Long Lu
Orcid: 0000-0003-4120-2381
According to our database1,
Long Lu
authored at least 78 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A hierarchical attention-based multimodal fusion framework for predicting the progression of Alzheimer's disease.
Biomed. Signal Process. Control., February, 2024
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Comput. Electr. Eng., May, 2023
A multicenter study on two-stage transfer learning model for duct-dependent CHDs screening in fetal echocardiography.
npj Digit. Medicine, 2023
A Deep Learning-Based Brain Age Prediction Model for Preterm Infants via Neonatal MRI.
IEEE Access, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
ACM Trans. Softw. Eng. Methodol., 2022
Integrating genomic and resting State fMRI for efficient autism spectrum disorder classification.
Multim. Tools Appl., 2022
A novel self-learning semi-supervised deep learning network to detect fake news on social media.
Multim. Tools Appl., 2022
Cutting-Splicing data augmentation: A novel technology for medical image segmentation.
CoRR, 2022
Environmental efficiency assessment of China's integrated power system under the assumption of semi-disposability.
Comput. Ind. Eng., 2022
JChainz: Automatic Detection of Deserialization Vulnerabilities for the Java Language.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
2021
Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy.
Proceedings of the Information Security - 24th International Conference, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Consumer health information needs in China - a case study of depression based on a Social Q&A community.
BMC Medical Informatics Decis. Mak., 2020
Research and development of autism diagnosis information system based on deep convolution neural network and facial expression data.
Libr. Hi Tech, 2020
Libr. Hi Tech, 2020
Big data approaches to develop a comprehensive and accurate tool aimed at improving autism spectrum disorder diagnosis and subtype stratification.
Libr. Hi Tech, 2020
CoRR, 2020
Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps.
CoRR, 2020
P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Design Of ASD Subtyping Approach based on Multi-Omics Data to Promote Personalized Healthcare.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
P<sup>2</sup>IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling (extended version).
CoRR, 2019
Proceedings of the 15th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2019
Proceedings of the 2019 USENIX Annual Technical Conference, 2019
Proceedings of the Information Security - 22nd International Conference, 2019
Research on Three-Dimensional Reconstruction of Brain Image Features Based on Augmented Reality Technology.
Proceedings of the Smart Health - International Conference, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Detecting (absent) app-to-app authentication on cross-device short-distance channels.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018
Augmented Reality: New Technologies for Building Visualized Hospital Knowledge Management Systems.
Proceedings of the Smart Health - International Conference, 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017
Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
(t, p)-Threshold point function secret sharing scheme based on polynomial interpolation and its application.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the IEEE International Conference on Acoustics, 2013
2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
On the Combination of Cooperative Diversity and Multiuser Diversity in Multi-Source Multi-Relay Wireless Networks.
IEEE Signal Process. Lett., 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
IEEE Trans. Consumer Electron., 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009