Hui Lu
Orcid: 0000-0002-4120-7716Affiliations:
- Guangzhou University, Cyberspace Institute of Advanced Technology, China
- Beijing University of Posts and Telecommunications, China (PhD)
According to our database1,
Hui Lu
authored at least 55 papers
between 2018 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Netw., September, 2024
2023
Decentralized Cooperative Caching for Sustainable Metaverse Via Meta Self-Supervision Learning.
IEEE Wirel. Commun., October, 2023
Do Not Trust the Clouds Easily: The Insecurity of Content Security Policy Based on Object Storage.
IEEE Internet Things J., 2023
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
2022
DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System.
IEEE Trans. Netw. Sci. Eng., 2022
J. Parallel Distributed Comput., 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
2021
Adaptive Feature Selection and Construction for Day-Ahead Load Forecasting Use Deep Learning Method.
IEEE Trans. Netw. Serv. Manag., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
AutoD: Intelligent Blockchain Application Unpacking Based on JNI Layer Deception Call.
IEEE Netw., 2021
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis.
Mob. Networks Appl., 2021
A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks.
Int. J. Mach. Learn. Cybern., 2021
EURASIP J. Wirel. Commun. Netw., 2021
2020
DHPA: Dynamic Human Preference Analytics Framework: A Case Study on Taxi Drivers' Learning Curve Analysis.
ACM Trans. Intell. Syst. Technol., 2020
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries.
IEEE Trans. Ind. Informatics, 2020
Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems.
IEEE Internet Things J., 2020
An adaptive method based on contextual anomaly detection in Internet of Things through wireless sensor networks.
Int. J. Distributed Sens. Networks, 2020
Dual possibilistic regression models of support vector machines and application in power load forecasting.
Int. J. Distributed Sens. Networks, 2020
Research on android infiltration technology based on the silent installation of an accessibility service.
Int. J. Distributed Sens. Networks, 2020
Int. J. Digit. Crime Forensics, 2020
Advanced persistent threat organization identification based on software gene of malware.
Trans. Emerg. Telecommun. Technol., 2020
Inferring Passengers' Interactive Choices on Public Transits via MA-AL: Multi-Agent Apprenticeship Learning.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the IEEE International Conference on Informatics, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
2019
Int. J. Digit. Crime Forensics, 2019
A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning.
IEEE Access, 2019
Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 2019 SIAM International Conference on Data Mining, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2019
2018
A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control.
Int. J. Digit. Crime Forensics, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Research on Risk Aversion Enterprise Financial Crisis Warning Based on Support Vector Data Description.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018