Search Results for Yu, Shui.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dYu$00252C$002bShui.$0026te$003dILS$0026ps$003d300?dt=list
2024-12-22T18:05:05Z
Tools for Design, Implementation and Verification of Emerging Information Technologies 17th EAI International Conference, TridentCom 2022, Melbourne, Australia, November 23-25, 2022, Proceedings
ent://SD_ILS/0/SD_ILS:520464
2024-12-22T18:05:05Z
2024-12-22T18:05:05Z
Author Yu, Shui. editor. Gu, Bruce. editor. Qu, Youyang. editor. Wang, Xiaodong. editor. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520464.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-33458-0">https://doi.org/10.1007/978-3-031-33458-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Distributed Denial of Service Attack and Defense
ent://SD_ILS/0/SD_ILS:484833
2024-12-22T18:05:05Z
2024-12-22T18:05:05Z
Author Yu, Shui. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-1-4614-9491-1">https://doi.org/10.1007/978-1-4614-9491-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Federated Learning
ent://SD_ILS/0/SD_ILS:520302
2024-12-22T18:05:05Z
2024-12-22T18:05:05Z
Author Yu, Shui. author. (orcid) Cui, Lei. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520302.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-8692-5">https://doi.org/10.1007/978-981-19-8692-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine Learning Empowered Intelligent Data Center Networking Evolution, Challenges and Opportunities
ent://SD_ILS/0/SD_ILS:520662
2024-12-22T18:05:05Z
2024-12-22T18:05:05Z
Author Wang, Ting. author. Li, Bo. author. Chen, Mingsong. author. Yu, Shui. author. (orcid) SpringerLink (Online service)<br/>Preferred Shelf Number XX(520662.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-7395-6">https://doi.org/10.1007/978-981-19-7395-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malicious Attack Propagation and Source Identification
ent://SD_ILS/0/SD_ILS:482633
2024-12-22T18:05:05Z
2024-12-22T18:05:05Z
Author Jiang, Jiaojiao. author. Wen, Sheng. author. Liu, Bo. author. Yu, Shui. author. Xiang, Yang. author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-02179-5">https://doi.org/10.1007/978-3-030-02179-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Delay Tolerant Networks
ent://SD_ILS/0/SD_ILS:518478
2024-12-22T18:05:05Z
2024-12-22T18:05:05Z
Author Gao, Longxiang. author. Yu, Shui. author. Luan, Tom H. author. Zhou, Wanlei. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(518478.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-18108-0">https://doi.org/10.1007/978-3-319-18108-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>