Yuliang Lu
Orcid: 0000-0002-8502-9907
According to our database1,
Yuliang Lu
authored at least 81 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
HSS: A Memory-Efficient, Accurate, and Fast Network Measurement Framework in Sliding Windows.
IEEE Trans. Netw. Serv. Manag., December, 2024
Neural Comput. Appl., May, 2024
Sensors, April, 2024
Research on a Critical Link Discovery Method for Network Security Situational Awareness.
Entropy, April, 2024
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing.
IEEE Trans. Inf. Forensics Secur., 2024
A robust defense for spiking neural networks against adversarial examples via input filtering.
J. Syst. Archit., 2024
Towards Generalizable Autonomous Penetration Testing via Domain Randomization and Meta-Reinforcement Learning.
CoRR, 2024
Yama: Precise Opcode-based Data Flow Analysis for Detecting PHP Applications Vulnerabilities.
CoRR, 2024
CoRR, 2024
CoRR, 2024
SGES: A General and Space-efficient Framework for Graphlet Counting in Graph Streams.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
2023
Flow-MAE: Leveraging Masked AutoEncoder for Accurate, Efficient and Robust Malicious Traffic Classification.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Backdoor Learning on Siamese Networks Using Physical Triggers: FaceNet as a Case Study.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
2022
An Internet-Oriented Multilayer Network Model Characterization and Robustness Analysis Method.
Entropy, 2022
Generative Text Steganography via Multiple Social Network Channels Based on Transformers.
Proceedings of the Natural Language Processing and Chinese Computing, 2022
2021
ACM Trans. Multim. Comput. Commun. Appl., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
A novel (k1, k2, n)-threshold two-in-one secret image sharing scheme for multiple secrets.
J. Vis. Commun. Image Represent., 2021
BEDetector: A Two-Channel Encoding Method to Detect Vulnerabilities Based on Binary Similarity.
IEEE Access, 2021
2020
Signal Process. Image Commun., 2020
Secur. Commun. Networks, 2020
Multim. Tools Appl., 2020
Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes.
Multim. Tools Appl., 2020
XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes.
Multim. Tools Appl., 2020
Int. J. Digit. Crime Forensics, 2020
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the ICDSP 2020: 4th International Conference on Digital Signal Processing, 2020
2019
Signal Process. Image Commun., 2019
Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers.
Multim. Tools Appl., 2019
J. Vis. Commun. Image Represent., 2019
J. Inf. Secur. Appl., 2019
Weighted Secret Image Sharing for a $(k, n)$ Threshold Based on the Chinese Remainder Theorem.
IEEE Access, 2019
Lossless $(k, n)$ -Threshold Image Secret Sharing Based on the Chinese Remainder Theorem Without Auxiliary Encryption.
IEEE Access, 2019
Proceedings of the Data Science, 2019
2018
Lossless and Efficient Polynomial-Based Secret Image Sharing with Reduced Shadow Size.
Symmetry, 2018
Secur. Commun. Networks, 2018
Progressive visual secret sharing for general access structure with multiple decryptions.
Multim. Tools Appl., 2018
Greyscale-images-oriented progressive secret sharing based on the linear congruence equation.
Multim. Tools Appl., 2018
J. Vis. Commun. Image Represent., 2018
基于网络攻防博弈模型的最优防御策略选取方法 (Optimal Defense Strategy Selection Method Based on Network Attack-Defense Game Model).
计算机科学, 2018
基于符号执行技术的网络程序漏洞检测系统 (Symbolic Execution Technology Based Defect Detection System for Network Programs).
计算机科学, 2018
J. Real Time Image Process., 2018
Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions.
J. Real Time Image Process., 2018
Image Secret Sharing Construction for General Access Structure with Meaningful Share.
Int. J. Digit. Crime Forensics, 2018
Chinese remainder theorem-based two-in-one image secret sharing with three decoding options.
Digit. Signal Process., 2018
2017
基于MapReduce的互联网拓扑特征参数算法研究 (Study on Calculation Method for Internet Topological Parameters Based on MapReduce).
计算机科学, 2017
分布式环境下的路由器级互联网抗毁性研究 (Study on Invulnerability of Router-level Internet Based on MapReduce).
计算机科学, 2017
Int. J. Digit. Crime Forensics, 2017
Int. J. Digit. Crime Forensics, 2017
Int. J. Digit. Crime Forensics, 2017
Contrast-improved visual secret sharing based on random grid for general access structure.
Digit. Signal Process., 2017
Secret Image Sharing for (k, k) Threshold Based on Chinese Remainder Theorem and Image Characteristics.
Proceedings of the Image and Video Technology - 8th Pacific-Rim Symposium, 2017
Secret Data-Driven Carrier-Free Secret Sharing Scheme Based on Error Correction Blocks of QR Codes.
Proceedings of the Data Science, 2017
Proceedings of the Data Science, 2017
Proceedings of the Image and Graphics - 9th International Conference, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
2016
基于时序距离的AS级Internet动态性测量方法 (Measurement of AS-level Internet Evolution Based on Temporal Distance).
计算机科学, 2016
基于频繁闭图关联规则的AS级Internet链路预测方法 (Link Prediction of AS Level Internet Based on Association Rule of Frequent Closed Graphs).
计算机科学, 2016
Proceedings of the Wireless Internet - 9th International Conference, 2016
Proceedings of the Wireless Internet - 9th International Conference, 2016
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016
A Progressive Threshold Secret Image Sharing with Meaningful Shares for Gray-Scale Image.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016
Proceedings of the Social Computing, 2016
2007
Proceedings of the Third International Conference on Natural Computation, 2007