Edge computing security: State of the art and challenges Y Xiao, Y Jia, C Liu, X Cheng, J Yu, W Lv Proceedings of the IEEE 107 (8), 1608-1631, 2019 | 539 | 2019 |
A privacy preserving communication protocol for IoT applications in smart homes T Song, R Li, B Mei, J Yu, X Xing, X Cheng IEEE Internet of Things Journal 4 (6), 1844-1852, 2017 | 393 | 2017 |
A cluster-based routing protocol for wireless sensor networks with nonuniform node distribution J Yu, Y Qi, G Wang, X Gu AEU-International Journal of Electronics and Communications 66 (1), 54-61, 2012 | 376 | 2012 |
Cost-efficient strategies for restraining rumor spreading in mobile social networks Z He, Z Cai, J Yu, X Wang, Y Sun, Y Li IEEE Transactions on Vehicular Technology 66 (3), 2789-2800, 2016 | 319 | 2016 |
Robot manipulator control using neural networks: A survey L Jin, S Li, J Yu, J He Neurocomputing 285, 23-34, 2018 | 302 | 2018 |
Deep learning based inference of private information using embedded sensors in smart devices Y Liang, Z Cai, J Yu, Q Han, Y Li IEEE Network 32 (4), 8-14, 2018 | 285 | 2018 |
A differential-private framework for urban traffic flows estimation via taxi companies Z Cai, X Zheng, J Yu IEEE Transactions on Industrial Informatics 15 (12), 6492-6499, 2019 | 243 | 2019 |
Connected dominating sets in wireless ad hoc and sensor networks–A comprehensive survey J Yu, N Wang, G Wang, D Yu Computer Communications 36 (2), 121-134, 2013 | 242 | 2013 |
Latent-data privacy preserving with customized data utility for social network data Z He, Z Cai, J Yu IEEE Transactions on Vehicular Technology 67 (1), 665-673, 2017 | 204 | 2017 |
IoT applications on secure smart shopping system R Li, T Song, N Capurso, J Yu, J Couture, X Cheng IEEE Internet of Things Journal 4 (6), 1945-1954, 2017 | 197 | 2017 |
A noise-suppressing neural algorithm for solving the time-varying system of linear equations: A control-based approach L Jin, S Li, B Hu, M Liu, J Yu IEEE Transactions on Industrial Informatics 15 (1), 236-246, 2018 | 168 | 2018 |
Follow but no track: Privacy preserved profile publishing in cyber-physical social systems X Zheng, Z Cai, J Yu, C Wang, Y Li IEEE Internet of Things Journal 4 (6), 1868-1878, 2017 | 167 | 2017 |
An energy-aware distributed unequal clustering protocol for wireless sensor networks J Yu, Y Qi, G Wang, Q Guo, X Gu International Journal of Distributed Sensor Networks 7 (1), 202145, 2011 | 158 | 2011 |
Mutual Privacy Preserving -Means Clustering in Social Participatory Sensing K Xing, C Hu, J Yu, X Cheng, F Zhang IEEE Transactions on Industrial Informatics 13 (4), 2066-2076, 2017 | 143 | 2017 |
An XGBoost-based physical fitness evaluation model using advanced feature selection and Bayesian hyper-parameter optimization for wearable running monitoring J Guo, L Yang, R Bie, J Yu, Y Gao, Y Shen, A Kos Computer Networks 151, 166-180, 2019 | 138 | 2019 |
Coverage Contribution Area Based -Coverage for Wireless Sensor Networks J Yu, S Wan, X Cheng, D Yu IEEE Transactions on Vehicular Technology 66 (9), 8510-8523, 2017 | 138 | 2017 |
Forecasting of forex time series data based on deep learning L Ni, Y Li, X Wang, J Zhang, J Yu, C Qi Procedia computer science 147, 647-652, 2019 | 135 | 2019 |
Applications of differential privacy in social network analysis: A survey H Jiang, J Pei, D Yu, J Yu, B Gong, X Cheng IEEE transactions on knowledge and data engineering 35 (1), 108-127, 2021 | 133 | 2021 |
BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT S Liu, J Yu, Y Xiao, Z Wan, S Wang, B Yan IEEE Internet of Things Journal 7 (9), 7851-7867, 2020 | 132 | 2020 |
Approximate holistic aggregation in wireless sensor networks J Li, S Cheng, Z Cai, J Yu, C Wang, Y Li ACM Transactions on Sensor Networks (TOSN) 13 (2), 1-24, 2017 | 123 | 2017 |