Bo Luo

Orcid: 0000-0001-8196-2436

According to our database1, Bo Luo authored at least 142 papers between 2002 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps.
Proc. Priv. Enhancing Technol., 2025

Depth-Wise Convolutions in Vision Transformers for efficient training on small datasets.
Neurocomputing, 2025

2024
Model-Free Predictive Current Control of Permanent Magnet Synchronous Motor Based on Estimation of Current Variations.
IEEE Trans. Ind. Electron., August, 2024

A multi-loads capacitive power transfer system for railway intelligent monitoring systems based on single relay plate.
Int. J. Circuit Theory Appl., January, 2024

PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption.
Proc. Priv. Enhancing Technol., 2024

Improving Vision Transformers by Overlapping Heads in Multi-Head Self-Attention.
CoRR, 2024

FakeBehalf: Imperceptible Email Spoofing Attacks against the Delegation Mechanism in Email Systems.
Proceedings of the 33rd USENIX Security Symposium, 2024

d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.
Proceedings of the 33rd USENIX Security Symposium, 2024

You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation.
Proceedings of the 33rd USENIX Security Symposium, 2024

No Source Code? No Problem! Demystifying and Detecting Mask Apps in iOS.
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024

Companion Apps or Backdoors? On the Security of Automotive Companion Apps.
Proceedings of the Computer Security - ESORICS 2024, 2024

The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking.
Proceedings of the Computer Security - ESORICS 2024, 2024

A Comprehensive Analysis of Security Vulnerabilities and Attacks in Satellite Modems.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics.
IEEE Trans. Dependable Secur. Comput., 2023

Gender, Smoking History, and Age Prediction from Laryngeal Images.
J. Imaging, 2023

Aphid Cluster Recognition and Detection in the Wild Using Deep Learning Models.
CoRR, 2023

A New Dataset and Comparative Study for Aphid Cluster Detection.
CoRR, 2023

Check Me If You Can: Detecting ChatGPT-Generated Academic Writing using CheckGPT.
CoRR, 2023

The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Poster Abstract: SmartAppZoo: a Repository of SmartThings Apps for IoT Benchmarking.
Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023

Counterfactual Prediction Under Selective Confounding.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data Perspective.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Semantic clustering based deduction learning for image recognition and classification.
Pattern Recognit., 2022

Dynamic Label Assignment for Object Detection by Combining Predicted IoUs and Anchor IoUs.
J. Imaging, 2022

Resource-Interaction Graph: Efficient Graph Representation for Anomaly Detection.
CoRR, 2022

Dynamic Label Assignment for Object Detection by Combining Predicted and Anchor IoUs.
CoRR, 2022

Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature.
Proceedings of the Security and Privacy in Communication Networks, 2022

A Comparison of Advanced IPT Systems with Nanocrystalline and Ferrite Cores for Wireless EV Charging.
Proceedings of the IECON 2022, 2022

Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems.
Proceedings of the Computer Security - ESORICS 2022, 2022

IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps.
Proceedings of the Computer Security - ESORICS 2022, 2022

Invernet: An Inversion Attack Framework to Infer Fine-Tuning Datasets through Word Embeddings.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Blacktooth: Breaking through the Defense of Bluetooth in Silence.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory.
IEEE Trans. Dependable Secur. Comput., 2021

You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Container Escape Detection for Edge Devices.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

CONTRA: Defending Against Poisoning Attacks in Federated Learning.
Proceedings of the Computer Security - ESORICS 2021, 2021

Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Tool Wear Prediction via Multidimensional Stacked Sparse Autoencoders With Feature Fusion.
IEEE Trans. Ind. Informatics, 2020

Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain.
IEEE Trans. Dependable Secur. Comput., 2020

CSRN: Collaborative Sequential Recommendation Networks for News Retrieval.
CoRR, 2020

You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi.
Proceedings of the 29th USENIX Security Symposium, 2020

WOLF: automated machine learning workflow management framework for malware detection and other applications.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020

On Configurable Defense against Adversarial Example Attacks.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks.
Proceedings of the Computer Security - ESORICS 2020, 2020

Smart Grid Security: Attack Modeling from a CPS Perspective.
Proceedings of the IEEE Computing, 2020

DeepDyve: Dynamic Verification for Deep Neural Networks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Using Multiple-Feature-Spaces-Based Deep Learning for Tool Condition Monitoring in Ultraprecision Manufacturing.
IEEE Trans. Ind. Electron., 2019

Early Fault Detection of Machine Tools Based on Deep Learning and Dynamic Identification.
IEEE Trans. Ind. Electron., 2019

#DontTweetThis: Scoring Private Information in Social Networks.
Proc. Priv. Enhancing Technol., 2019

Content-Aware Trust Propagation Toward Online Review Spam Detection.
ACM J. Data Inf. Qual., 2019

Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers.
J. Comput. Secur., 2019

Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case.
IEEE Internet Things J., 2019

Region-Wise Attack: On Efficient Generation of Robust Physical Adversarial Examples.
CoRR, 2019

Protecting mobile devices from physical memory attacks with targeted encryption.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Characterizing Man-made vs. Machine-made Chatbot Dialogs.
Proceedings of the 2019 Truth and Trust Online Conference (TTO 2019), 2019

Arcana: Enabling Private Posts on Public Microblog Platforms.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

On Functional Test Generation for Deep Neural Network IPs.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

Wideband Coding Metamaterial with Polarization Insensitivity.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

The antecedent and consequence of users' satisfaction and dissatisfaction with information seeking in online health communities.
Proceedings of the Information... Anyone, Anywhere, Any Time, Any Way, 2019

D2NN: a fine-grained dual modular redundancy framework for deep neural networks.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

TF-BIV: transparent and fine-grained binary integrity verification in the cloud.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Copker: A Cryptographic Engine Against Cold-Boot Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection.
Proceedings of the Security and Privacy in Communication Networks, 2018

My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways.
Proceedings of the Computer Security, 2018

I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Towards Imperceptible and Robust Adversarial Example Attacks Against Neural Networks.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Learning Social Circles in Ego-Networks Based on Multi-View Network Structure.
IEEE Trans. Knowl. Data Eng., 2017

Cyber-Physical Systems Security - A Survey.
IEEE Internet Things J., 2017

Content-Based Classification of Sensitive Tweets.
Int. J. Semantic Comput., 2017

Classification of Private Tweets Using Tweet Content.
Proceedings of the 11th IEEE International Conference on Semantic Computing, 2017

A-Tor: Accountable Anonymity in Tor.
Proceedings of the Security and Privacy in Communication Networks, 2017

Structural superpixel descriptor for visual tracking.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Fault injection attack on deep neural network.
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017

Using ID-Hopping to Defend Against Targeted DoS on CAN.
Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles, 2017

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions.
IEEE Secur. Priv., 2016

Textual Ontology and Visual Features Based Search for a Paleontology Digital Library.
Proceedings of the 28th IEEE International Conference on Tools with Artificial Intelligence, 2016

Boosted local classifiers for visual tracking.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2016

2015
HyXAC: Hybrid XML Access Control Integrating View-Based and Query-Rewriting Approaches.
IEEE Trans. Knowl. Data Eng., 2015

Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Ontology-Based Visualization of Healthcare Data Mined from Online Healthcare Forums.
Proceedings of the 2015 International Conference on Healthcare Informatics, 2015

Cyber-physical security for smart cars: taxonomy of vulnerabilities, threats, and attacks.
Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems, 2015

FamilyID: A Hybrid Approach to Identify Family Information from Microblogs.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Building Topic Models to Predict Author Attributes from Twitter Messages.
Proceedings of the Working Notes of CLEF 2015, 2015

POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Mining Adverse Drug Reactions from Online Healthcare Forums using Hidden Markov Model.
BMC Medical Informatics Decis. Mak., 2014

WHU-NERCMS at TRECVID2014: Instance Search Task.
Proceedings of the 2014 TREC Video Retrieval Evaluation, 2014

Copker: Computing with Private Keys without RAM.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Robust tracking via saliency-based appearance model.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Automatic Social Circle Detection Using Multi-View Clustering.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Content-Based Access Control: Use data content to assist access control for large-scale content-centric databases.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2013
iLike: Bridging the Semantic Gap in Vertical Image Search by Integrating Text and Visual Features.
IEEE Trans. Knowl. Data Eng., 2013

Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing.
IEEE Trans. Inf. Forensics Secur., 2013

High-resolution remote sensing image segmentation based on improved RIU-LBP and SRM.
EURASIP J. Wirel. Commun. Netw., 2013

HyXAC: a hybrid approach for XML access control.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

A Complete Methodology for Estimating Dynamics of the Heavy Machine Tool Structure.
Proceedings of the Intelligent Robotics and Applications - 6th International Conference, 2013

Access control for big data using data content.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

Content-based assessment of the credibility of online healthcare information.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

2012
Multilingual Needs and Expectations in Digital Libraries: A Survey of Academic Users with Different Languages.
Electron. Libr., 2012

GRADE: Graceful Degradation in Byzantine Quorum Systems.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Preserving data integrity for smart grid data aggregation.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

IPKB: a digital library for invertebrate paleontology.
Proceedings of the 12th ACM/IEEE-CS Joint Conference on Digital Libraries, 2012

Location Type Classification Using Tweet Content.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

Mining Adverse Drug Side-Effects from Online Medical Forums.
Proceedings of the 2012 IEEE Second International Conference on Healthcare Informatics, 2012

Stalking online: on user privacy in social networks.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

S2A: secure smart household appliances.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Predicting aggregate social activities using continuous-time stochastic process.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Identification of transposable elements of the giant panda (Ailuropoda melanoleuca) genome.
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2012

2011
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata.
VLDB J., 2011

Secure and privacy-preserving information aggregation for smart grids.
Int. J. Secur. Networks, 2011

Privacy Preserving Group Linkage.
Proceedings of the Scientific and Statistical Database Management, 2011

Healthcare Information Networks: Discovery and Evaluation.
Proceedings of the 2011 IEEE International Conference on Healthcare Informatics, 2011

Cephalometric Landmark Tracing Using Deformable Templates.
Proceedings of the 2011 IEEE International Conference on Healthcare Informatics, 2011

User Groups in Social Networks: An Experimental Study on YouTube.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Content based social behavior prediction: a multi-task learning approach.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

2010
iLike: integrating visual and textual features for vertical search.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
On Protecting Private Information in Social Networks: AProposal.
Proceedings of the 25th International Conference on Data Engineering, 2009

2008
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering.
Proceedings of the Collaborative Computing: Networking, 2008

2007
Pragmatic XML Access Control Using Off-the-Shelf RDBMS.
Proceedings of the Computer Security, 2007

Security-Conscious XML Indexing.
Proceedings of the Advances in Databases: Concepts, 2007

Automaton segmentation: a new approach to preserve privacy in xml information brokering.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

2005
Adaptive Information: Improving Business through Semantic Interoperability, Grid Computing, and Enterprise Integration.
Inf. Process. Manag., 2005

The evolvement and relevant factors of price discovery: A case study of cross-listed stocks in China.
Expert Syst. Appl., 2005

Empirical study of trading rule discovery in China stock market.
Expert Syst. Appl., 2005

Deep Set Operators for XQuery.
Proceedings of the Second International Workshop on XQuery Implementation, 2005

2004
A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

Content-based SMIL retrieval.
Proceedings of the Third International Conference on Image and Graphics, 2004

QFilter: fine-grained run-time XML access control via NFA-based query rewriting.
Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management, 2004

2003
Video caption detection and extraction using temporal information.
Proceedings of the 2003 International Conference on Image Processing, 2003

2002
Video text extraction using temporal feature vectors.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002


  Loading...