Bin Luo

According to our database1, Bin Luo authored at least 66 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Timing Channel in IaaS: How to Identify and Investigate.
IEEE Access, 2019

2018
Cost and Energy Aware Scheduling Algorithm for Scientific Workflows with Deadline Constraint in Clouds.
IEEE Trans. Services Computing, 2018

Automatically classifying user requests in crowdsourcing requirements engineering.
Journal of Systems and Software, 2018

PTM: A Topic Model for the Inferring of the Penalty.
J. Comput. Sci. Technol., 2018

A load-aware resource allocation and task scheduling for the emerging cloudlet system.
Future Generation Comp. Syst., 2018

Real-Time Behavior Analysis and Identification for Android Application.
IEEE Access, 2018

Does Socio-Technical Congruence Have an Effect on Continuous Integration Build Failures? An Empirical Study on 10 GitHub Projects.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Automatically Classifying Chinese Judgment Documents Using Character-Level Convolutional Neural Networks.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

A Novel Convolutional Neural Network for Statutes Recommendation.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

Construction of Microblog-Specific Chinese Sentiment Lexicon Based on Representation Learning.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

Statutes Recommendation Using Classification and Co-occurrence Between Statutes.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

The Construction Approach of Statutes Database.
Proceedings of the Data Science, 2018

Predicting Statutes Based on Causes of Action and Content of Statutes.
Proceedings of the Data Science, 2018

Establish Evidence Chain Model on Chinese Criminal Judgment Documents Using Text Similarity Measure.
Proceedings of the Data Science, 2018

2017
Security Threats to Hadoop: Data Leakage Attacks and Investigation.
IEEE Network, 2017

Software cybernetics in BPM: Modeling software behavior as feedback for evolution by a novel discovery method based on augmented event logs.
Journal of Systems and Software, 2017

A lightweight live memory forensic approach based on hardware virtualization.
Inf. Sci., 2017

Energy cost minimization with job security guarantee in Internet data center.
Future Generation Comp. Syst., 2017

Distributed Cloud Forensic System with Decentralization and Multi-participation.
Proceedings of the Wireless Internet - 10th International Conference, 2017

Exploring the Influence of Feature Selection Techniques on Bug Report Prioritization.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

Task Offloading for Scientific Workflow Application in Mobile Cloud.
Proceedings of the 2nd International Conference on Internet of Things, 2017

Topic Model Based Text Similarity Measure for Chinese Judgment Document.
Proceedings of the Data Science, 2017

Build Evidence Chain Relational Model Based on Chinese Judgment Documents.
Proceedings of the Data Science, 2017

Analyzing Android Application in Real-Time at Kernel Level.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application.
Proceedings of the IEEE International Conference on Communications, 2017

Automatically Classify Chinese Judgment Documents Utilizing Machine Learning Algorithms.
Proceedings of the Database Systems for Advanced Applications, 2017

Information Extraction from Chinese Judgment Documents.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

Statutes Recommendation Based on Text Similarity.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

Checking the Statutes in Chinese Judgment Document Based on Editing Distance Algorithm.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

Cluster Correction on Polysemy and Synonymy.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

Knowledge Graph Construction Based on Judicial Data with Social Media.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

A Method of the Association Statistics between the Cause of Action and the Statutes.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

Design and Implementation of Visual Modeling Tool for Evidence Chain.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

2016
A Spatial-Temporal Topic Model for the Semantic Annotation of POIs in LBSNs.
ACM TIST, 2016

Process mining with token carried data.
Inf. Sci., 2016

A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds.
Future Generation Comp. Syst., 2016

Investigating Timing Channel in IaaS.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

Energy Cost Minimization with Risk Rate Constraint for Internet Data Center in Deregulated Electricity Markets.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

A shared memory based cross-VM side channel attacks in IaaS cloud.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

2015
Correlating processes for automatic memory evidence analysis.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

PCFBPI: A Point Clustering Feature Based Policy Iteration Algorithm.
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015

Detective: Automatically identify and analyze malware processes in forensic scenarios via DLLs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Haddle: A Framework for Investigating Data Leakage Attacks in Hadoop.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Predicting Users' Purchasing Behaviors Using Their Browsing History.
Proceedings of the Databases Theory and Applications, 2015

Predicting Passengers in Public Transportation Using Smart Card Data.
Proceedings of the Databases Theory and Applications, 2015

2014
WAS: A weighted attribute-based strategy for cluster test selection.
Journal of Systems and Software, 2014

Combining research and education of software testing: a preliminary study.
Proceedings of the Symposium on Applied Computing, 2014

POPVI: A Probability-Based Optimal Policy Value Iteration Algorithm.
Proceedings of the PRICAI 2014: Trends in Artificial Intelligence, 2014

Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics.
Proceedings of the Information Security - 17th International Conference, 2014

Quasi-crowdsourcing testing for educational projects.
Proceedings of the 36th International Conference on Software Engineering, 2014

2013
A Task Selecting Algorithm for Personal Schedules in Workflow Systems.
Proceedings of the Web Information Systems Engineering - WISE 2013 Workshops, 2013

Mining Sequential Patterns of Predicates for Fault Localization and Understanding.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Product and User Dependent Social Network Models for Recommender Systems.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

A Method to Automatically Filter Log Evidences for Intrusion Forensics.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

2012
Discovering process models from event multiset.
Expert Syst. Appl., 2012

Using Weighted Attributes to Improve Cluster Test Selection.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2011
An empirical study on the effectiveness of time-aware test case prioritization techniques.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

A New Process Mining Algorithm Based on Event Type.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

An introductory software engineering course for software engineering program.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011

Research and practice on software engineering undergraduate curriculum NJU-SEC2006.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011

Teaching software testing methods based on diversity principles.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011

2009
A Novel Practical Framework for Operating Systems Teaching.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

2007
Applying ontology in architecture-based self-management applications.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

2005
A Study on Illumination Invariant Face Recognition Methods Based on Multiple Eigenspaces.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

A Multiple Eigenspaces Constructing Method and Its Application to Face Recognition.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

An Efficient Adaptive Focused Crawler Based on Ontology Learning.
Proceedings of the 5th International Conference on Hybrid Intelligent Systems (HIS 2005), 2005


  Loading...