Di Lu

Orcid: 0000-0002-9923-6405

Affiliations:
  • Henan University of Technology, Key Laboratory of Grain Information Processing and Control, Zhengzhou, China
  • Xidian University, School of Computer Science and Technology, Xi'an, China (PhD 2014)


According to our database1, Di Lu authored at least 38 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
HiCoCS: High Concurrency Cross-Sharding on Permissioned Blockchains.
IEEE Trans. Computers, July, 2025

DITING: A Static Analyzer for Identifying Bad Partitioning Issues in TEE Applications.
CoRR, February, 2025

AsyncSC: An Asynchronous Sidechain for Multi-Domain Data Exchange in Internet of Things.
Proceedings of the IEEE INFOCOM 2025, 2025

2024
BiTDB: Constructing A Built-in TEE Secure Database for Embedded Systems.
IEEE Trans. Knowl. Data Eng., September, 2024

CToMP: a cycle-task-oriented memory protection scheme for unmanned systems.
Sci. China Inf. Sci., 2024

DP-CLMI:Differentially Private Contrastive Learning Against Membership Inference Attack.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2024

ZMAM: A ZKP-Based Mutual Authentication Scheme for the IoMT.
Proceedings of the Artificial Intelligence in Healthcare - First International Conference, 2024

2023
A Two-Dimensional Sybil-Proof Mechanism for Dynamic Spectrum Access.
IEEE Trans. Mob. Comput., November, 2023

BejaGNN: behavior-based Java malware detection via graph neural network.
J. Supercomput., September, 2023

Smaug: A TEE-Assisted Secured SQLite for Embedded Systems.
IEEE Trans. Dependable Secur. Comput., 2023

TEE-Assisted Time-Scale Database Management System on IoT devices.
Proceedings of the 13th International Conference on the Internet of Things, 2023

2022
Link-ability: A Prediction Method of Web Service Compatibility based on Markov Process.
Proceedings of the International Conference on Networking and Network Applications, 2022

2021
Android Malware Detection via Graph Representation Learning.
Mob. Inf. Syst., 2021

xTSeH: A Trusted Platform Module Sharing Scheme Towards Smart IoT-eHealth Devices.
IEEE J. Sel. Areas Commun., 2021

2020
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing.
World Wide Web, 2020

BTNC: A blockchain based trusted network connection protocol in IoT.
J. Parallel Distributed Comput., 2020

A secured TPM integration scheme towards smart embedded system based collaboration network.
Comput. Secur., 2020

Android Malware Detection Based on Call Graph via Graph Neural Network.
Proceedings of the International Conference on Networking and Network Applications, 2020

Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Preserving Geo-Indistinguishability of the Primary User in Dynamic Spectrum Sharing.
IEEE Trans. Veh. Technol., 2019

Personalized Recommendation for Cold-Start Users via Cluster-Level Latent Feature Model.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

QoS-Aware Path Finding and Load Balancing in Service-Composition.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Lightweight Security Authentication Mechanism Towards UAV Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Lightweight Secure Communication Mechanism Towards UAV Networks.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
Information flow control on encrypted data for service composition among multiple clouds.
Distributed Parallel Databases, 2018

AHP Aided Decision-Making in Virtual Machine Migration for Green Cloud.
Comput. Informatics, 2018

A Privacy-Preserving Incentive Mechanism on Multi-Bid Crowdsourced Spectrum Sensing.
Proceedings of the International Conference on Networking and Network Applications, 2018

2017
Distributed Secure Service Composition with Declassification in Mobile Clouds.
Mob. Inf. Syst., 2017

APPLET: a privacy-preserving framework for location-aware recommender system.
Sci. China Inf. Sci., 2017

Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing.
Sci. China Inf. Sci., 2017

Building a Secure Scheme for a Trusted Hardware Sharing Environment.
IEEE Access, 2017

Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds.
Proceedings of the International Conference on Networking and Network Applications, 2017

2016
Dynamic game model of botnet DDoS attack and defense.
Secur. Commun. Networks, 2016

Efficiency optimisation signature scheme for time-critical multicast data origin authentication.
Int. J. Grid Util. Comput., 2016

Distributed Secure Service Composition with Declassification in Mobile Network.
Proceedings of the International Conference on Networking and Network Applications, 2016

2014
From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing.
Clust. Comput., 2014

2013
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013


  Loading...