Bo Luo

According to our database1, Bo Luo
  • authored at least 63 papers between 2002 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Learning Social Circles in Ego-Networks Based on Multi-View Network Structure.
IEEE Trans. Knowl. Data Eng., 2017

Cyber-Physical Systems Security - A Survey.
IEEE Internet of Things Journal, 2017

Cyber-Physical Systems Security - A Survey.
CoRR, 2017

Classification of Private Tweets Using Tweet Content.
Proceedings of the 11th IEEE International Conference on Semantic Computing, 2017

Structural superpixel descriptor for visual tracking.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Using ID-Hopping to Defend Against Targeted DoS on CAN.
Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles, 2017

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions.
IEEE Security & Privacy, 2016

Textual Ontology and Visual Features Based Search for a Paleontology Digital Library.
Proceedings of the 28th IEEE International Conference on Tools with Artificial Intelligence, 2016

Boosted local classifiers for visual tracking.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2016

2015
HyXAC: Hybrid XML Access Control Integrating View-Based and Query-Rewriting Approaches.
IEEE Trans. Knowl. Data Eng., 2015

Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Ontology-Based Visualization of Healthcare Data Mined from Online Healthcare Forums.
Proceedings of the 2015 International Conference on Healthcare Informatics, 2015

Cyber-physical security for smart cars: taxonomy of vulnerabilities, threats, and attacks.
Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems, 2015

FamilyID: A Hybrid Approach to Identify Family Information from Microblogs.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Building Topic Models to Predict Author Attributes from Twitter Messages.
Proceedings of the Working Notes of CLEF 2015, 2015

POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Mining Adverse Drug Reactions from Online Healthcare Forums using Hidden Markov Model.
BMC Med. Inf. & Decision Making, 2014

Copker: Computing with Private Keys without RAM.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Robust tracking via saliency-based appearance model.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Automatic Social Circle Detection Using Multi-View Clustering.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Content-Based Access Control: Use data content to assist access control for large-scale content-centric databases.
Proceedings of the 2014 IEEE International Conference on Big Data, 2014

2013
iLike: Bridging the Semantic Gap in Vertical Image Search by Integrating Text and Visual Features.
IEEE Trans. Knowl. Data Eng., 2013

Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing.
IEEE Trans. Information Forensics and Security, 2013

High-resolution remote sensing image segmentation based on improved RIU-LBP and SRM.
EURASIP J. Wireless Comm. and Networking, 2013

HyXAC: a hybrid approach for XML access control.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

A Complete Methodology for Estimating Dynamics of the Heavy Machine Tool Structure.
Proceedings of the Intelligent Robotics and Applications - 6th International Conference, 2013

Access control for big data using data content.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

Content-based assessment of the credibility of online healthcare information.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

2012
Multilingual Needs and Expectations in Digital Libraries: A Survey of Academic Users with Different Languages.
The Electronic Library, 2012

GRADE: Graceful Degradation in Byzantine Quorum Systems.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Preserving data integrity for smart grid data aggregation.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

IPKB: a digital library for invertebrate paleontology.
Proceedings of the 12th ACM/IEEE-CS Joint Conference on Digital Libraries, 2012

Location Type Classification Using Tweet Content.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

Mining Adverse Drug Side-Effects from Online Medical Forums.
Proceedings of the 2012 IEEE Second International Conference on Healthcare Informatics, 2012

Stalking online: on user privacy in social networks.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

S2A: secure smart household appliances.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Predicting aggregate social activities using continuous-time stochastic process.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Identification of transposable elements of the giant panda (Ailuropoda melanoleuca) genome.
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2012

2011
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata.
VLDB J., 2011

Secure and privacy-preserving information aggregation for smart grids.
IJSN, 2011

Privacy Preserving Group Linkage.
Proceedings of the Scientific and Statistical Database Management, 2011

Healthcare Information Networks: Discovery and Evaluation.
Proceedings of the 2011 IEEE International Conference on Healthcare Informatics, 2011

Cephalometric Landmark Tracing Using Deformable Templates.
Proceedings of the 2011 IEEE International Conference on Healthcare Informatics, 2011

User Groups in Social Networks: An Experimental Study on YouTube.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Content based social behavior prediction: a multi-task learning approach.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

2010
iLike: integrating visual and textual features for vertical search.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
On Protecting Private Information in Social Networks: AProposal.
Proceedings of the 25th International Conference on Data Engineering, 2009

2008
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering.
Proceedings of the Collaborative Computing: Networking, 2008

2007
Pragmatic XML Access Control Using Off-the-Shelf RDBMS.
Proceedings of the Computer Security, 2007

Security-Conscious XML Indexing.
Proceedings of the Advances in Databases: Concepts, 2007

Automaton segmentation: a new approach to preserve privacy in xml information brokering.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

2005
Adaptive Information: Improving Business through Semantic Interoperability, Grid Computing, and Enterprise Integration.
Inf. Process. Manage., 2005

The evolvement and relevant factors of price discovery: A case study of cross-listed stocks in China.
Expert Syst. Appl., 2005

Empirical study of trading rule discovery in China stock market.
Expert Syst. Appl., 2005

Deep Set Operators for XQuery.
Proceedings of the Second International Workshop on XQuery Implementation, 2005

2004
A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

Content-based SMIL retrieval.
Proceedings of the Third International Conference on Image and Graphics, 2004

QFilter: fine-grained run-time XML access control via NFA-based query rewriting.
Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management, 2004

2003
Video caption detection and extraction using temporal information.
Proceedings of the 2003 International Conference on Image Processing, 2003

2002
Video text extraction using temporal feature vectors.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002


  Loading...