shui Yu, Longxiang Gao, Xi Zheng:
Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced Driver-Assistance System. CoRR abs/2306.05358 (2023) - 2022
- [j8]Changzheng Liu, Fengling Huang, Ruixuan Li, Qi Yang, Yuhua Li, Shui Yu:
Community detection using multitopology and attributes in social networks. Concurr. Comput. Pract. Exp. 34(12) (2022) - [j7]Sven Groppe, Sanju Tiwari, Shui Yu:
Contributions to the 6th Workshop on Very Large Internet of Things (VLIoT 2022). Open J. Internet Things 8(1): 1-6 (2022) - 2021
- [c4]Siqi Yin, Caihong Liu, Yi Xie, Shui Yu:
A Review on the Research of Producer Services Supply Chain in China. HCI (35) 2021: 126-137 - 2020
- [j6]Ling Ding, Shui Yu, Li Li:
Research trends of cultural identity of mongol nationality based on mapping knowledge domain and visualization. J. Intell. Fuzzy Syst. 38(6): 6873-6882 (2020) - [j5]Zhonglai Wang, Jing Liu, Shui Yu:
Time-variant reliability prediction for dynamic systems using partial information. Reliab. Eng. Syst. Saf. 195: 106756 (2020)
2010 – 2019
- 2019
- [j4]Weiqiang Shen, Chuanlin Zhang, Shui Yu:
An Energy-Efficient Scheme for Constructing Underwater Sensor Barrier with Minimum Mobile Sensors. Ad Hoc Sens. Wirel. Networks 43(1-2): 57-84 (2019) - [i2]Binbin Jin, Enhong Chen, Hongke Zhao, Zhenya Huang, Qi Liu, Hengshu Zhu, Shui Yu:
Promotion of Answer Value Measurement with Domain Effects in Community Question Answering Systems. CoRR abs/1906.00156 (2019) - 2018
- [j3]Shui Yu, Zhonglai Wang, Kewang Zhang:
Sequential time-dependent reliability analysis for the lower extremity exoskeleton under uncertainty. Reliab. Eng. Syst. Saf. 170: 45-52 (2018) - [j2]Zheng Wang, Shui Yu, Scott Rose:
An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks. EAI Endorsed Trans. Security Safety 4(14): e3 (2018) - 2017
- [j1]Shui Yu, Shanzhuo Zhang, Kuanquan Wang, Yong Xia, Henggui Zhang:
An efficient and fast GPU-based algorithm for visualizing large volume of 4D data from virtual heart simulations. Biomed. Signal Process. Control. 35: 8-18 (2017) - 2016
- [c3]Shui Yu, Jingsong Yang, Shuangyan He, Lin Ren, Zhiguo He:
Effect of precipitation on the wind retrieval from synthetic aperture radar. CISP-BMEI 2016: 608-612 - [i1]Yong Zhan, Du Xu, Hong-Fang Yu, Shui Yu:
Incentivizing Users of Data Centers Participate in The Demand Response Programs via Time-Varying Monetary Rewards. CoRR abs/1604.01950 (2016)
2000 – 2009
- 2006
- [c2]Shui Yu, Zhongwen Li, Bin Liu:
Online Algorithm for Application Layer Anycast. AMT 2006: 340-345 - [c1]Zhongwen Li, Hong Chen, Shui Yu:
Performance optimization for energy-aware adaptive checkpointing in embedded real-time systems. DATE 2006: 678-683
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-19 04:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint