Search Results for Yu, Shui. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dYu$00252C$002bShui.$0026ps$003d300?dt=list 2024-07-17T13:19:05Z Tools for Design, Implementation and Verification of Emerging Information Technologies 17th EAI International Conference, TridentCom 2022, Melbourne, Australia, November 23-25, 2022, Proceedings ent://SD_ILS/0/SD_ILS:520464 2024-07-17T13:19:05Z 2024-07-17T13:19:05Z Author&#160;Yu, Shui. editor.&#160;Gu, Bruce. editor.&#160;Qu, Youyang. editor.&#160;Wang, Xiaodong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520464.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-33458-0">https://doi.org/10.1007/978-3-031-33458-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Denial of Service Attack and Defense ent://SD_ILS/0/SD_ILS:484833 2024-07-17T13:19:05Z 2024-07-17T13:19:05Z Author&#160;Yu, Shui. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-9491-1">https://doi.org/10.1007/978-1-4614-9491-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Federated Learning ent://SD_ILS/0/SD_ILS:520302 2024-07-17T13:19:05Z 2024-07-17T13:19:05Z Author&#160;Yu, Shui. author. (orcid)&#160;Cui, Lei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520302.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-8692-5">https://doi.org/10.1007/978-981-19-8692-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning Empowered Intelligent Data Center Networking Evolution, Challenges and Opportunities ent://SD_ILS/0/SD_ILS:520662 2024-07-17T13:19:05Z 2024-07-17T13:19:05Z Author&#160;Wang, Ting. author.&#160;Li, Bo. author.&#160;Chen, Mingsong. author.&#160;Yu, Shui. author. (orcid)&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520662.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-7395-6">https://doi.org/10.1007/978-981-19-7395-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malicious Attack Propagation and Source Identification ent://SD_ILS/0/SD_ILS:482633 2024-07-17T13:19:05Z 2024-07-17T13:19:05Z Author&#160;Jiang, Jiaojiao. author.&#160;Wen, Sheng. author.&#160;Liu, Bo. author.&#160;Yu, Shui. author.&#160;Xiang, Yang. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02179-5">https://doi.org/10.1007/978-3-030-02179-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Delay Tolerant Networks ent://SD_ILS/0/SD_ILS:518478 2024-07-17T13:19:05Z 2024-07-17T13:19:05Z Author&#160;Gao, Longxiang. author.&#160;Yu, Shui. author.&#160;Luan, Tom H. author.&#160;Zhou, Wanlei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518478.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-18108-0">https://doi.org/10.1007/978-3-319-18108-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>