scispace - formally typeset
W

Wei Yu

Researcher at Towson University

Publications -  340
Citations -  10615

Wei Yu is an academic researcher from Towson University. The author has contributed to research in topics: Smart grid & Computer science. The author has an hindex of 38, co-authored 303 publications receiving 7807 citations. Previous affiliations of Wei Yu include Cisco Systems, Inc. & University of Massachusetts Lowell.

Papers
More filters
Journal ArticleDOI

A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications

TL;DR: The relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber- physical world, are explored and existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development.
Journal ArticleDOI

A Survey on the Edge Computing for the Internet of Things

TL;DR: A comprehensive survey, analyzing how edge computing improves the performance of IoT networks and considers security issues in edge computing, evaluating the availability, integrity, and the confidentiality of security strategies of each group, and proposing a framework for security evaluation of IoT Networks with edge computing.
Journal ArticleDOI

A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends

TL;DR: A thorough investigation of deep learning in its applications and mechanisms is sought, as a categorical collection of state of the art in deep learning research, to provide a broad reference for those seeking a primer on deep learning and its various implementations, platforms, algorithms, and uses in a variety of smart-world systems.
Journal ArticleDOI

A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective

TL;DR: This paper comprehensively survey the body of existing research on I-IoT, and proposes a three-dimensional framework to explore the existing research space and investigate the adoption of some representative networking technologies, including 5G, machine-to-machine communication, and software-defined networking.
Journal ArticleDOI

On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures

TL;DR: This work studies the problem of finding the optimal attack strategy--i.e., a data-injection attacking strategy that selects a set of meters to manipulate so as to cause the maximum damage and formalizes the problem and develops efficient algorithms to identify the optimal meter set.