Arama Sonuçları Yu, Shui.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dYu$00252C$002bShui.$0026ps$003d300?dt=list
2024-11-29T03:27:20Z
Tools for Design, Implementation and Verification of Emerging Information Technologies 17th EAI International Conference, TridentCom 2022, Melbourne, Australia, November 23-25, 2022, Proceedings
ent://SD_ILS/0/SD_ILS:520464
2024-11-29T03:27:20Z
2024-11-29T03:27:20Z
Yazar Yu, Shui. editor. Gu, Bruce. editor. Qu, Youyang. editor. Wang, Xiaodong. editor. SpringerLink (Online service)<br/>Yer Numarası XX(520464.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-33458-0">https://doi.org/10.1007/978-3-031-33458-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Distributed Denial of Service Attack and Defense
ent://SD_ILS/0/SD_ILS:484833
2024-11-29T03:27:20Z
2024-11-29T03:27:20Z
Yazar Yu, Shui. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-1-4614-9491-1">https://doi.org/10.1007/978-1-4614-9491-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and Privacy in Federated Learning
ent://SD_ILS/0/SD_ILS:520302
2024-11-29T03:27:20Z
2024-11-29T03:27:20Z
Yazar Yu, Shui. author. (orcid) Cui, Lei. author. SpringerLink (Online service)<br/>Yer Numarası XX(520302.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-8692-5">https://doi.org/10.1007/978-981-19-8692-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Machine Learning Empowered Intelligent Data Center Networking Evolution, Challenges and Opportunities
ent://SD_ILS/0/SD_ILS:520662
2024-11-29T03:27:20Z
2024-11-29T03:27:20Z
Yazar Wang, Ting. author. Li, Bo. author. Chen, Mingsong. author. Yu, Shui. author. (orcid) SpringerLink (Online service)<br/>Yer Numarası XX(520662.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-7395-6">https://doi.org/10.1007/978-981-19-7395-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Malicious Attack Propagation and Source Identification
ent://SD_ILS/0/SD_ILS:482633
2024-11-29T03:27:20Z
2024-11-29T03:27:20Z
Yazar Jiang, Jiaojiao. author. Wen, Sheng. author. Liu, Bo. author. Yu, Shui. author. Xiang, Yang. author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-02179-5">https://doi.org/10.1007/978-3-030-02179-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Delay Tolerant Networks
ent://SD_ILS/0/SD_ILS:518478
2024-11-29T03:27:20Z
2024-11-29T03:27:20Z
Yazar Gao, Longxiang. author. Yu, Shui. author. Luan, Tom H. author. Zhou, Wanlei. author. SpringerLink (Online service)<br/>Yer Numarası XX(518478.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-18108-0">https://doi.org/10.1007/978-3-319-18108-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>