Bo Luo
Orcid: 0000-0001-8196-2436
According to our database1,
Bo Luo
authored at least 142 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Proc. Priv. Enhancing Technol., 2025
Depth-Wise Convolutions in Vision Transformers for efficient training on small datasets.
Neurocomputing, 2025
2024
Model-Free Predictive Current Control of Permanent Magnet Synchronous Motor Based on Estimation of Current Variations.
IEEE Trans. Ind. Electron., August, 2024
A multi-loads capacitive power transfer system for railway intelligent monitoring systems based on single relay plate.
Int. J. Circuit Theory Appl., January, 2024
PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption.
Proc. Priv. Enhancing Technol., 2024
CoRR, 2024
FakeBehalf: Imperceptible Email Spoofing Attacks against the Delegation Mechanism in Email Systems.
Proceedings of the 33rd USENIX Security Symposium, 2024
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.
Proceedings of the 33rd USENIX Security Symposium, 2024
You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
A Comprehensive Analysis of Security Vulnerabilities and Attacks in Satellite Modems.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
CoRR, 2023
CoRR, 2023
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023
Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data Perspective.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Semantic clustering based deduction learning for image recognition and classification.
Pattern Recognit., 2022
Dynamic Label Assignment for Object Detection by Combining Predicted IoUs and Anchor IoUs.
J. Imaging, 2022
CoRR, 2022
Dynamic Label Assignment for Object Detection by Combining Predicted and Anchor IoUs.
CoRR, 2022
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature.
Proceedings of the Security and Privacy in Communication Networks, 2022
A Comparison of Advanced IPT Systems with Nanocrystalline and Ferrite Cores for Wireless EV Charging.
Proceedings of the IECON 2022, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Invernet: An Inversion Attack Framework to Infer Fine-Tuning Datasets through Word Embeddings.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022
LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory.
IEEE Trans. Dependable Secur. Comput., 2021
You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Tool Wear Prediction via Multidimensional Stacked Sparse Autoencoders With Feature Fusion.
IEEE Trans. Ind. Informatics, 2020
Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain.
IEEE Trans. Dependable Secur. Comput., 2020
CoRR, 2020
You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi.
Proceedings of the 29th USENIX Security Symposium, 2020
WOLF: automated machine learning workflow management framework for malware detection and other applications.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020
CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the IEEE Computing, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Using Multiple-Feature-Spaces-Based Deep Learning for Tool Condition Monitoring in Ultraprecision Manufacturing.
IEEE Trans. Ind. Electron., 2019
Early Fault Detection of Machine Tools Based on Deep Learning and Dynamic Identification.
IEEE Trans. Ind. Electron., 2019
Proc. Priv. Enhancing Technol., 2019
ACM J. Data Inf. Qual., 2019
Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers.
J. Comput. Secur., 2019
Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case.
IEEE Internet Things J., 2019
CoRR, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 2019 Truth and Trust Online Conference (TTO 2019), 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019
Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
The antecedent and consequence of users' satisfaction and dissatisfaction with information seeking in online health communities.
Proceedings of the Information... Anyone, Anywhere, Any Time, Any Way, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
Proceedings of the Computer Security, 2018
I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Towards Imperceptible and Robust Adversarial Example Attacks Against Neural Networks.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018
2017
IEEE Trans. Knowl. Data Eng., 2017
Proceedings of the 11th IEEE International Conference on Semantic Computing, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017
Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
IEEE Secur. Priv., 2016
Textual Ontology and Visual Features Based Search for a Paleontology Digital Library.
Proceedings of the 28th IEEE International Conference on Tools with Artificial Intelligence, 2016
Proceedings of the IEEE International Conference on Multimedia and Expo, 2016
2015
HyXAC: Hybrid XML Access Control Integrating View-Based and Query-Rewriting Approaches.
IEEE Trans. Knowl. Data Eng., 2015
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 2015 International Conference on Healthcare Informatics, 2015
Cyber-physical security for smart cars: taxonomy of vulnerabilities, threats, and attacks.
Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the Working Notes of CLEF 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Mining Adverse Drug Reactions from Online Healthcare Forums using Hidden Markov Model.
BMC Medical Informatics Decis. Mak., 2014
Proceedings of the 2014 TREC Video Retrieval Evaluation, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014
Content-Based Access Control: Use data content to assist access control for large-scale content-centric databases.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014
2013
iLike: Bridging the Semantic Gap in Vertical Image Search by Integrating Text and Visual Features.
IEEE Trans. Knowl. Data Eng., 2013
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing.
IEEE Trans. Inf. Forensics Secur., 2013
EURASIP J. Wirel. Commun. Netw., 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the Intelligent Robotics and Applications - 6th International Conference, 2013
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013
2012
Multilingual Needs and Expectations in Digital Libraries: A Survey of Academic Users with Different Languages.
Electron. Libr., 2012
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012
Proceedings of the 12th ACM/IEEE-CS Joint Conference on Digital Libraries, 2012
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012
Proceedings of the 2012 IEEE Second International Conference on Healthcare Informatics, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012
Identification of transposable elements of the giant panda (Ailuropoda melanoleuca) genome.
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2012
2011
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata.
VLDB J., 2011
Int. J. Secur. Networks, 2011
Proceedings of the Scientific and Statistical Database Management, 2011
Proceedings of the 2011 IEEE International Conference on Healthcare Informatics, 2011
Proceedings of the 2011 IEEE International Conference on Healthcare Informatics, 2011
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011
2010
Proceedings of the 18th International Conference on Multimedia 2010, 2010
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
2009
Proceedings of the 25th International Conference on Data Engineering, 2009
2008
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering.
Proceedings of the Collaborative Computing: Networking, 2008
2007
Proceedings of the Computer Security, 2007
Proceedings of the Advances in Databases: Concepts, 2007
Automaton segmentation: a new approach to preserve privacy in xml information brokering.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems.
Proceedings of the IEEE International Conference on Sensor Networks, 2006
2005
Adaptive Information: Improving Business through Semantic Interoperability, Grid Computing, and Enterprise Integration.
Inf. Process. Manag., 2005
The evolvement and relevant factors of price discovery: A case study of cross-listed stocks in China.
Expert Syst. Appl., 2005
Expert Syst. Appl., 2005
Proceedings of the Second International Workshop on XQuery Implementation, 2005
2004
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004
Proceedings of the Third International Conference on Image and Graphics, 2004
Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management, 2004
2003
Proceedings of the 2003 International Conference on Image Processing, 2003
2002
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002